The magazine with the inside story on security issue 18 february 2015
Less is more Security solutions for the SMB market
06 INDUSTRY NEWS
24 Full steam ahead
32 A stitch in time
36 Screening... Debunking the Myths
Latest developments in the industry
Panomera watches over trains in South Africa
Ten tips to avoid massive data breaches
A look at screening with changes to the Data Protection Act
速
Our focus is making professional video surveillance easy for everyone
Safe data storage and excellent usability. Especially for smaller businesses, Bosch DIVAR IP 2000 offers a professional video surveillance solution that is easy to install and easy to use. Designed for 24/7 continuous video recording, it offers complete access and control from anywhere, regardless of available bandwidth. Now you can keep an eye on your store without being there. www.boschsecurity.com/hdsecurity
Commentary
CREATING THE FUTURE OF SECURITY . . . TODAY THE MAGAZINE WITH THE INSIDE STORY ON SECURITY
LESS IS MORE SECURITY SOLUTIONS FOR THE SMB MARKET The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.
DSX Access Systems, Inc.
www.dsxinc.com | |
06 INDUSTRY NEWS Latest developments in the industry
24 FULL STEAM AHEAD
Panomera watches over trains in South Africa
32 A STITCH IN TIME Ten tips to avoid massive data breaches
A look at screening with changes to the Data Protection Act
W
elcome to the February issue of In
Georgia decided to migrate its existing
Security and with the Counter Terror
security over to a hybrid IP solution with
Expo, MIPS and IFSEC rapidly approaching,
victor unified management system from
we have spring full of exhibitions. This issue’s
American Dynamics at the centre of the
Product & Industry News section (starting
operation (see page 28).
on page 8) showcases the latest news from
Editor Chris Hewett
the industry.
Advertising +44 (0)1622 201207 advertising@mebmedia.co.uk
Bosch’s video surveillance and intrusion
Accounts Jay Kempisty +44 (0)1622 201207 accounts@mebmedia.co.uk
for the SMB market (see page 2).
Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Designer Mark Fisher mark@fishgraphicdesign.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk
Ten tips to avoid massive data breaches – Don’t be the next Sony or Anthem by Benny
Our cover story this month examines
Czarny, Founder and CEO OPSWAT (see page 32).
protection being increasingly available
Justin Bentley, Chairman of the BSI drafting group for BS 7858 discusses
Next, Counter Terror Expo 2015, the leading
screening with the pending enactment of
international event dedicated to mitigating the
a little known clause in the Data Protection
threat of terrorism, takes place at Olympia,
Act (see page 36).
London (see page 20).
Mike O’Neill, Chairman of the British
Later, Panomera® watches over trains
Security Industry Association’s Specialist
as marshalling yards in South Africa are
Services Section looks at keeping your
equipped with multifocal sensor technology
business safe by implementing a security
(see page 24).
review (see page 40).
Chris Hewett, Editor
Cherokee County School District in
36 20
Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.
06
02
32
Copyright © MEB Media Ltd – 2014, all rights reserved.
24
Contents 02 Cover Story - Less is more Security solutions for the SMB market 06 Product & Industry News The latest news and views from the industry 20 Counter Terror 2015 Review Counter Terror Expo 2015, takes place at Olympia, London
28 36
24 Full steam ahead Panomera® watches over trains in South Africa
32 A stitch in time Ten tips to avoid massive data breaches
28 Benefits of IP security Cherokee County School District migrates over to a hybrid IP solution
36 Screening... Debunking the Myths A look at screening with changes to the Data Protection Act
40
40 Prevention is better than cure Keeping your business safe by implementing a security review
IN Security I February 2015 I 1
cover story
Less is more Safety solutions for the SMB market – video surveillance and intrusion protection increasingly available
A
lthough the Small and Medium Business market has not changed substantially over the last two years, there is an increased awareness and interest for video surveillance as well as other safety and security related solutions – a development set to continue over the next years. For owners of all kinds of businesses like small shops or filling stations, but also within the residential area, this development is driven by an increased demand for safety and thus for the availability of solutions responding to this need. Especially in the retail sector an ever increasing want to reduce losses caused by theft from customers and employees alike can be observed.
2 I February 2015 I IN Security
Alongside this stands another recent development, namely the demand for accessing camera controls, live video streams and HD images anytime from anywhere regardless of the available bandwidth. Concerning this demand, the latter is just as important as the ever increasing demand for more detail, that is to say a higher resolution. Consequently, the transition from analog to IP video solutions is evident in the SMB market. Bosch has been emphasizing specific intelligent IP video solutions for small and medium businesses since 2011. Recent examples are: the TINYON IP cameras, IP 4000 and IP 5000 cameras as well as the DIVAR IP 2000 recording solution.
TINYON IP 2000 WI and TINYON IP 2000 PIR cameras, for example, offer a cost-effective, reliable and complete solution to easily set-up a professional system securing homes or small businesses. As 2-in1 solutions, both models combine an integrated passive infrared (PIR) sensor and a 720p HD IP video surveillance camera. Even in complete darkness, the PIR sensor enables the detection of any motion within a five meter range. Depending on the light levels, a motion alarm triggers the built-in white light LED, ensuring the highest quality of video images. This guarantees the easy identification of events or intruders. Besides motion detection, both cameras offer a built-in microphone to trigger sound-based alarms.
“In case of an alarm, all IP cameras from Bosch offer the possibility to send notifications to users via text message or e-mail� Together with the integrated loudspeaker, users can establish a remote two-way communication channel to address and verify possible security situations. With the IP 4000 and IP 5000 family, Bosch has raised the bar and set new standards in security and data management within the small and medium business segment. The IP 5000 family offers resolutions up to 5 megapixels making it easy to distinguish individuals or minor details, significantly increasing the effectiveness of retrospective analysis. The lower-cost IP 4000 family offers the same performance at 720p resolution. All SMB cameras are equipped with Content Based Imaging Technology (CBIT) ensuring that captured images are tailored to the content of the scene. Depending on movement and varying light intensity, the camera settings are continuously
and dynamically adjusted. This ensures perfect exposure of objects of interest while reducing bitrate by up to 50%. Consequently, storage costs and network strain are reduced significantly without compromising video quality. Both families offer a complete portfolio providing a camera suited for any facility – indoor or outdoor. Even in complete darkness, the IR models capture all relevant images. In case of an alarm, all IP cameras from Bosch offer the possibility to send notifications to users via text message or e-mail. Moreover, facial snapshots or video clips can be directly send to pre-defined recipients or (free) cloud accounts, allowing for a fast response of users. Video data can either be stored in the cloud, on a network video recorder like the DIVAR IP 2000 recording solution from Bosch,
or on the built-in SD card. Thus, all cameras offer easy back-up solutions to ensure the safe storage of the relevant video data. Another important fact is the ease of installation and configuration. With the DIVAR IP 2000 Bosch offers the possibility to create a video surveillance solution with professional security features that is both easy to install and easy to use. It provides safe data storage, 24/7 remote access as well as advanced features to manage your video data. The Common Product Platform (CPP) ensures easy maintenance and backward compatibility over multiple IP camera generations, plus a future-proof solution to enhance or add new features via firmware updates. A single firmware for all cameras significantly reduces maintenance costs and enables easy 3rd party integration. g
IN Security I February 2015 I 3
“This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry”
To further enhance the ease of installation, the IP 5000 series of micro dome models, for example, is equipped with a 3-axis lens for a precise field of view on a wall or ceiling. Meeting the demand for 24/7 remote access and control, Bosch offers their unique and patented Dynamic Transcoding technology. This delivers users both smooth live video streaming and instant access to HD images and recordings as well as camera controls, regardless of available bandwidth anytime, anywhere. Depending on the customers’ needs they can “mix & match” the SMB solutions from Bosch to meet their requirements. This can either be a complete Bosch solution or a combination with 3rd party products and services. The thereby arising potential for the flexibility of integration is supported by the Integration Partner Program (IPP) from Bosch as well as ONVIF conformity of the camera solutions. With the SMB camera and recording solutions Bosch offers a cost-effective, reliable and comprehensive portfolio, especially
4 I February 2015 I IN Security
designed for 24/7 operation, to easily set-up a professional solution to safeguard businesses. They ensure that alarms are triggered when needed, and video data is recorded and safely stored, so that data can always be reviewed regardless of time and place. Beyond the above described video solutions, safety applications are starting to extend into other application areas for the SMB market such as intrusion detection. Here, for example, Bosch Security Systems offers a comprehensive product family around the AMAX intrusion control panels which is supported by a series of wired and wireless peripherals. Householders as well as owners of SMEs (Small Medium Enterprises) have the flexibility to choose between various detectors, magnetic contacts and more, thus protecting their assets with an individually configured security solution. AMAX 2100 is suitable for small households and stores with a maximum of eight zones, while AMAX 3000 is designed for facilities where 32 zones are required – AMAX 4000 covers
the largest version with up to 64 zones. AMAX 3000 and 4000 can additionally be operated via hybrid modus, connecting wired detectors as well as wireless peripherals of the new RADION series. This wireless range comprises 16 different products, including motion detectors, door/window contacts, key fobs, and smoke detectors. This makes it suitable for new installations as well as for integration in existing intrusion alarm systems. Furthermore, the wireless range offers another special feature: by using repeaters even remotely located detectors can be integrated in the alarm system, and a system range of up to 1,350 meters can be achieved. Finally, thanks to auto-addressing, all RADION components are quickly registered within the overall intrusion system. With their portfolio of video surveillance and intrusion detection, Bosch is an ideal partner to support the needs of the SMB market for safety and security related solutions. This way, small and medium businesses are best equipped for the future. n
Access to leading global technology, solutions and knowledge to enable security excellence
Register at ifsec.co.uk/
16-18 June 2015, ExCeL London
The global stage for security innovation and expertise Join us at IFSEC International in June to meet expert suppliers see the latest technology and new products, attend high quality education sessions and make new contacts through plenty of networking opportunities.
@IFSEC
Organised by
Physical Security & Perimeter Protection
Smart Buildings
Video Surveillance
Access Control & Intruder Alarms
IT & Cyber Security
Integrated Security
Safe Cities
product and industry news
Panasonic Ultra 360° camera gets UK launch
A
round 40 security dealers, integrators and end users yesterday (Thursday 22nd of January) joined Panasonic for the UK launch of the new 360°, ultra high 4K resolution surveillance camera. The event, held at the Panasonic Solutions Centre in Bracknell, was the first opportunity to see the Ultra 360° cameras (WV-SFV481 and WV-SFN480) in the UK. Aimed at applications such as banking, retail and logistics, it can capture an increased level of detail over a much wider area than is achievable with traditional security cameras, meaning greater coverage with fewer cameras. The event featured three of the new 360° cameras installed in different parts of the building, along with a control room setup. The live camera footage was displayed on a 2x4 video wall configuration using Panasonic’s 55” LFV50 professional displays. The live demonstration included the camera’s intelligent analytics features, including heat mapping and people counting. The Moving Object Remover (MOR) feature was also demonstrated, which makes moving objects, like people, appear as a translucent silhouette so the area behind them is still visible, ideal for data capture while protecting privacy.
