In Security - July 2012

Page 1

The magazine with the inside story on security

issue 8 JULY 2012

Cyber threats it doesn’t just happen in the cloud

Siemens outlines how convergence across IT and physical security is providing enhanced protection of data

08 product news

24 Doing Time

New developments from Prison authorities consider the top manufacturers security challenges

28 Watching the Games

36 Smarter Management

Panasonic contributes to a safe and enjoyable London 2012

BSIA, looks at how CCTV can help keep events safe


The challenges of an ever increasing urbanized world need answers Through intelligent security solutions with Siveillance, we help make the world a safer place. www.siemens.com/security-solutions

Today, half of the world‘s population lives in cities. On a global scale, there is a growing demand for reliable security solutions that keep people safe and secure. In addition, keeping critical infrastructure secure and operational, such as airports, subways and utilities is vital for businesses,

governments and society. With our innovative and userfriendly Siveillance™ portfolio we help customers achieve their desired level of security and peace of mind – providing them with intelligent solutions to protect people, goods and the environment worldwide.

Come & see us! September 25 – 28 Hall 3.0, Stand 309

Answers for infrastructure.


Commentary

The magazine wiTh The inside sTory on securiTy

W

cyBer threats it doesn’t just happen in the cLoud

siemens outLines how conVergence across it and physicaL security is proViding enhanced protection of data

08 product news 24 doing time new developments from prison authorities consider the top manufacturers security challenges

28 watching the games panasonic contributes to a safe and enjoyable London 2012

36 smarter management Bsia, looks at how cctV can help keep events safe

Editor Adam Riches +44 (0)20 7216 6427 editorial@mebmedia.co.uk Advertising +44 (0)1622 201207 advertising@mebmedia.co.uk Accounts Jay Kempisty +44 (0)1622 201207 accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Design and Production Fish Graphic Design www.fishgraphicdesign.co.uk mark@fishgraphicdesign.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk Copyright © MEB Media Ltd - 2012, all rights reserved. Articles and art may not be reproduced or reprinted without the express written permission of the publisher

elcome to the July issue of In Security and hopefully you have all recovered from IFSEC. We review the event itself and many of the items in this issue’s Product & Industry News section (starting on page 8) have an IFSEC slant. We aim to deliver a comprehensive round-up from IFSEC , now a truly global expo and a vital ‘must-attend’ event for those working in the security sector. Our cover story this month focuses on Siemens and focuses on cyber threats. We look at ways you can protect your business from new and hidden dangers (see page 3). I’m sure you’ll agree it makes fascinating reading. Elsewhere, UPS looks at Fuel cells being the ideal solution for those looking for a silent source of extended run power for indoor or outdoor security applications (see page 20).

02

08

24

28

Prison authorities consider the surveillance and access control challenges facing stakeholders in the custodial sector and assess the solutions available to them (see page 24). Watch how Panasonic audio-visual security equipment contributes a safe and enjoyable London 2012 Olympic and Paralympic Games (see page 28). Ingersoll Rand’s new PegaSys intelligent access control system has revolutionised security for a French holiday village (see page 32). Keeping in theme with the Olymopics, Smarter Event Management and James Kelly, Chief Executive at the British Security Industry Association (BSIA), looks at how CCTV can help keep events safe (see page 36). Adam Riches, Editor

16

Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

Contents

32

24 Surveillance Custodial sector assess the solutions available

03 cover story Cyber threats: it doesn’t just happen in the cloud

28 Audio-Visual Panasonic contributes to a safe Olympics

16 Show Review We deliver a thorough review of IFSEC 2012

32 Access Control Ingersoll Rand’s PegaSys intelligent access control system

20 Power Solutions Fuel cells a silent source of extended run power

36 BSIA BSIA looks at how CCTV can keep events safe

36 IN Security I July 2012 I 1


cover story

Cyber threats:

it doesn’t just happen in the cloud

Mark Mooney looks at ways you can protect your business from new and hidden dangers