6 I February 2015 I IN Security
Panasonic Product Marketing Manager Gerard Figols, said, “The outdoor model is the first 4K 360-degree day/night camera with Auto Back Focus (ABF) saving installation time, cost and maintenance, and delivering extremely high image quality even with temperature shifts. The camera is also water proof and vandal resistant, making it suitable for both indoor and outdoor use. “It is highly versatile surveillance camera which can offer excellent performance to many businesses. What’s more, the intelligent analytics feature gives organisations the power to gain more out of their surveillance cameras than just security.” The camera features sharp and natural colour reproduction with strong low light performance – the 1/1.7” sensor operates down to 0.05lx in black and white mode enabling real day/night switching providing an ideal 24/7 surveillance solution. This is accompanied by a high resolution 4K engine, providing clarity at the centre and the rim of the image.
n For more information about Panasonic security products, please visit http://business.panasonic. co.uk/professional-camera/products-andaccessories/security-solutions
Milestone Systems makes new-born rhino an online star Copenhagen Zoo uses Milestone XProtect® VMS to create online buzz about rare rhino birth. This is the first result of a strategic collaboration with Milestone on videoenabled experience in parks. Milestone Systems, the open platform company in IP video management software (VMS), has entered a strategic collaboration with Copenhagen Zoo. One of the main aims behind this partnership is to use video as a tool to extend and enhance visitors’ experience and create new business possibilities for Copenhagen Zoo. The first successful event using the networked video technology was the online broadcast of the birth of a male rhino calf at the zoo, on January 24 this year. The broadcast attracted more than 35,000 views on YouTube and generated further media interest. Rhino births in zoos are rare and the last delivery in Copenhagen Zoo was in 1982. The zoo has created a section on their website dedicated to the event. Holders of annual passes can now watch live video from the rhino pen and get more information on this endangered species. The video feeds from the zoo are currently only accessible to those who have an annual pass to the zoo. Copenhagen Zoo is very positive about the video technology possibilities in this strategic partnership with Milestone Systems. “Milestone has opened our eyes to new uses of video and shown us marketing opportunities that we had not discovered ourselves. The video software is not only helping us with safety and protection of the animals and staff – there are so many additional
possibilities as well. It is a fascinating new category of management tool that is expanding into our line of business,” says Steffen Straede, CEO at Copenhagen Zoo. “We see a very positive reaction from our patrons when we announce the birth of an animal. The use of video technology gives the zoo patrons the possibility to experience the animals close up and undisturbed.” The open platform technology in Milestone XProtect enables Copenhagen Zoo to pick camera brands and models that are perfectly suited to the highly challenging environment in the park. When the rhino calf was born, the national Danish broadcaster DR requested a live video feed from the rhino pen. The open architecture of the Milestone software helped facilitate this request on short notice, and the rhino calf became an instant media darling on Danish prime time television. “We are dedicated to furthering the benefits of open platform software to video-enable business. The use of video to enrich patrons’ experience of Copenhagen Zoo is a clear testimonial to the value of our technology, empowering through our technology to reach beyond monitoring and protecting the animals,” says Kenneth Hune Petersen, Chief Sales and Marketing Officer at Milestone Systems. ”We have an excellent relationship with Copenhagen Zoo, and we look forward to developing new concepts that can further enhance the experience of parks in the future.”
n For more information, visit: www.milestonesys.com
IN Security I February 2015 I 7
product and industry news
Comelit’s ViP system offers residents class-leading comfort and security Welwyn Garden City, UK, 16th February 2015. Globally renowned door entry manufacturer, Comelit Group UK, has supplied an IP video door entry system for a multi-block residential development in an exclusive gated community within the idyllic north London village of Mill Hill. Hertfordshire-based luxury property developers, Heron Lea, asked Comelit to design and supply a system that offered unparalleled functionality and security, complemented by monitors that were sleek, elegant and in harmony with the high-end décor of the luxury apartments. Specialist electronic fire and security company, Detection Security, working in conjunction with access control distributor, Door Entry Direct, was tasked with the installation and design for the Hammers Lane site using Comelit’s simple and versatile IP system. A total of 72 Black Planux Lux video monitors were installed and linked to the 23 bespoke ViP entrance panels throughout the eight apartment blocks. These individual buildings were then connected to the existing site-wide LAN to provide simultaneous video and audio conversations between an unlimited numbers of users (including the switchboard operator), without the phone line ever being engaged. The installers benefited greatly from being able to integrate the existing alarm with the door entry system and preconfigure everything off-site, saving both time and money. Comelit’s ViP system is completely digital and is at the forefront of leading-edge technology, making it easy to install into an existing LAN network. In comparison with traditional analogue systems, ViP also makes future expansion possible, as there are no limits to the number of users, switchboards and internal units.
Benefits of using Comelit’s Smartphone App Users of Comelit’s ViP System can benefit greatly from a host of features that demonstrate just how advanced
8 I February 2015 I IN Security
it is. These include being able to receive audio and video calls from the external unit directly on a smartphone or tablet via the Wi-Fi network at home and by means of a 3G/4G data connection when away from home. It is also possible to control other functions with a smartphone or tablet, including viewing images from CCTV cameras and making intercom calls to other internal devices from anywhere in the world, thanks to Comelit’s ViP Remote application (available for download from ITunes and Google Play Store). Comelit ViP Remote services can, however, only be used if a gateway device and Wi-Fi modem have been fitted. Finally, using the ViP Remote app also allows for the integration of Comelit’s ViP system with third-party Home Automation systems. This enables the control of services such as lighting, heating and air conditioning and serves to enhance the overall user experience.
Integration of Lifts and Access Control Additional security features for the Hammers Lane residents include being able to send alarms or panic messages to the switchboard. An extra layer of security is also provided with management of the lifts – when entering the building, residents simply present their proximity token to the reader to gain access. Once in the building, a person presses a button to call the lift for the penthouse, a call will be placed in the penthouse on the video monitor serving as notification to the occupant that they have a visitor. The main focus of the choice of system was to provide residents with a product that was easy to use and one that offered high levels of security coupled with the latest innovative features. Equally, the high expectations of the developers were also met as the system provides the ability for easy expansions and upgrades in the future, while keeping installation costs to a minimum. n For more visit: www.comelitgroup.co.uk/uk
Enabling Freedom for the Internet of Things. Your wireless data solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global wireless data management platform and private managed network, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted provider to our partners and the trusted solution for Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection. Wyless offers truly uncompromising LTE, 3G, and 2G data solutions, delivering worldwide wireless connectivity over the most secure and resilient private managed network infrastructure delivered in partnership with 19 Tier 1 MNOs in over 120 countries We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support. So connect with the experts and together we’ll take your applications to the next level. You have found your true IOE ( Internet of Everything ) and broadband data partner.
+1 617 949 8900 +44 1895 454 699 info@wyless.com www.wyless.com
productand andindustry industry news product news
Samsung Techwin launch auto-tracking speed dome Samsung Techwin has introduced the World’s first 1.3MP 43x PTZ network video surveillance dome camera with auto-tracking. The launch of the SNP-5430H follows on from the introduction in July 2014 of the SNP-6320H 2MP Full HD 32 x optical zoom PTZ speed dome which also features auto-tracking. Both models are weatherproof, and with heaters powered by PoE+ to withstand extremely low temperatures and Digital Image Stabilization which negates the effects of vibration, they collectively provide users with high performance video surveillance options for external environments such as airports, ports, car parks, industrial estates, retail parks and a wide range of other applications where high performance PTZ functionality is required.
Auto-tracking The respective powerful 43x and 32x zoom capabilities of the SNP-5430H and SNP-6320H is enhanced by an auto-tracking feature that allows operators to monitor the movement of people or vehicles, whilst remaining hands-free to control other cameras. The SNP-5430H and SNP-6320H can capture superb quality images at an ultra fast frame rate of 60fps. Multiple streams of images can be transmitted at a
variety of frame rates and resolutions to any PC on the network or other devices such as smartphones and tablets, whilst utilisation of the latest version of H.264 compression minimises latency, making the manual tracking of moving objects simple and straightforward. Both models feature Wide Dynamic Range which with performance greater than 120dB, can accurately produce images in scenes that simultaneously contain very bright and very dark areas. Other key features include Defog which can improve the clarity of images captured in poor weather conditions such as rain, smoke or fog, The models also feature bidirectional audio that allows them to be interfaced with local PA systems. n For further information please email STEsecurity@samsung.com
Building security solutions with Mul-T-Lock® and William Davis Portable technical innovation, total security and the offer of a patented one key solution has led to William Davis’ adoption of Mul-T-Lock®’s intelligent WatchLock® padlocks to secure costly equipment on site at various locations across the country. As one of the Midland’s largest privately owned construction and development companies William Davis works in a range of market sectors to deliver high quality properties. With expensive equipment recently stolen from site, to the value of circa £20,000, security managers contacted local Mul-T-Lock dealer Charnwood Lock & Key to source a locking solution that would be able to secure such remote heavy equipment. Roy at Charnwood Lock & key recommended Mul-TLock®’s high security WatchLock® intelligent padlock, that not only tracks activity but also enables geofence parameters to notify if equipment leaves or enters predefined locations. Says Paul Dunning, Security Manager at William Davis: “The recent theft was a real wake up call to how vulnerable our equipment could be, even with the high security alarm systems and safety measures across our sites. We needed an additional integrated layer with the capability to adapt to individual environments. “Mul-T-Lock® WatchLock® has proven to suit our needs
10 I February 2015 I IN Security
perfectly and means authorised site managers can retain just one key to open and secure all locks under their jurisdiction. We had initially used WatchLock® across five of our sites but now have no hesitation in expanding its use to protect as much of our machinery as possible.” Mul-T-Lock® WatchLock® operates with a unique and highly secure web page that allows users at any time to monitor WatchLock® 24/7/365. Mul-T-Lock® WatchLock® reports can be generated advising of activity, location and status. An added benefit for William Davis is that all padlocks can be operated off one patent protected master key. All additional Keys for the WatchLock®s can be provided by local Mul-T-Lock dealer Charnwood Lock & key upon adherence to a strict security protocol. Roy Stafford of Charnwood Lock & Key said: “The beauty of Mul-T-Lock® WatchLock® is it is such a simple concept - it’s a padlock and operates as a padlock. But the addition of its intelligence and the reporting capability means it is a powerful security device, and the perfect solution here for William Davis, especially with the management control and overall advantages of a master key solution.” n For further information on WatchLock™ and the full range of security solutions available from Mul-T-Lock, please visit: www.mul-t-lockwatchlock.co.uk
WebWayOne alarm handling solutions installed at Tavcom training centre Students participating in one of Tavcom Training’s Alarm Systems courses will be able to gain practical hands-on experience of alarm handling within a control room environment, thanks to equipment donated by WebWayOne. The equipment installed in the control room operators’ testing area at Tavcom’s training centre in Bishops Waltham, includes Communicator Pro and Mini devices, as well as WebWay World web access in order for students to familiarise themselves with the commissioning and support of IP and 2G/3G communication. Six webway communicators are fully operational and signalling to test accounts at Southern Monitoring’s Alarm Receiving Centre in Waterlooville, with remote access via MASWeb to view alarm delivery in real time. The communicators are serially connected to Honeywell Galaxy and Texecom Intruder panels and can take advantage of SIA3 signalling which includes the support of remote servicing and diagnostics.
Enhanced Training
training courses by offering students opportunities to immediate put theory into practice,” said Paul Tennent, Director of Tavcom. “We are therefore very grateful to WebWayOne for their support in providing ATS equipment. We will certainly be able to put it to good use in all the Alarm Systems’ related training courses which we will be conducting during 2015.” Tavcom currently offer over 70 regularly scheduled training courses ranging from one day seminars to five day fully residential programmes. The courses are designed to meet the training requirements of security professionals at all levels, from Foundation courses for those with little or no previous experience, to highly advanced programmes for Control Room Supervisors, Security Managers and Company Executives. The wide range of technical and non-technical courses cover all security systems related fields including Security Management, Control Room Operations, System Planning and Project Management, Structured Cabling, Disaster Recovery, Counter Eavesdropping, PAT Testing, Solar Panel Installation and Covert CCTV.
“As the leading provider of security systems training, we are always looking to utilise the latest available technology to enhance the effectiveness of our
n For further information please visit www.webwayone.co.uk
IN Security I February 2015 I 11
product and industry news
Sateon access control update opens doors to new features SATEON, the 100% browser based access control system from Grosvenor Technology, has received a new update adding even greater functionality for new and existing users. SATEON 2.8 now automatically deactivates lost ID cards or tokens when replacements are issued. This cuts down on manual system administration and also ensures security is not compromised in the event of a card being lost or stolen. The introduction of a range of new graphical tools, including navigable real time maps, allow easy and intuitive monitoring and analysis of building access while the new Time Patterns function allows for building automation and pre-programmed access at scheduled times via a simple calendar interface. In addition, with just a few clicks the new scheduled reports feature allows custom reports to be automatically printed or emailed to the desired user at a set time. This means there’s no more need to set reminders or to spend vital time repetitively compiling reports. SATEON 2.8 can also seamlessly communicate with Galaxy Intruder and Simplex fire panels and Aperio wireless lock systems, allowing employers to get an access control solution which is tailored to their exact needs, without compromise.
For existing Grosvenor JANUS users, the process of upgrading is quicker than ever thanks to the Janus Migration Tool. This allows businesses to quickly start enjoying the full benefits of SATEON without disruption. SATEON allows system managers and security staff to login on any PC or Mac via a secure portal from any device, anywhere, eliminating the need for additional software. This saves set-up time and server space for IT departments, whilst still providing a slick interface and comprehensive features. Its powerful design supports a wide range of tasks, from monitoring visitor movements in real-time, to producing custom management reports and setting automatic alarm protocols such as automatically focusing CCTV cameras on the source of the alert. These are just some of the fifteen new additions to SATEON, to find out more, head to http://www. grosvenortechnology.co.uk/sateon/2.8.
Pro-Vision release new product catalogue Pro-Vision, the UK distributor of security equipment has recently launched its latest 200 page product catalogue (dated February 2015) featuring the very best in branded CCTV and Access Control equipment. Simon Davies, Internal Sales Manager for ProVision told us, “The 2015 edition includes IP products from Canon, D-Link, IDIS, IQinVision, Secure Logiq and Wavestore - plus a comprehensive listing of the Dallmeier Multifocal Sensor System. On the analogue side we have included the new 1000 TVL Beyond range from Samsung and the Videx range to the Access Control section.” “At 200 pages the catalogue is our largest publication to date - and with nearly 70 pages devoted to the IP section – there is a brand, product and solution to satisfy the most demanding of applications. Due to the extensive range of equipment we can supply the catalogue can only provide an insight into the vast number of products that are now available from Pro-Vision. With images, product features and improved descriptions the catalogue provides an indication of what each product can deliver. For more comprehensive detailed information we can supply the
12 I February 2015 I IN Security
relevant datasheet and answer any other questions customers may have.” Simon continued, “The introduction of the new and exciting brands like Canon, D-Link and IDIS Pro-Vision now offer means we can provide the UK installer with an even greater variety and choice of equipment. An up-to-date list of all the brands we distribute are displayed on the back cover of the catalogue. It’s obviously impossible for us to list every product from all the manufacturers we represent but if the brand is listed we can obtain any of the products in their ranges.”
n For more please visit www.provision-cctv.com
www.falken.us
World Class Security & Protection Services
Police and Security training globally. security operations
1
Full service security ranging from uniformed officers,
personal protection
2
Falken Industries offer full service personal
security products
3
Falken Industries offer specialized security
global services
4
Falken Industries offer global services and operate
armed security guards, and plain
protection services for visiting
products for law enforcement,
in a variety of capacities around
clothes guards. Falken handle
and resident politicians, high net
private security, and government
the globe in all regions of the
all types of retail, industrial, and
worth individuals, dignitaries,
personel.
world and tactical environments.
diplomatic security.
and celebrities.
product and industry news
idis releases a range of dome cameras The new DC-D2233 Series further reduces installation and commissioning time by extending DirectIP™ plugand-play simplicity IDIS has announced a new range of motorized focus and zoom dome cameras expanding its DirectIP™ camera line up. The new full-HD, two mega-pixel cameras allow auto-focus to build upon DirectIP™ plugand-play technology and further reduce installation and commissioning time for installers and integrators. The new IDIS DC-D2233 Series dome cameras are available in five variations. With all models offering the latest vari-focal motorized focus and zoom (MFZ) lenses, extensive features also include true day and night capability, built-in heaters, rugged IP66, and IK10 housing, all making the DC-D2233 Series perfect for both indoor and outdoor installations. The new range also makes DirectIP™ true plug-andplay set up even easier. Zoom and focus are controlled directly from DirectIP™ network video recorders
(NVR), or even remotely, to make fine tuning issues a thing of the past. The result is less implementation and commissioning time as well as the streamlining of routine maintenance. Martin Cowley, Channel Manager at IDIS Europe, commented, “When we launched DirectIP™ we made a promise to make full-HD and network surveillance easier to implement and more cost effective without ever compromising on quality or performance. We’re continuing to building on that promise by extending our DirectIP™ line up and developing off-the-shelf integrations with leading access control systems and security management platforms to ensure a lower cost of ownership.”
n For more visit: www.idisglobal.com
ISM and Wavestore agree technology partnership
The technology partnership established between ISM and Wavestore has resulted in the successful integration of Wavestore video management software (VMS), with ISM’s Genesys2 PSIM security management control room software. The ISM award-winning and patented Genesys2 PSIM software offers a scalable solution for small single sites to multi-sited projects, irrespective of their location. Its ability to integrate products from multiple manufacturers into one holistic platform is enhanced when working alongside Wavestore’s VMS, which is able to deliver video and audio data from any combination of analogue, IP, megapixel, HD, HD-SDI and 360 degree cameras and alarm data from associated sensors. A key benefit of the level of integration achieved between the respective manufacturers’ solutions is that pre and post events can immediately be displayed on an integrated video wall to provide control room operators with instant access to real time events. Security is
14 I February 2015 I IN Security
therefore enhanced with the ability of operators to visually detect and pinpoint breaches across multiple sites.
Seamless integration “The interaction possible between our VMS and Genesys2 software provides systems integrators with an opportunity to capitalise on the projected growth in demand for integrated security management systems by harnessing the benefits that can be achieved from recent advances in IP network based video surveillance technology,” said Chris Williams, Director of Wavestore. “With Wavestore and ISM working in harmony, users can take advantage of the benefits of deploying a PSIM platform to create a highly efficient control room environment which will allow them to effectively monitor and control all systems within their security infrastructure, and when necessary, manage an effective response to any incident, from a single screen.“ n
Digital Barriers ISP contract with major European rail operator
First use of integrated surveillance platform in mainstream transportation sector Digital Barriers, the specialist provider of advanced surveillance technologies, is pleased to announce that it has secured an initial contract with one of Europe’s largest railway operators to supply its Integrated Surveillance Platform (“ISP”) for the protection of train and freight depots. The Group’s ISP solution provides real–time video surveillance and intrusion alerts for remote and inaccessible locations, combining with existing infrastructure and surveillance assets to provide maximum value for money and use of legacy systems. ISP is designed around the Group’s TVI and RDC technologies, which were specifically designed to address the limitations of conventional technologies. In addition to transportation, ISP is used for protection of critical infrastructure – such as oil and gas installations – as well as border protection, maritime security and law enforcement. The Digital Barriers team has been designing surveillance systems for rail and mass–transit networks for more than 20 years, providing us with unique insights into the challenges associated with deploying systems trackside, on rail and transit cars and throughout busy terminals. Our range of solutions includes equipment designed to operate in challenging environments, for long periods of time with uninterrupted performance, for both security and safety (including UK rail accredited solutions). The Group already works with leading international
organisations responsible for operating some of the world’s most notable overland rail, mass–transit, airport and seaports. However, this contract with a leading European railway operator is of particular importance for Digital Barriers, as it is the first sale of its flagship ISP technology into the transportation sector. Valued at approximately €0.28 million, the contract is expected to be delivered in the current financial year and should lead to further sales with the same customer next financial year. Furthermore, success in this contract will serve as a proof point for the potential application of ISP technology across the transportation sector. Zak Doffman, Chief Executive Officer of Digital Barriers commented: “Although modest in revenue terms, this is very significant for Digital Barriers providing an opportunity for us to scale up this initial deployment and to create a proven solution we can market widely across the sector. We have developed solutions to take ISP into the critical infrastructure and commercial sectors, beyond its traditional focus on defence and border protection, and this win in mainstream transportation is an early result of this effort. Our intellectual property is unique and enables a cost–effective means of maintaining real–time coverage of vast and often hostile territories. This competitive edge, evidenced by customer traction, gives Digital Barriers reason for confidence about further use of ISP across multiple customer sectors.”
n For more please visit www.digitalbarriers.com
IN Security I February 2015 I 15
WHERE INNOVATION MATTERS The Next-Generation Scalable Infotainment Platform DYNAMIC AND CUSTOMIZABLE WHILE ENHANCING SAFETY AND SECURITY. Meeting the steadily growing expectations of customers in a seamlessly connected world is one of the greatest tasks for the automotive industry. HARMAN’s Next-Generation Scalable Infotainment Platform offers a new, modular, multicore architecture and a fully open-standard software basis to ultimately fulfill the demands of digital natives.