T

here are very few organisations that are not in some way reliant on data. The protection of that data is fundamental to business, to governments and to security forces alike. Much is being made of the cyber threats posed by the cloud. The increased use of hosted cloud computing and virtualized environments has made the protection of the data centers that hold this information even more critical. But it is not just about ensuring protection from the cyber threats: the Trojan

2 I July 2012 I IN Security

horses, viruses, malware, hacking and information warfare that characterizes the modern world; it is also about recognizing where those and other threats come from and employing physical security measures to complement the software based systems used to protect networks. The security challenges faced today are many and varied. A security vulnerability is any flaw in an IT system that can be exploited by an attacker to compromise the confidentiality or integrity of a data set or system or to deny

legitimate user access to the data or system. In terms of those posing the threats they can be external parties or people operating within an organisation – or a combination of both. Intruders, criminals, spies, disgruntled employees, cleaning staff and contractors – these, along with many more, can threaten the security and reputation of a data centre and, in turn, the security and business continuity of the customers that it serves. Likewise with large organisations that host the data themselves.


Frost and Sullivan’s Analysis of the Global Vulnerability Research Market in Q3 2011 points to the rise of attacks on third party applications. Once an application has been weakened, any devices on the network can become a point of entry for further hacking

In preparing for attacks criminals are increasingly using social engineering and profiling to gain access to buildings. Tracking employees through social media provides a lot of information that can prove useful in posing as an employee to get into the building and the majority of data attacks typically include an inside role of some description – whether voluntary or not. Data theft, malicious uploading, data corruption and organized theft of intellectual property – all are issues which need to be addressed and there are countless examples worldwide on an increasingly regular basis. The ’Wikileaks’ website demonstrates how widespread leaking of sensitive documents now is and also how quickly and easy it is to circulate these documents to the world. Classified documents concerning the Iraq war were downloaded by a soldier onto a USB stick and made public. In commerce, bank details have been accessed, including a case where employees of Swiss banks stole data and sold it to the German tax department. This is certainly cyber crime but it is not just about internal protection of the network systems. One immediate and very real risk is the physical removal, destruction or manipulation of digital assets (data and applications), e.g. through theft, sabotage and uncontrolled access to data or applications, all of which can be significantly reduced by combining network security measures with physical security, such as technology-aided access control protocols. Because the origin of a threat can be internal or external, and because security is about making it as hard as possible for a criminal to succeed. Enterprises and data center service providers alike need to consider implementing multiple layers of technologies that will deliver an ’Outside-in and Insideout’ protection.

Protecting the perimeter The first line of defence (or last line in the case of an insider threat) is perimeter security. Many blue chip companies are located in high-profile buildings, often in the centre of cities or close to them. This means that they do not want high chain link fences, gates and barriers around the perimeter: it is not attractive and in some cases it is not feasible because of planning restrictions in heavily urbanized areas. There is therefore a trend towards intelligent perimeter solutions, establishing virtual perimeters through the use of technology such as fibre optic cable or passive infra-red (PIR) motion sensors, along with surveillance cameras. Video surveillance is an area where there has been significant development. Video content analysis is now widely used to automate the alarm process rather than relying on security personnel simply to spot events. Trip wires can be set at specific points to raise an alarm if the perimeter is crossed. Automatic object detection can also be used to alert personnel to the presence of suspicious packages, vehicles, and persons, or behaviour analysis algorithms can be employed to enable cameras to automatically detect suspicious behaviour. With the increased threat of terrorist attack on high-profile buildings, such algorithms make an important contribution. Significant research and development is also being focused on forensic analysis of video data, a point I will return to later.

Within the building Moving into the building, video surveillance again often plays a role in monitoring and restricting access. Frost and Sullivan’s Analysis of the Global Vulnerability Research Market in Q3 2011 points to the rise of attacks on third party applications. Once an application has been weakened, any devices on the network can become a point of entry for further hacking. This means that protecting digital assets now also