THE PROBLEM: As modern cars become more and more connected, car hacking is becoming a serious threat. THE SOLUTION: HARMAN’s new platform offers unparalleled multi-layer security through features such as hypervisor-based domain separation and its hybrid architecture.
WWW.HARMAN.COM © 2014 HARMAN International Industries, Incorporated. All rights reserved. Features, specifications and appearance are subject to change without notice. All other company and product names used herein may be trademarks of their respective owners.
act empowers healthcare trust with unified access control Executive Alarms have installed ACT access control equipment on more than 450 doors in a roll-out across multiple hospital sites in Oxfordshire and Buckinghamshire. The project covers facilities ranging from a new £11m centre for adolescents with mental health problems in Headington to a brand-new adult unit with 80 beds in Aylesbury, built at a cost of £40m. The Aylesbury facility, which was constructed by Kier Group, has merged multiple services onto the same site meaning that a wider range of clinicians and health professionals are available to patients. It opened in 2014. The challenge for ACT was replacing the number of different legacy systems in use with a single solution across all properties. After Executive Alarms won the contract in open tender, their designers collaborated with ACT engineers to design and deliver the required solution. The Oxford Health NHS Foundation Trust and the Buckinghamshire Healthcare NHS Trust are using the latest version of ACT’s management software, ACTenterprise. This is a role-based platform with functionality available to users according to their specific needs (e.g. installer, security guard, system administrator), a feature that increases overall security. The software is highly intuitive with the look and feel of a web browser experience. Full integration to ACT’s own VMS solution, ACTviquest provides additional real-time security. Executive Alarms and ACT created a role-specific database structure for the client who were able to populate this from their existing software without any re-keying. This is a feature of ACTenterprise that is of considerable value to customers and can produce rapid return on investment (ROI) during migration. The trusts ran parallel systems initially at small sites while security managers tested the new equipment in the field and found that it exceeded expectations. Jason Thomas, Senior Engineer at Executive Alarms, said: “The key performance indicator here is that ACT have delivered a completely focused solution that allows central administration of previously fragmented systems and enables the client to obtain MIFARE cards themselves in a cost-effective manner. The sites include high, medium and low security inpatient units as well as day care centres. The savings have been widespread and include the cost of the controllers over rival suppliers, a reduction in the number of engineer call-outs and rationalisation of system administration.” The trusts are using ACT’s ACTproMIFARE1040 proximity readers which are suitable for indoor and outdoor installation. They support third-party smart cards and fobs, are housed in a robust polycarbonate housing and have an ingress rating of IP67. Crucially for
this project, they have a flush mounting option which reduces potential for self-harm by factoring out ligature points. The readers are being used with door stations and controllers from the ACTpro range. Richard Huison of ACT said: “The client needed precise tailoring of access levels. Facility managers can put an individual into a group in terms of roles-specific user rights but also fine-tune that person’s unique access privileges. ACT are industry leaders in this functionality.” He continued: “The trusts are also benefiting from alarm management so that if a door is forced or there is a voltage problem, the self-diagnostics in the ACTenterprise software will advise security. Another core offering was embedded interlocking or ‘airlocks’. These are logicbased and intuitive for the user to understand but are not a core feature of our main competitors. ACT has empowered the trusts with an adaptive system that allows interlocking of doors as patient care processes change.” Oxford-based Executive Alarms was founded in 1990 and excels in commercial and residential security across access control, CCTV, intruder alarms and fire protection. Many customers have been with the company since its inception. Executive Alarms is a member of the SSAIB and offers a 24/7/365 call-out service with all its engineers being CRB checked. The company is skilled in responding with appropriate system designs for listed building projects.
n For further information please visit www.act.eu
IN Security I February 2015 I 17
product and industry news
Home Security startup Cocoon enters London incubator Breed Reply UK developer of Home Security devices Cocoon is among the first start-ups selected by Breed Reply incubator in London. Cocoon is a UK based start-up that has created a smart home security system that utilises SUBSOUND™ technology to sense unusual activity throughout the whole home, without the need for any additional sensors or professional installation. It avoids false alarms by learning what’s normal for home, only sending alerts and high quality video straight to your smartphone when something unusual happens - via the Cocoon mobile app. Cocoon received a London Design Award and has been listed in Forbes as one of the top new businesses to watch in 2015. Beside Cocoon, the two other startups are: BrainControl (Healthcare) and Greeniant (Energy). Breed Reply’s advanced incubator, funds and
18 I February 2015 I IN Security
supports the development of start-ups active in the Internet of Things (IoT) space in Europe and the USA. Breed Reply’s initiative launched in October 2014, aimed at identifying the most innovative ideas in IoT and received over 130 applications in one month, with start-ups coming from across the world and covering the most innovative sectors, such as Health, Energy, Smart Home, Fitness&Wellness, Transportation and Smart Manufacturing. Term Sheets have been signed with three start-ups in the sectors of Health, Smart Home and Energy. The investment that consists of a total amount of 2.435.000 pounds for shareholding varying between 20% and 70% is part of Reply’s development strategy on the Internet of Things and Wearable Technologies.
n For more information please visit http://cocoon.life
Self-Service Charging Lockers The Diplomat™ range of self-service charging lockers securely store and safely charge laptops, netbooks or tablets in individual user bays. The Diplomat™ LMS provides students and teachers with individual access to securely stored and charged laptops netbooks or tablets using our intelligent access control system, which links directly into your existing Library Management System. The locker enables librarians to track and monitor equipment use and save resources, whilst providing students with greater freedom and an improved user experience. Students take ownership of the loaned device which leads to reduced damage and loss of equipment.
Functionality • Individual access, allocation and deployment of securely stored and safely charged laptops or tablets • Simultaneous charging of all devices • Always loans the best charged device • Provides 24/7 access to IT equipment • Students can be identified by RFID, barcode, magnetic stripe or biometrics • 19” touchscreen user interface - fully customisable • Unlimited number of lockers can be deployed • Network compatible for Data Transfer (optional)
Visit www.diplomatlocker.com to view our case studies
Call now for a free onsite demo
0800 130 3456
sales@lapsafe.com
Exhibition preview
Preview
Counter Terror Exhibition 2015
C
ounter Terror Expo (CTX), the leading international event dedicated to mitigating the threat of terrorism, takes place at Olympia, London on 21 and 22 April 2015. Now in its seventh year, the show provides a showcase for a broad spectrum of the latest technologies, products and equipment to assist law enforcement agencies around the globe in the fight against terrorism and organised crime. Equally important, it is a forum where leading authorities from the operational, procurement and supply sectors meet to discuss the issues topping the security agenda. Counter Terror Expo will provide an insight into what makes the security industry tick, showcase the latest security solutions appropriate for turning threat mitigation strategy in to reality, and address the problems and challenges facing everyone involved in the development and preparation chain. Conferences provide latest intelligence CCTV and surveillance levels have been a key issue in the UK media recently, with many unhappy about the levels of ‘snooping’ carried out by the intelligence services, police and GCHQ. However, with the advent of ‘lone wolf’ terror attacks as well as organised groups plotting, the intelligence picture has never been more important. Security and intelligence services need cutting-edge technology and an up-to-date understanding of the situation as lives are at risk. Counter Terror Expo has a reputation for its delivery of
20 I February 2015 I IN Security
insight, analysis, and perspective on the range of threats faced. A new edition to this year’s Expo, the World Counter Terror Congress will join the acclaimed and Critical National Infrastructure stream, and provide an incisive and decisive conference programme. CTX will also host several must-attend conferences on the exhibition floor, including Cyber Threat Intelligence and Transport Security Live. This conference will bring together over 150 internationally recognised experts in the field of counter terrorism to debate the issues we face, define operational strategies, and to help shape future policy within a single, secure environment. World Counter Terror Congress Having sufficient intelligence to address security threats in the current, increasingly
hostile climate is of paramount importance to governments and security agencies worldwide. CTX provides a platform to identify issues and discuss solutions, exemplified by the World CounterTerror Congress. Nearly 200 internationally recognised experts in counter terrorism will gather at the World Counter Terror Congress to debate the threats we face, define operational strategies and to help shape future policy. Confirmed speakers include Charles Farr, Director of the Office for Security and Counter-Terrorism (OSCT) at the Home Office, and Sir Malcolm Rifkind MP, Former Foreign Secretary and Chairman of the Intelligence & Security Committee of Parliament who will lead debate on the extent to which the UK security services can protect the country from terrorism.
They will be joined by Mark Rowley, Head of Specialist Operations and Assistant Commissioner, Metropolitan Police; Dr Jamie Shea, Deputy ASG, Emerging Security Challenges Division, NATO and Dr Brooke Rogers, Reader in Risk & Terror, King’s College London. AC Rowley said: “I am very pleased to be invited to speak at the World Counter Terrorism Congress. Recent terrorist attacks in a number of different countries have reinforced the need to raise and maintain public awareness levels. As well as needing to remain alert, it is imperative that law enforcement organisations, business and the public understand the nature of the threat and what they should be doing about it. Good preparation is a way of reducing the impact of terrorist incidents - and helps prevent them from happening in the first place”. The Congress offers a unique opportunity for government, the emergency services, academics, technology providers and vendors to unveil new developments in the mitigation of security threats. Critical National Infrastructure The threat to infrastructure from terrorist groups has been
a constant, but growing issue. From attacks on oil/petrochemical facilities, as seen in Algeria, Nigeria and Iraq, to potential incidents at nuclear power stations, the sector presents a range of possible vulnerabilities. The Critical National Infrastructure conference will showcase how best to mitigate the risk to, and guarantee the safety and resilience of, critical physical and information assets and networks. Internationally recognised experts in infrastructure protection will gather at the conference to focus on how to strengthen our threat awareness, emergency preparedness and response capabilities. The CNI conference will bring together owners and operators, policy makers, practitioners and key supply chains to deliver insights into infrastructure protection and will unveil new developments in security and resilience. Participants will include Francis Morgan, Security Director, Heathrow Airport; Mark Prouse, Head of Security & Resilience Policy & Response, Department of Energy & Climate Change; Graham Wright, CISO & Head of Digital, National Grid; and
Thomas Wuchte, Head of AntiTerrorism Issues, Action Against Terrorism Unit, Organisation for Security Co-operation in Europe. Cyber Threat Intelligence The cyber terror threat has become more sophisticated and more deadly. The advent of social and mobile networks, SCADA and the internet has raised the stakes even further. The Cyber Threat Intelligence conference stream at CTX will analyse global cyber security threats and best practice in mitigating them. New technology is at the heart of the security environment. For instance, the growth in advanced encryption technology is dramatically impacting how the society acts to defend against completely new forms of cyber attacks, requiring us to increase our understanding of processes and methods to protect and secure our electronic communications. Cyber Threat Intelligence brings together all those who must prevent or prepare for cyber terrorism or cyber-crime: UK and international governments, policing and security organisations; academic experts; businesses and professional associations. The conference g
IN Security I February 2015 I 21
Exhibition preview
continued
will also unveil new developments in cyber security. Confirmed speakers include Dr Allison Wylde, International Commission on Standards, ASIS International; Steve Durbin, Managing Director, Information Security Forum; John Lyons, CEO, International Cyber Security Protection Alliance (ICSPA); and Laurent Olmedo, Programme Director, Global Security, CEA. Transport Security Live Transport networks are a regular target for terrorist groups’ plans and attacks. High profile, dramatic and utterly devastating, the 9/11 aircraft hijackings and later, the Madrid Atocha and London Underground train bombings, will be marked in history as events that changed the world. The global terror threat is high and transport networks are favoured target. Transport Security Live at CTX will showcase international case studies and the latest developments in protecting transport networks, transport hubs and passengers. Transport Security Live brings together the key stakeholders from UK and international governments and security organisations, aviation, rail, secure transport, supply chain and major events sectors to provide a guide to best practice in transport security. It also offers an opportunity to unveil new developments in transport security. Key addresses will be given from the UK’s Civil Aviation Authority, the Department for Transport, and industry players such as Boeing.
22 I February 2015 I IN Security
A global exhibition The growing awareness of safety and security is highlighted by the diverse and expanding security technology innovations that will be showcased at CTX 2015. CTX is expected to attract thousands of buyers and specifiers from government, military, policing, emergency services and private security. Mitigating terror threats is an international issue and the CTX exhibition will be a global gathering with visitors expected from over 100 countries. Advances in systems for facial recognition, geospatial data analysis, screening post for explosives, mobile computing and communications and thermal imaging will all be on display, together with innovations in CBRN vaccine and decontaminants, interactive mapping, nanotech development and infrared surveillance. Exhibitors include CNI Guard, Cognitec Systems, Emergent Biosolutions. Helyx SIS, Garrett Metal Detectors, HGH Infrared Systems, NDI
Technologies and Ultra Electronics Maritime Systems. Over 300 exhibiting companies, from leading UK and international primes to specialist SMEs will also be exhibiting their latest technology and equipment for law enforcement and security personnel. Some of the leading and innovative exhibitors will include Winkelmann UK, Tactical Electronics LLC, Alford Technologies, Digital RF and Chemring EOD which manufactures Explosive Ordnance Disposal and CounterIED equipment; Geoquip Worldwide, Terrafix Ltd and Neosoft, producers of secure communications equipment; Counter Measure Systems which specialises in police and special forces equipment and training; ICM X-Ray which produces groundbreaking miniaturised portable X-ray equipment; and RFA Security, providers of explosive detection and sniffer dogs. Visit www.counterterrorexpo.com n
Club Car takes to the streets
Club Car is now street legal in every country in the EU. Club Car’s electric utility vehicles offer an attractive alternative to traditional petrol-powered vehicles. For a start there’s no petrol costs – and zero emissions. Club Car’s vehicles have the power to perform numerous campus tasks, from mail delivery to security and maintenance. Want to know more? Contact your Club Car representative today.
street legal www.clubcar.com info_esa@clubcar.com (+44) 777 180 5463
CCTV
Full steam ahead Panomera® watches over trains as marshalling yards in South Africa are equipped with multifocal sensor technology Trains of the South African public transport operator PRASA are serviced and prepared for their next deployment at the marshalling yards in Braamfontein and Wolmerton. To enable the best possible surveillance of the expansive grounds, which are sometimes partly hidden from view as well, the multifocal sensor technology Panomera® by Dallmeier is being used.
T
he trains of the public transport operator PRASA (Passenger Rail Agency of South Africa) travel long distances every day, bringing thousands of commuters to their places of work and back again. Afterwards, the trains are washed, serviced and parked overnight at the marshalling yards and switchyards.
Combatting theft and vandalism For most of the trains, night-time is not really quiet, for acts of vandalism are frequent: Trains are wilfully damaged or sprayed
24 I February 2015 I IN Security
with graffiti. Theft is also a serious problem, as Mathew Smith, Senior Technical Engineer at SIYANGENA, who planned and installed the new video system together with Dallmeier, explains: “The thieves are really brazen and even remove seats from the trains.” In the past, these problems could not be solved with conventional video technology. “The areas to be monitored are huge, and we cannot set up masts there for the cameras. There are only a very few points at which cameras can be installed – and for conventional HD
or megapixel cameras the areas are far too large for us to be able to obtain suitable recordings,” says Mathew Smith. PRASA found the solution in the multifocal sensor technology Panomera® by Dallmeier. Contrary to conventional cameras, Panomera® uses several lenses with different focal distances. This makes it possible to monitor a huge surface from only one installation point – and this with the highest detail resolution even in the more distant areas. “With this new sensor concept more
“The performance capacity of the Panomera® systems is simply unbelievable” distant objects and persons can be shown with the same resolution as objects in the foreground,” explains EP Smit, Sales Manager for South Africa at Dallmeier and co-responsible person for the project planning at PRASA. The fact that this new technology has already been patented is proof of its uniqueness.
Keeping an eye on over 750,000 square metres “Depending on the field of use, there are different Panomera® models that we then adapt individually to the customer’s requirements,” adds EP Smit. For the persons responsible for security a comprehensive view of the entire facility was important. Therefore, four Panomera® systems, each supplying a 90° angle of vision, were cascaded to enable a panoramic view of 360°. In Braamfontein, this makes it possible to monitor a gigantic area of 400,000 m² and in Wolmerton over 354,000 m², in each case from only one installation point!
To make it possible to adequately monitor also areas that are hidden from view between trains, so-called “long-distance” Panomera® models are used. These cameras can cover the long distances between trains, sometimes up to 200 metres, with the highest resolution. Chris Metelerkamp, Project Director at SIYANGENA, is satisfied: “In this way, not only do we have high-resolution and court-admissible video material available to us with which we shall be able to identify offenders from now on. The new cameras are also very helpful for health & safety measures. Now we always know what is happening on the grounds and between the trains.”
Intuitive operation The video system is operated through the Panomera® viewer and with the management system SeMSy®. “A great advantage of the Panomera® is that any number of operators can work with the system simultaneously,” explains Mathew Smith. For contrary to PTZ cameras, which can only be operated
by one person at a time and then only that specific area is recorded, Panomera® continuously records the total image. “Each operator can navigate and zoom freely within the image fully independently of the other operators, regardless of whether in live or playback mode,” says Smith.
Overall satisfaction “We have now been working with Dallmeier and PRASA for quite some time; all PRASA commuter railway stations are also equipped with Dallmeier technology,” Mathew Smith says contentedly. And he adds: “The performance capacity of the Panomera® systems is simply unbelievable.” Dallmeier has at its disposal more than 30 years of experience in transmission, recording as well as picture processing technology and is an outstanding pioneer of CCTV/IP solutions worldwide. This profound knowledge is used in the development of intelligent software and high quality recorder and camera technologies enabling g
IN Security I February 2015 I 25
“This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry”
Dallmeier to not only offer standalone systems, but complete network solutions up to largescale projects with perfectly integrated components. Right from the beginning the company always focused on own innovative developments and highest quality and reliability. Dallmeier is the only manufacturer in Germany that develops and manufactures all components on its own. This includes the entire product range, from cameras to picture storage and transmission to intelligent video analysis and even individually adjusted management systems. Quality made by Dallmeier, made in Germany! Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DVR for example, which introduced digital recording to the
26 I February 2015 I IN Security
entire CCTV industry, came from Dallmeier. The multifocal sensor system Panomera® will have a similarly groundbreaking effect: This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security
industry. This and the extensive experience in the CCTV and IP field have led to a top position in the international market for digital video surveillance systems. n For further information
please visit www.dallmeier.com
2015/2016 2015/2016 2015/2016 PROTECTION AND SECURITY PROTECTION PROTECTION AND AND SECURITY EXHIBITIONS IN SECURITY EXHIBITIONS EXHIBITIONS IN IN FAST-DEVELOPING MARKETS FAST-DEVELOPING FAST-DEVELOPING MARKETSMARKETS
AZERBAIJAN | KAZAKHSTAN | RUSSIA | UKRAINE | UZBEKISTAN
AZERBAIJAN AZERBAIJAN | KAZAKHSTAN | KAZAKHSTAN | RUSSIA | | UKRAINE RUSSIA | | UKRAINE UZBEKISTAN | UZBEKISTAN SIPS Siberia 2015 24th Siberian International SIPS Siberia 2015 SIPS Siberia 2015 Fire Fighting, Emergency and Rescue Exhibition 24th Siberian 24th International Siberian International 23–25 September 2015 • Novosibirsk, Russia Fire Fighting, Fire Emergency Fighting, and Emergency Rescue Exhibition and Rescue Exhibition 23–25 September 23–25 2015 September • Novosibirsk, 2015 • Russia Novosibirsk, Russia CAIPS 2015
SIPS Siberia 2015 24-я Сибирская международная выставка SIPS Siberia 2015 SIPS Siberia 2015 «Охрана и пожарная безопасность» 24-я Сибирская 24-я международная Сибирская международная выставка выставка 23–25 сентября 2015 • Новосибирск, Россия «Охрана и пожарная «Охрана безопасность» и пожарная безопасность» 23–25 сентября 23–25 2015сентября • Новосибирск, 2015 • Новосибирск, Россия Россия CAIPS 2015
8th Caspian International CIPS Caspian CIPS 2015Caspian 2015 Protection, Security and Rescue Exhibition 8th Caspian International 8th Caspian International 21–24 October 2015 • Baku, Azerbaijan Protection, Security Protection, and Rescue SecurityExhibition and Rescue Exhibition 21–24 2015 October • Baku,2015 Azerbaijan • Baku, Azerbaijan SFITEXOctober 2015 21–24
8-я Каспийская международная выставка CIPS Caspian CIPS 2015Caspian 2015 «Охрана, безопасность и средства спасения» 8-я Каспийская 8-я международная Каспийская международная выставка выставка 21–24 октября 2015 • Баку, Азербайджан «Охрана, безопасность «Охрана, и безопасность средства спасения» и средства спасения» 21–24 2015 октября • Баку, Азербайджан 2015 • Баку, Азербайджан SFITEXоктября 2015 21–24
8th Central Asian International CAIPS 2015 CAIPS 2015 Protection, Security and Fire Safety Exhibition 8th Central Asian 8th Central International Asian International 20–22 October 2015 • Tashkent, Uzbekistan Protection, Security Protection, and Fire Security Safety and Exhibition Fire Safety Exhibition 20–22 October 20–22 2015 October • Tashkent, 2015Uzbekistan • Tashkent, Uzbekistan CIPS Caspian 2015
24th Saint Petersburg International SFITEX 2015 SFITEX 2015 Security and Fire Exhibition 24th Saint Petersburg 24th Saint International Petersburg International 10 –12 November 2015 • St. Petersburg, Russia Security and Fire Security Exhibition and Fire Exhibition 10 –12 November 10 –12 2015 November • St. Petersburg, 2015 • St.Russia Petersburg, Russia SIPS South Russia 2016 7th South Russian International SIPS South Russia SIPS South 2016 Russia 2016 Protection and Security Exhibition 7th South Russian 7th South International Russian International 1–4 March 2016 • Krasnodar, Russia Protection and Protection Security Exhibition and Security Exhibition 1–4 2016 1–4 •March Krasnodar, 2016 Russia • Krasnodar, Russia MIPSMarch Moscow 2016