needs to include all peripherals as an extra measure – protecting critical areas (server rooms) is no longer sufficient, and combining digital and physical security measures needs to extend to the entire facility and asset pool. Integrating video surveillance cameras with an access control system can provide the means to verify the identity of a person entering an unmanned access control point by automatically capturing a video stream as their identity card is presented to a reader. This management of a person’s ID is an important factor in maintaining the security of a building and its digital assets, with a number of verification options now available to ensure only authorized personnel have access to certain devices, applications or data sets. These include biometric technology, such as fingerprint or iris scanners, and PKI (Public Key Infrastructure) technology whereby two mathematically related cryptographic keys (one private and one public) are used to unequivocally prove the identity of an individual. In particularly sensitive areas, buddy systems may be employed, requiring two personnel to be present in order for access to be granted to download data, for example. If a pre-defined user role is violated, security personnel will be alerted to intervene. The nature of the building will dictate the appropriate level of security controls, striking the balance between the security required and the day to day operation of the facility. Tagging hardware can also help to monitor access and reduce theft. For example, large data centers are increasingly tagging their racks so that any access, even if it is by an authorized engineer, is monitored. Revolving doors are widely used to provide exact tracking of the people entering a building, particularly useful in buildings where large numbers are working or visiting. By using integrated systems across multiple buildings on a given site, this can prove useful in mass >

IN Security I July 2012 I 3


“The benefits of such solutions are multifold: intervention is faster, mitigation is more targeted and efficient, and collateral risks are minimized” notification systems. These are the systems designed to simultaneously warn people in an emergency situation, sending alerts and instructions through a range of media, including cell phones, computer screens, landline phones, closed circuit TV screens and public address systems. This highlights the move towards a more intelligent response to emergencies.

Intelligent response through integration Intelligent response relies on the data provided by the increasing integration of safety, security and other building management systems. Open architecture is very much a focus at the moment, with a move towards standardizing protocols to allow different systems, often from different manufacturers, to work together. This can include security, life safety – including notification systems – and comfort provided by heating, ventilation, cooling, lighting, and power management systems. Convergence is currently a widely used term in security. This is convergence in terms of the different systems working together but also between physical and IT security. Technological advances in video management, network cameras, recording devices, intelligent access control and software have helped security applications to take advantages of the IP network. Response systems of the future – Intelligent Response systems where the system in place involves a variety of fully integrated, multimodal technologies – will take integration further still. With systems capable of analyzing all relevant data collected from the thousands of sensors and field devices and the various management systems operating throughout a building, a ‘demand

4 I July 2012 I IN Security

controlled’ response to incidents will be possible. This data will automatically trigger the relevant system response mechanisms in relation to the nature, size and criticality of the incident, and enable the automated provision of dynamically updated and targeted instructions to everybody concerned, from guiding them quickly and efficiently to a place of safety to providing relevant situational information for swift and efficient intervention. The benefits of such solutions are multifold: intervention is faster (supported by comprehensive situational information), mitigation is more targeted and efficient (the right systems are triggered automatically to e.g. extinguish a fire), and collateral risks are minimized (e.g. quicker return to secure building situation, e.g. access controlled doors locked etc). In addition, audit trail of actions taken and sequence of events can be leverage to facilitate the post-incident and recovery activities (insurance claims, liability risk management) and continuous improvements with regards to security and business continuity (policies and workflows).

Forensic analysis: video surveillance Returning to the issue of forensic analysis, an area of significant development is the application of this approach to video surveillance systems. In the UK, a watershed event that was certainly a driver in developing this technology was the London bombings of 7 July, 2005 when four terrorist bombs – three on the London Underground network and 1 on a double-decker bus – killed 52 people and injured more than 700. Reviewing the video surveillance footage for London to try and piece together the events leading up to, during and after the bombings was a costly and labor intensive exercise. It highlighted a need for a process whereby the useful information could be retrieved much quicker. Motion detection has been used in video surveillance for some time, offering the capability to focus attention only on those periods when motion has been captured. However, this is still often a lot of footage, primarily just showing people walking around a building for example, who are presenting no security threat. This leads to the adoption of technology which attached events or alarms to the video, tagging the video at the point when an alarm was


Motion detection has been used in video surveillance for some time, offering the capability to focus attention only on those periods when motion has been captured. With the increasing use of IP technology, particularly the advent of open standards enabling different systems to communicate more readily, so the distinction between the previously separate worlds of physical and IT security have become blurred

therefore the opportunity to resolve an incident. This area of research and development is seeing a lot of collaborative projects between security systems specialists and dedicated IT companies.