22nd Moscow International MIPS MoscowMIPS 2016Moscow 2016 Protection and Security Exhibition 22nd Moscow22nd International Moscow International 14 – 17 March 2016 • Moscow, Russia Protection and Protection Security Exhibition and Security Exhibition 14 – 17 March 14 2016 – 17•March Moscow, 2016 Russia • Moscow, Russia AIPS Almaty 2016 6th Almaty International AIPS Almaty 2016 AIPS Almaty 2016 Protection, Security, Rescue 6th Almaty International 6th Almaty International and Fire Safety Exhibition Protection, Security, Protection, Rescue Security, Rescue March 2016 • Almaty, Kazakhstan and Fire Safety and Exhibition Fire Safety Exhibition March 2016 •March Almaty, 2016 Kazakhstan • Almaty, Kazakhstan KIPS Kyiv 2016 6th Kyiv International Protection KIPS Kyiv 2016 KIPS Kyiv 2016 and Security Exhibition 6th Kyiv International 6th Kyiv Protection International Protection March 2016 • Kyiv, Ukraine and Security Exhibition and Security Exhibition March 2016 •March Kyiv, Ukraine 2016 • Kyiv, Ukraine
8-я Центрально-азиатская международная выставка CAIPS 2015 CAIPS 2015 «Охрана, безопасность и противопожарная защита» 8-я Центрально-азиатская 8-я Центрально-азиатская международная международная выставка выстав 20–22 октября 2015 • Ташкент, Узбекистан «Охрана, безопасность «Охрана, и безопасность противопожарная и противопожарная защита» защит 20–22 октября20–22 2015 октября • Ташкент, 2015 Узбекистан • Ташкент, Узбекистан CIPS Caspian 2015
24-я Международная выставка и форум SFITEX 2015 SFITEX 2015 «Охрана и безопасность – SFITEX» 24-я Международная 24-я Международная выставка и форум выставка и форум 10 –12 ноября 2015 • Санкт-Петербург, Россия «Охрана и безопасность «Охрана и – безопасность SFITEX» – SFITEX» 10 –12 ноября 10 2015 –122016 •ноября Санкт-Петербург, 2015 • Санкт-Петербург, Россия Россия SIPS South Russia
7-я Международная выставка «Охрана, безопасность SIPS South Russia SIPS South 2016 Russia 2016 и противопожарная защита» 7-я Международная 7-я Международная выставка «Охрана, выставка безопасность «Охрана, безопасно 1–4 марта 2016 • Краснодар, Россия и противопожарная и противопожарная защита» защита» 1–4 2016 1–4 • марта Краснодар, 2016 Россия • Краснодар, Россия MIPSмарта Moscow 2016
22-я Московская международная выставка MIPS MoscowMIPS 2016Moscow 2016 «Охрана, безопасность и противопожарная защита» 22-я Московская 22-я международная Московская международная выставка выставка 14–17 марта 2016 • Москва, Россия «Охрана, безопасность «Охрана, и безопасность противопожарная и противопожарная защита» защит 14–17 марта 2016 2016 14–17 • марта Москва, 2016 Россия • Москва, Россия AIPS Almaty
6-я Казахстанская международная выставка AIPS Almaty 2016 AIPS Almaty 2016 «Охрана, безопасность, средства спасения 6-я Казахстанская 6-я Казахстанская международная международная выставка выставка и противопожарная защита» «Охрана, безопасность, «Охрана, безопасность, средства спасения средства спасения Март 2016 • Алматы, Казахстан и противопожарная и противопожарная защита» защита» Март Kyiv 20162016 • Алматы, Март 2016 Казахстан • Алматы, Казахстан KIPS
6-я Киевская международная выставка KIPS Kyiv 2016 KIPS Kyiv 2016 «Охрана, безопасность и противопожарная защита» 6-я Киевская международная 6-я Киевская международная выставка выставка Март 2016 • Киев, Украина «Охрана, безопасность «Охрана, ибезопасность противопожарная и противопожарная защита» защит Март 2016 • Киев, Март Украина 2016 • Киев, Украина
For more information please contact: Agnius Kazlauskas For more information For moreplease information contact: please contact: T: +44 (0)20 7596 5064 Agnius Kazlauskas Agnius Kazlauskas E: security@ite-events.com T: +44 (0)20 7596 T: +44 5064 (0)20 7596 5064 E: security@ite-events.com E: security@ite-events.com
www.securityshows.com www.securityshows.com www.securityshows.com
IP security
Benefits of IP security Georgia, USA School District migrates to IP-based security solution Cherokee County School District in Georgia decided to migrate its existing security over to a hybrid IP solution with victor unified management system from American Dynamics at the center of the operation.
T
Introduction he Cherokee County School District (CCSD) has grown tremendously over the past 10 years, adding seven elementary schools, three middle schools and two high schools to its roster. The public schools in Cherokee County are ranked among the top in Georgia, boasting the highest average SAT scores in the statefor 2012. Together, the eighth largest school system in Georgia comprises 57 schools and centers, including
28 I February 2015 I IN Security
24 elementary schools, seven middle schools, six high schools, three preschool centers, central offices and warehouses. With approximately 40,000 students and 4,500 staff to protect, the district’s public safety department of 10 takes its job very seriously.
Challenges Fifteen years ago, Superintendent of the CCSD, Dr. Frank Petruzielo, created the district’s public safety department. At the time, the district had no intrusion detection,
unmonitored fire alarms, and a handful of unmonitored, individual cameras purchased by individual schools. Mark Kissel, chief of police for the school district and his team, conducted site surveys and assessments to determine what the district needed to move forward with a comprehensive security plan. With no state funding for physical security equipment, CCSD needed to roll out its security plan in careful steps, prioritizing its needs and most at-risk areas. Initial security
“If you are going to have issues, they are most likely to happen in places where groups of students form” included cameras at the district’s high schools and middle schools. Over the last decade and a half, the district’s security has evolved to access control, alarm systems and surveillance to keep its students, employees and community safe. “It’s nice to say that you have the bells and whistles in a security system, but the reality has to be based on need as well as what the community is willing to fund,” Kissel said. After the school shootings in Newtown, Conn., made headlines, Dr. Petruzielo put together an ad hoc safety and security committee made up of district employees, public safety staff and community members to re-evaluate the district’s security needs and note any room for improvement. For CCSD, positioning cameras in areas where students convene such as cafeterias, playgrounds, gymnasiums, and other outdoor areas, is a top priority. For schools that have a main road or tree-lined area facing entries, surveillance is needed in those areas. “Our main focus is monitoring the flow of traffic and places where students congregate. Parent and bus access points, ingress and egress, and interior hallwaysespecially in the high schools-is important. If you are going to have issues, they are most likely to happen in places where groups of students form,” Kissel relayed. The safety and security committee determined that the district lacked cameras in 13 elementary schools. Ultimately, the district decided to install new IP cameras and equipment in its high schools and middle schools, while transitioning analog cameras from those facilities over to the district’s elementary schools. Previously, the school district had been managing its video systems with Intellex, Network Client and Policy Manager. To accomplish its goals, the CCSD needed a hybrid solution that would grow with the organization.
The school district turned to its integrator Tyco Integrated Security, which has been a trusted partner of the CCSD going back 15 yearsthe same time that Kissel came to his position in the district and the superintendent created the district’s public safety department.
Solution CCSD began its journey by working with Intelligent Marketing, a manufacturer representative for American Dynamics. Intelligent Marketing’s sales engineers were made aware of the challenges to incorporate IP video into the CCTV system at CCSD and recommended that CCSD migrated to IP by initially installing victor unified management system, VideoEdge hybrid recorders and American Dynamics’ Illustra cameras. So far, more than 30 IP cameras have
been installed in the district’s high schools and middle schools, and 13 more schools are in the middle of deployment. The VideoEdge hybrid recorders allow CCSD to continue handling its old infrastructure of analog cameras, as well as its new IP cameras. “The victor client is backwards compatible, allowing them to migrate from their Intellex system and really capitalize on the capabilities of a digital platform,” explained Gary L. Royal, senior commercial account executive at Tyco Integrated Security. “There is no other solution on the market today that allows an end user to maintain and incorporate their current DVR infrastructure while moving into a single Client platform IP solution,” concurred Scott Bryan, Business Development Manager, Intelligent Marketing. g
IN Security I February 2015 I 29
“victor allows the end user to decide when it’s time to replace older hardware, maximizing their return on investment.” Now, with victor and VideoEdge Hybrid Recorders in place, CCSD’s public safety officers have faster search capabilities, including Smart Search for searching through days or weeks of video within seconds. “We get much more information in a faster sequence than before., and have four times the throughput,” Kissel said. Another advancement for the school district, according to Kissel, is better image quality and remote capabilities. Wider viewing angles with Illustra IP cameras allow public safety officers to see more and adjust less, viewing video at full 1080p and 30 images per second resolution. Real-time auto focus, 20X optical zoom, wide dynamic range and PTZ capability that moves at 512-degrees per second, have not gone unnoticed with the school district staff either. “Now that we are in the IP world, not only is everything better in terms of clarity, but the ability to digitally enhance what we are trying to look at is significantly better than with our old infrastructure,” Kissel said. In addition, the security management platform allows public safety staff to view live video
30 I February 2015 I IN Security
remotely from an iPhone or other mobile devices. This gives them access to important video while they are patrolling anywhere on a campus without time delays or other problems. This improvement is significant to Kissel and his team. They have no central security office to view the school district’s surveillance, but have the ability to view video remotely and at individual locations. “We had an ability to view video remotely under our old system, but it was sluggish on the operational side,” Kissel explained. “If we wanted to adjust or move a camera left to right, there were time delays. With the IP camera connectivity platform, it’s a lot faster, the video is a lot cleaner, and our ability to zoom in with clarity has just put us in great shape.” Faster remote operations and clearer video are not the only benefits that CCSD has seen since it began its migration to IP. With the cameras and new digital platform, security staff also can troubleshoot remotely, eliminating the need (and cost) for in-person adjustments and service from technicians.
The Future With an eye on the most costeffective solution, Kissel and his team specifically chose a hybrid platform that would allow
the school district to grow and upgrade its security system without replacing all of its existing infrastructure at once. As its older, analog cameras now in place at the district’s elementary schools start to fail, they have the option to replace them on an as-needed basis. “Some of our older recorders are still capable and functional right now,” Kissel said. “As time goes on and these recorders die out, we will replace them with new hybrids. It gives us the greatest potential for growing with the solution.” Once CCSD is finished upgrading the rest of its high school and middle school locations, it can look forward to using more features and capabilities of the system for a seamless, integrated platform across all its facilities. One of the benefits of the victor unified management platform, is its ability to integrate with other systems across facilities, including access control and fire systems. Kissel said that as the staff becomes more familiar with the security platform and its capabilities, they will look into integrating the solution with its other operations in the next year or two. n
Fostering Innovation for Global Security Challenges 14 - 16 APRIL 2015 Sands Expo & Convention Centre Singapore www.interpol-world.com BO
RD ER
M
A
N
A
SU
G
PP
EM
LY
EN
T
CH
A
C
IN
S EC
SAFE
E YB
RS
E
R CU
ITY
UR
CITIES
IT Y
WHAT TO EXPECT EXHIBITION SPACE
27,000 SQM
EXPECTED NUMBER OF EXHIBITING COMPANIES
250
450
EXPECTED NUMBER OF TRADE VISITORS
KEY DECISION-MAKERS FROM INTERPOL’S
8,000
190
MEMBER COUNTRIES Contact us TODAY at +65 6389 6614 or sales@interpol-world.com
Event Owner
Supported By
Supporting Knowledge Partner
Held In
Managed By
data security
A stitch in time Ten Tips to Avoid Massive Data Breaches – Don’t be the next Sony or Anthem by Benny Czarny, Founder and CEO OPSWAT
“In order to protect against targeted email attacks, a multi-layered approach is recommended”
W
ith Sony recently setting aside $15M to investigate the reasons for and remediate the damage caused by last year’s data breach, many of our customers—from large enterprises to small business—are wondering what they need to do make sure they aren’t the next big data breach headline. Another example is the recent Anthem breach. Though this is now said to be the largest data breach in the health care industry, unfortunately it is unlikely to be the last. No details are available yet about how the breach at Anthem occurred, however from other breaches we have learnt that often the security is breached by a targeted spear phishing email attack that is used to plant malware or to entice the recipient to provide credentials that can then be used to gain access to systems. The breach could occur at the company itself, but we have also seen breaches where the actual attack occurred at a supplier through which access was gained to the company’s procurement system.
Anthem should be commended for notifying the FBI so promptly about the breach. Fast and appropriate action could mean that the attackers have not yet been able to cover their tracks. In order to protect against targeted email attacks, a multilayered approach is recommended. Conventional email security systems need to be reinforced by implementing an antimalware solution that uses multiple antivirus engines to scan email attachments, greatly increasing the likelihood that malware is detected, as well as countering threats targeted to bypass a specific engine’s detection capabilities. Document sanitization, where files are converted to a different format and any embedded scripts are removed, acts as another security layer by defusing any possible hidden threats in email attachments that might go undetected by antivirus engines. Employee training on how to detect phishing attacks is also highly recommended, although it is important to be aware that spear phishing attacks are becoming more
and more sophisticated and can fool even the most tech-savvy employees. Unfortunately although most companies have security technology in place that can detect known viruses and phishing attempts, targeted spear phishing attacks remain difficult to spot since the emails are sent to a small number of individuals, often using social engineering to make the emails seem legitimate, even to techsavvy employees. Companies need to reinforce their existing email security systems by implementing more layers of protection. For instance by using multiple antimalware engines to scan email attachments, the detection rate is significantly increased and threats that are targeted towards specific antivirus engines can be countered. Since spear phishing attacks often make use of email attachments that are laced with malware that exploits zero-day vulnerabilities that may not yet be known, it is also important to sanitize email attachments by converting files to another format to diffuse any possible embedded threats. g
IN Security I February 2015 I 33
The good news is that most data breaches can be prevented by a common sense approach, coupled with some key IT security adjustments. 1. Employee security training is an absolute necessity. I cannot emphasize this point enough. Even the most sophisticated security systems can be compromised by human error. The Sony breach started with phishing attacks. People still use USB devices from unknown sources, which is allegedly how the Stuxnet worm was delivered. Your network is only as safe as your most gullible employee. 2. Access to executable files should be limited to those who need them to complete their duties. Many threats are borne via selfextracting files, therefore limiting the number of employees who are allowed to receive this file type limits your exposure. Your IT department absolutely needs the ability to work with executable files. Bob in accounting? Not so much! 3. MSOffice documents and PDFs are common attack vectors. Vulnerabilities are identified in MSOffice and Adobe Reader on a regular basis. While patches are typically released very quickly, if the patches are not applied in a timely fashion the vulnerability can still be exploited. As an everyday
34 I February 2015 I IN Security
precaution, document sanitization is recommended to remove embedded threats in documents. 4. Data workflow audits are essential. Data can enter your organization through many different points—email, FTP, external memory device, etc. Identifying your organization’s entry points and taking steps to secure them is a critical step in avoiding data breaches. At a minimum, scanning incoming and outgoing email attachments for viruses and threats and implementing a secure file transfer solution should be considered. 5. S tore sensitive data in separate locations. Simple data segregation could have mitigated the impact of the Sony breach. The hack exposed both internal communications and unreleased video files. Had the videos and emails been stored on two separate systems some of the damages may have been prevented. 6. I nternal and external penetration tests are critical. Internal testing is valuable tool, but hiring an outside party to attempt to breach your network will identify security holes your team may have missed. 7. Keep your security architecture confidential. You may be excited about your innovative networking solution or new cloud-based storage system, but think
twice about making any of that information public! The more your attacker knows about your systems the easier it is for them to tailor the attack. 8. Remember that traffic generated internally to your security system may still be suspect. The Sony malware connected to an internal security system to impersonate legitimate traffic to disguise its malicious nature. 9. Multilayer defense is needed. I like to describe defense in depth by comparing it to the defense systems you might see at a castle; it could be defended by a large stone wall, followed by a deep moat, followed by a draw bridge, followed by an Iron Gate, etc. A single layer of defense is not sufficient for your data—it must be protected by multiple systems working in parallel. That way if one layer of defense is breached your data is not exposed. 10. Finding your weakest security link is your top priority. Every office has one, and it will vary wildly from organization to organization. It might be that employee with their passwords taped to their monitor. It might be the deprecated Linux server everyone seems to have forgotten about. You might not be looking for those weak links—but rest assured that cyber attackers are. The question is: Who will find them first? n
st Boo an k d yo to u da r y!
21-22 APRIL 2015 | OLYMPIA LONDON
ORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTER
The leading international event dedicated to mitigating the threat of terrorism • • • •
Meet 8,500+ attendees from Europe and globally Showcase your products and services to visitors with real purchasing power Meet new customers and further establish relationships with existing ones Launch new products and services on a global platform
Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: jay.clements@clarionevents.com T: +44 (0) 20 7384 7837 E: jenna.peaty@clarionevents.com
WWW.COUNTERTERROREXPO.COM/INSECURITY Co-located with
Follow us on
Organised by
staff screening
Screening... Debunking the Myths By Justin Bentley, Chairman of the BSI Drafting Group for BS 7858
W
ith the pending enactment of a little known clause in the Data Protection Act, yet again conflicting advice about screening has been circulating and confusing those whose role is to protect businesses from employing errant staff. The views of business owners when discussing screening varies from pointless paper chasing wasting company resources to a vital part of the service provision, and these opinions when cascaded down can impinge on the effectiveness of the screening. The first mistake occurs when you question the value of the process, based on the fact that
36 I February 2015 I IN Security
a large number of screening files do not turn up anything untoward and the applicants are all employed. This does not mean that it has been a waste of time, it could be that undesirable applicants have been deterred when they have found out that they would be screened and have withdrawn themselves from the application process. It could also be that there have not been any undesirable applicants yet, but that doesn’t mean that one wouldn’t apply in the future. A simple security comparison is if a client suggested terminating a patrolling contract as a waste of time, based on no break ins or damage occurring, you would be describing it as effective prevention
and explaining the risks of what could occur without it. Screening of staff is also no guarantee that an employee will never do something that could affect the reputation of your company, e.g. taking or allowing the taking of a client’s assets, however what it does do is minimise the risk by exclusion where an applicant’s recent history clearly shows that there is a higher likelihood if that individual was given the opportunity. Companies are familiar with conducting risk assessments searching for slip and trip hazards, screening should be considered as being a risk assessment on employing a given individual.
“There is no definitive list of evidence, as such a document would be larger than Encyclopaedia Britannica!” British Standard 7858 provides a screening process used by the security industry and other industries as tried and tested best practice, and has been written by practitioners with real life experience. Where some screening staff struggle is that the document is extremely generic, and does not detail specific scenarios or how to interpret the information obtained. The following are some of the frequently misunderstood areas.
History The preferred evidence for confirming employment has always been written confirmation direct from the previous employer, however with no legal obligation for the previous employer to respond, or the previous employer sometimes not existing any more, frequently screening staff are having to ask applicants for alternative evidence. BS 7858 does give examples of some documents which could be used as alternative evidence, however the key word is examples and technically there is an infinite number of
possibilities as to what could be used as evidence. This principle also applies to other periods during the time that is required to be covered, whether that is time spent unemployed, travelling, caring for family, etc. There is no definitive list of evidence, as such a document would be larger than Encyclopaedia Britannica! As far as what is acceptable, the screening officer should have sufficient information to be able to satisfy both themselves and others that the applicant has given an honest account of what they have been doing in the most recent years up to applying for the job. Whilst it is unlikely that this scenario would occur, think along the lines of if you had to defend in court the decision to employ somebody, would the evidence provided by the applicant be sufficient to convince a jury that you had taken reasonable precautions.