Future developments

recorded and developing an index of tags. With the increasing integration of different security disciplines, this means that an event or alarm generated by any of the systems can be tagged to the video. If, for example, somebody uses their access control card to enter a particularly sensitive area of the building, that event can be tagged with a piece of video. This can then be checked very quickly to ascertain if that person is the rightful carrier of the card. This is again enhancing the intelligence of systems. No longer is it a case of saying ‘show me the video stream between 9am–11am on Friday 11 May’. It is moving towards Google style searches, e.g. ‘show me the events where doors were forced’ or ‘show me the events when access control point A was entered’. In the age of the internet, we are very familiar with such searches and it enables useful and pertinent data to be identified much more quickly.

Forensic analysis: the next steps Moving to the next stage and beyond just video surveillance, takes us into convergence again. By using multimodal systems, the goal is to identify an event from all of the system inputs, including, for example, an intrusion into the IT network i.e. physical and IT security operating under a single front end control. Many so called cyber attacks can

include a physical security element. One person could be orchestrating the attack remotely, from anywhere in the world, but often this will involve an accomplice operating in or close to the building, plugging in Ethernet cables, for example, or parked next to the building piggybacking on the Wi-Fi networks. By adopting fully integrated, multimodal systems, you can have a much better level of situational awareness, knowing that not only is the network under attack but that it is being achieved through an Ethernet cable plugged into Rack 7 which was accessed via control point A. Ultimately, forensic analysis in this context is about very quickly finding the relevant information from the wide ranging and extensive data that is being processed, improving the speed of response and

With the increasing use of IP technology, particularly the advent of open standards enabling different systems to communicate more readily, so the distinction between the previously separate worlds of physical and IT security have become blurred. Convergence will only increase as security, along with other safety and building control systems, continues to migrate to the IT realm. A more holistic approach to safety and security is being adopted, one in which integration has a greater part to play. Systems are being developed which draw on a more structured and standardized approach using the IT networks but which allow greater flexibility in tailoring solutions to specific requirements. Data plays such an important role in the modern world that finding effective ways to protect it from the many threats, both those that currently exist and those that are yet to come, will become en ever increasing challenge. n Mark Mooney, Head of Product Line Corporate Security, Siemens Building Technologies Division

Siemens at Security Essen The safety and security of data and the increased convergence of security and IT will be one of the issues addressed by Siemens at the Security Essen trade fair (Hall 3, Stand 309 ) from 25-28 September, 2012. Based on the concept – A Walk Through The City – the Siemens stand will cover a comprehensive range of applications that play a fundamental role in the functioning of today’s cities, and will continue to do so in the future. These include: data centres, classical buildings, infrastructure and real estate, corporate security, public areas and transportation, perimeter, critical infrastructure and intervention forces. A range of solutions will be on show, demonstrating how peace of mind can be achieved for individuals and for businesses through adopting intelligent safety and security solutions in buildings and infrastructures.

IN Security I July 2012 I 5


Show PReview

Security Essen Messe Essen on September 25 - 28, 2012

I

nnovative Products and Solutions Will Be the Focus of Attention at the World’s Premier Fair for Security and Fire Protection Technology Security Essen has special omens in 2012: The world’s premier fair for security and fire protection technology will take place at Messe Essen for the 20th time on September 25 - 28, 2012. Around 1,100 exhibitors from around 40 nations will be expected and will present innovative products and solutions on the internationally most significant platform in their sector. Thus, Security Essen will once again become the trendsetter in the growing security industry. Particularly pioneering innovations will be honoured with the Security Innovation Award. Comprehensive Range of Available Solutions and Showcase for Innovations Security Essen will offer the whole world of security and fire protection technology under one roof with a comprehensive overview of new security technologies and security concepts. In this respect, the trade fair will consistently place its faith in its solution-oriented profile. From mechanical security technology, fire protection and IT security via security systems for outdoor sites and video surveillance right up to solutions for reporting hold-ups, burglary and theft,