Public Financial Information Checks As a public financial information
check is normally done through a credit reference bureau, there has been some misunderstanding, especially with some people referring to the check as a “credit check”. The companies provide a number of different services to a number of different sectors, and what is required for BS 7858 does not involve credit ratings, etc. What should be obtained is information which assists in verification of identity and address, plus any legal action taken when somebody has defaulted on payments. BS 7858 further complicates matters by putting a value of £10,000 against the number of County Court Judgements. This implies anything less is acceptable and anything higher is not. What is really required, is to look at any large amounts outstanding and whether there was anything dishonest about the way that the debt was incurred, i.e. an individual who willingly takes out a loan with the full knowledge that they will not be able to pay it back. g
IN Security I February 2015 I 37
Criminal Record Checks Where an applicant discloses a criminal conviction in their past, this does not automatically prevent you from employing them, however you should have a process of how to consider the information. 1. Even if your application form states that spent convictions do not have to be included, and the applicant has chosen to disclose a spent conviction anyway, the law states that you can not use this information to influence a decision on employment, so always check first whether any disclosed convictions are spent. 2. Is it relevant? As an employer you may decide that certain convictions are not relevant to a decision to employ, either due to time elapsed e.g. an offence committed as a youth and the individual is now middle aged, or the type of offence e.g. a motoring offence when the applicant is applying for a single site based role. The British Standard allows employers to use the criminal records check done by the Security Industry Authority (SIA) as part of the licensing process for contract
38 I February 2015 I IN Security
security personnel or the police checks done on security installers as compliance with the requirement for a criminal records check to be undertaken. This does leave certain roles within security companies and in-house security staff as requiring a criminal records check to be obtained, however companies may consider the benefit of obtaining criminal records checks for all staff. This then allows the screening staff to compare any unspent convictions on a criminal records check against any declared on an application or screening form supplied by an applicant. As mentioned at the start of this article, the criminal records check has become one of the debated points of the screening process. March 2015 is due to see the enactment of Section 56 of the Data Protection Act, which prohibits employers forcing potential employees to make Subject Access Requests to certain bodies as a condition of employment, this included request direct to a police service. However the Information Commissionaire’s Office has clarified that this does not include companies requesting a Basic Disclosure from either Disclosure
Scotland or Access Northern Ireland, and this remains the acceptable and indeed correct route for a company to obtain the information.
Use of Conditional Employment Whilst BS 7858 was written allowing employers to offer Conditional Employment once certain checks have been completed, and subject to completion of screening within a fixed period, the option with the least risk for your business is to complete screening before employment. And after you have gone through all of this in order to employ the individual, it is only an assessment of the applicant at that point in time. There is no guarantee that the individual’s circumstances my change at some point in the future, changing their outlook of what is ethical behaviour, but at least you can say that you tried your best when choosing them! Justin Bentley as well as being the Chairman of the BSI Drafting Group for BS 7858 is Chief Executive Officer of the International Professional Security Association. He can be contacted at IPSA, Railway House, Railway Road, Chorley PR6 0HW or via post@ipsa.org.uk n
bsia
Prevention is better than cure Keeping your business safe by implementing a security review – Mike O’Neill, Chairman of the British Security Industry Association’s Specialist Services Section
T
hree left dead in Sydney siege, 17 lives lost in Paris terror attacks, 19 killed in a Nigerian market bomb blast and over 140 slaughtered in Pakistan school massacre. Recent events have left members of the public as well as those within the business industry looking for reassurance when it comes to security. As such, never
40 I February 2015 I IN Security
has there been a more important time for businesses of all sizes to review their security strategies. Here, Mike O’Neill, Chairman of the British Security Industry Association’s Specialist Services Section, discusses the importance of implementing a security review in light of increased threat levels both in the UK and internationally. While recent events have
proved to emphasise just how important security measures are in the protection of our society, it is essential that effective security is always employed across all contexts - especially within the business environment. Businesses should not just be reviewing their security strategies, policies and plans in light of terrorist attacks, they should
“An attack may result in evacuation of a facility and could result in staff having no access to their office for a considerable amount of time” be doing it all the time. Very few businesses will actually be the direct target of a terrorist attack; it is more so the overspill of an attack that businesses should be prepared for – such as having to evacuate the building in response to a threat or nearby attack. However, in light of the direct targeting against Charlie Hebdo, businesses must now consider whether they could face direct action from terrorists or other action groups. At the heart of any business’ security and its resilience to threats is the risk register. This is a key risk management tool that helps a business identify the day-to-day risks that it faces and the best ways to counteract them. As a business, it is absolutely essential to know what you’re protecting yourself against. Today, we are not just threatened by large scale terror attacks, but also ‘lonewolf’ or self-radicalised assailants
who may not even be directly related to terrorist organisations but possibly suffer from mental health problems. In fact, businesses face threats to business continuity that can arise in any number of ways, whether it be a planned attack, bomb threat or even a flood or power outage within the building. France is currently being targeted by a massive and unprecedented wave of Cyber Attacks against Government, large corporations, smaller businesses, schools and workers unions which appear to be linked to recent events. It is vital that all organisations take a converged approach to their planning and ensure that all elements of the business work together on this. As such, businesses must have contingency plans in place that detail how they would react to such threats – whether it be locking down the building completely, evacuation or even internal evacuation. Many
businesses can take a mundane approach to developing these plans, however proper planning will have a more beneficial impact if a threat does occur. When it comes to developing contingency plans, recognising the impact of a threat is much more important than identifying the motivation behind an attack. After all, it is the impact of an attack that will cause the most damage to the business. Businesses must start thinking on a broader scale, asking the vital questions like: “What drives my business?” “What can I cope without?” and “What is essential for my business to survive?” An attack may result in evacuation of a facility and could result in staff having no access to their office for a considerable amount of time. Businesses should consider whether or not they have adequate IT facilities for staff to manage their work and securely access data from home if g
IN Security I February 2015 I 41
“It can be difficult for a business to adequately identify its risk register on its own; as such, outsider knowledge provided by professional security consultants can be invaluable”
necessary. Multi-site businesses should prioritise the key roles in their business and ensure that those people are able to continue to work sufficiently off-site; if this is achieved, it will be much easier for a business to work back towards normality following an incident. Simply having plans in place is not enough; businesses should routinely check and exercise their plans in order to ensure the relevance fits the purpose. It is the smallest details that can make the biggest difference, such as ensuring that all staff contact details are regularly checked and updated where necessary. Staff should also take on key roles within the contingency plans; this does not necessarily have to be a senior member, in fact it is more beneficial if roles are assigned to those who are regularly at the office, not those
42 I February 2015 I IN Security
who are less available. It is essential to assign deputies to each key role, ensuring that someone will always be on-site or available that efficiently knows the plans and will be able to react accordingly. It can be difficult for a business to adequately identify its risk register on its own; as such, outsider knowledge provided by professional security consultants can be invaluable. Security consultancies provide independent professional support to ensure that measures required by clients correspond to both existing and emerging threats, whilst complementing a business’s environment and operation. Working closely with the business, consultants help design a holistic security strategy that complements the business’s operation in order to address the protection of people,
building, assets and ultimately, reputations. Security consultants can also act as project manager, overseeing the implementation of security controls and ensuring that all the necessary procedures are carried out. When conducting its security review, if a business does choose to employ the services of a specialist security business, it is absolutely essential that they choose a reputable company that meets with the relevant standards for its product or service. Members of the BSIA’s Specialist Services Section offer a high quality service and have extensive experience in assisting businesses with their specialist and challenging requirements both in the UK and internationally. To find out more, visit www.bsia.co.uk/sections/ specialist-services.aspx n
Safe, Simple, Secure. The KeySure case is a pilfer proof, tamper evident keyless lockbox. This is the only non-electronic security device that will control and audit the use of a key, password or any other contents. Once an item is secured inside the KeySure it must be physically broken to access what’s inside. This provides physical accountability of the use of the protected item. This simple yet effective device is perfect for:
• Property Managers • Office Buildings • Personal Use
• IT Professionals • Security Departments
The most powerful benefit of the KeySure device is that it can be used to prevent those responsible for your keys, flash drives or other personal information from unauthorized access by providing physical accountability. However, they are still able to access the contents in an emergency. This is possible because the KeySure case must be broken to retrieve its contents. This one-time-use key access box ensures that it: • Protects Both Parties from Surreptitious Use • Provides Physical Accountability • Prevents False Accusations • Eliminates Liability The KeySure case is Safe, Simple and Secure. No other key control product on the market is as easy to use or inexpensive because the KeySure device is the only non-electronic control key system available. This makes it an efficient and effective means of key security.
www.keysure.net
product Listings
AUTOMATIC SYSTEMS
DSX manufactures integrated
Barco
Falken At Falken, we are a fully
AUTOMATIC SYSTEMS, a world leader in the automation of secure entrance control, designs and manufactures pedestrian, vehicle and passenger access systems. row.automatic-systems.com
BUSINESS DATA SURVEILLANCE CAMERA
Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references
TRAFFIC CAMERA
REMOTE INTERACTION REMOTE NETWORK
Smarter visualization Networked visualization leading to smarter decision making
solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com
licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us
A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.
Bosch Security Systems
Learn more about networked visualization at www.barco.com/netviz
14090.BARCO.resize.ad.in security.netviz.indd 1
24/04/14 15:43
Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com
FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com
pt
Dallmeier One of the world
leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com
grated
mm
hall 4, stand D80
06.02.2012 11:05:55
44 I February 2015 I IN Security
Safeotronic SAFE-O-TRONIC is a smart and keyless locking solution for doors, cabinets, lockers and furniture. Its advanced access control features provide facilities managers with the flexibility and management control required in today’s demanding workplace environments. SAFE-O-TRONIC can be used in numerous applications – Hotels, Hospitals, Spas, Gyms, Office Furniture, Cabinets, Lockers. The list is endless... www.safeotronic.com
To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207
Honeywell Security Group
Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk
Keytracker Ltd
Samsung Security
delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com
Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com
ess usiness.
Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com
The leading global M2M managed services provider
It’s good to be well connected.
Dual vision, Real time. Keysure
ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.
KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net
Access )) my Business.
CCTV PRODUCTS
Your M2M solution is more than just data connectivity. We understand that.
Videotec Dual vision, Real time.
So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures
ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies
The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.
recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com
www.videotec.com
))
CCTV PRODUCTS www.videotec.com
Wyless Systems
Legic The LEGIC brand is now known around the world and stands for quality in contactless ID technology and in smart card systems for personal identification applications operating at 13.56 MHz. www.legic.com
)) +1 617 949 8900
))
ity level I desire. my choice. ww.legic.com
Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com
The leading global M2M managed services provider
29.03.2011 10:55:29
It’s good to be well connected. Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our
CREATING THE FUTURE OF SECURITY . . . TODAY
The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.
• No “Per Seat” Licensing In System Pricing
DSX Access Systems, Inc.
• LAN/WAN Compatible
• Alarm Text Message/ E-Mail Notification
• Smart Card and Biometric Integration
• Hot Swap Redundant Communication Server
• Unlimited Access Levels Per Cardholder
• High Level Elevator Control Interface
• Integrated Photo ID Badging • Backup SQL Server
• Backwards Compatible Architecture
• Integrated Wireless Locksets
www.dsxinc.com
DSX-Europe LTD | Unit 41 Mountheath Industrial Park Prestwich MANCHESTER M259WB UK | 44(0)161.408.1166 info@dsx-europe.com | www.dsx-europe.com
DSX-USA | 10731 Rockwall Road Dallas, TX USA 75238-1219 214.553.6140 | sales@dsxinc.com
Quality. Reliability. Integrity. The Security Professionals’ First Choice.