6 I July 2012 I IN Security

trade visitors will be able to obtain extensive information. Not only the wide range on offer but also the large number of innovations make Security Essen an absolute must for the security sector. A lot of exhibitors develop their innovations in a targeted way for the world’s premier fair in order to introduce them to the trade public for the first time there. Within the framework of the opening ceremony in the evening before the fair, the “Security Innovation Award” will be presented to the most innovative companies in various categories. The new Research Area will concentrate on future subjects in the sector: In Hall 8, researchoriented companies and institutes will present themselves on a cooperative booth for the first time. Fire Protection Will Occupy Two Halls for the First Time Because of the great demand, two fair halls will be available to suppliers from the fire protection section for the first time this year. In Halls 1 and 9, they will introduce solutions relating to all aspects of preventive fire protection, early fire recognition and fire fighting to the trade public. Special Show for Security Service Providers The security service providers will extend their presence at Security Essen 2012. Under the auspices of Bundesverband der

Sicherheitswirtschaft (BDSW “Federal Association of the Security Industry”) and Bundesvereinigung Deutscher Geld- und Wertdienste (BDGW - “Federal Association of German Money and Valuables Services”), a communication platform will once again be created for this section. “Protection, Security, Service” will be the central idea according to which exhibitors in Hall 4 will present their ranges of available services. The premiere in 2010 aroused great interest not only amongst the companies presenting themselves but also amongst the trade visitors. Valuable Knowledge: Experts Will Provide Information in Forums Three forums will offer the trade visitors the possibility of obtaining information about topical subjects in the sector. In Hall 6 (the Security Forum), there will be lectures ranging from security management to video surveillance. IT security will also play a great role here. Experts will indicate solution paths to the interested trade visitors in a generally comprehensible and practice-oriented form. The forum in Hall 8 will concentrate on subjects from research and development. Public security will be the focus of attention during the forum about the official figures in Hall 9. n Further information at: www.security-essen.de


RACCOONS, BATS, VAMPIRES,

SECURITY

MANAGERS. WHO SEES BETTER

IN THE DARK NOW?

The CamPX MicroDome’s new technology allows color to be seen in the dark without forcing the camera to switch over to black and white. See more at marchnetworks.com.


product and industry news

‘Instant’ e-learning courses available from British Safety Council

T

he British Safety Council has launched a new range of instant access health, safety and environmental e-learning courses, allowing employers to quickly and easily purchase and provide online training to employees from as little as £10 per course. The new e-learning courses are available on a ‘payas-you-go basis’, meaning they can be immediately purchased online using a credit card. Developed by British Safety Council experts and based on the latest best practice, the first batch of available e-learning courses are: • Introduction to Workplace Health and Safety • General Health and Safety • Display Screen Equipment (including a selfassessment of the user’s DSE workstation) • Fire Safety Awareness • Manual Handling • Health and Safety for Managers • Environmental Awareness. Once an employer has purchased the required courses, they simply enter the names and emails of the employees to be trained, and the system sends the individual an email with easy-to-follow log-on details taking them straight to the online training. The courses can be completed in one go or in stages, allowing the individual to learn at their own pace. Designed to be interactive and engaging, the courses feature a short multiple-choice test to ensure the individual has understood the information provided. Once the employee has successfully completed the course and test, they are issued with a PDF ‘completion of training’ certificate which they can download and keep.

8 I July 2012 I IN Security

Employers are also notified when an employee completes a course so they can maintain training records, and can keep track of the e-learning provided to all staff via an easy-to-use online ‘My Learners’ function. For the DSE course, employers also receive an emailed report listing the outcome of the learner’s self-assessment of their workstation, highlighting any areas for improvement. John Phillips, director of qualifications and standards at the British Safety Council, said: “Our new Instant Access e-learning courses are a convenient, cost effective and flexible way of delivering high quality health, safety and environmental training to employees. “E-learning allows employees to study around their working day and at a time and place that suits them, and is a great way for employers to meet their legal obligation to provide suitable health and safety training to employees. “These new courses will be of particular benefit to small and medium-sized businesses that want to quickly deliver health, safety and environmental training with the minimum of fuss and effort.” The e-learning courses are priced at £15 each when booking 1-19, £13 each for 20-49 and £10 each for 50-plus. ‘Bundle’ packages containing four different courses are also available at prices starting at £40 for 1-19. All prices exclude VAT. Organisations that become members of the British Safety Council receive 100 free ‘Introduction to Workplace Health and Safety’ e-learning courses each year. n See www.britsafe.org/instantaccess


STI (Europe) launches new safety device for harsh environments STI (Europe) has unveiled the new Enviro Stopper an IP rated protective enclosure designed to extend the life and reliability of devices exposed to water and harsh environments. It offers protection to manual call points and switches against dust and water ingress both outside and inside, as well as preventing tampering, vandalism and damage from accidental or malicious operation. It is ideal for wash down areas and saline atmospheres. The Enviro Stopper consists of a clear, tamper-proof, tough polycarbonate cover (IP56) and backbox (IP66) that can accommodate a standard European call point or switch. When the cover is opened a deterrent alarm is emitted and will draw immediate attention to the area. When the cover is closed, the unit is sealed and achieves an overall rating of IP56 preventing dust, grime and water getting to the device. Available in red, green, yellow, blue, white and black. n www.sti-europe.com/uk for more

Skillweb launches proof of attendance application for security guard services Skillweb has launched a proof of attendance tool to enable security guard services organisations to keep track of employees in the field. SmartTask Security is a simple to use mobile application that is designed to enhance the workflow management of manned and mobile security solutions by ensuring scheduled visits and patrols are being made and critical work is being undertaken. SmartTask Security uses the latest Near Field Communication (NFC) technology installed on an increasing range of mobile phones. In addition the use of QR Codes can also be used. Security personnel simply log in to the system and swipe the phone over a unique ID tag or QR Code label located at a point or points of a customer’s premises to record arrival and departure times. For example, for event security it will be possible to quickly and effectively monitor a team to better understand when an operative has checked-in at each location of a site or venue. This will enable them to ensure service level agreements are being met and provide peace of mind to the customer that high levels of security are being met. The captured information can be viewed in realtime by a manager or administrator in-office via PC or on location via a net-enabled tablet device. Data can be simply exported into Excel or an existing backoffice system. This provides useful data to monitor performance that can also be shared with customers. Paul Ridden, Managing Director of Skillweb, commented: “SmartTask Security delivers a simple and

100% accurate means of monitoring proof of attendance by remote security operatives. Customer satisfaction and peace of mind is critical within the security guard sector, so this innovative approach offers an effective way of immediately monitoring and verifying completed visits, rounds and patrols to ensure high levels of safety, protection and service delivery.” n Skillweb has a number of free trials available – register at http://contact.skillweb.co.uk/start-your-free-30-daytrial-of-smarttask-for-security-here/Default.aspx

IN Security I July 2012 I 9


CAPTURE. RECORD. DISPLAY. CAPTURE. A Samsung HD Network Security Solution captures up to 5 times the detail of standard resolution systems. HD image capture up to 1080p, recording and display combine to provide a security system which delivers an incredibly high level of picture detail. HD cameras and displays deliver a wide aspect 16:9 view of a scene and allow operators to pin-point specific areas of interest for closer inspection, without losing definition or suffering from pixilation. And by using HD recording this can be achieved on recorded footage with the same clarity. With a host of cameras, a choice of hardware or software recording options, plus HD displays, you can develop a security solution perfectly suited to your business.

Samsung HD Network Security Solutions. Smarter Security.

T 01932 455 308 E STEsecurity@samsung.com W samsungsecurity.com Samsung Techwin Europe Ltd 1000 Hillswood Drive. Chertsey. Surrey. KT16 0PS. UK


ievo provides North Wales School with biometric solution When North Wales High School Emrys ap Iwan commissioned local security specialist Spider Technologies to research a replacement solution for their exhausted swipe card system, the firm recommended the ievo Ultimate fingerprint reader. The school previously used a swipe card system, where some 250 sixth form pupils and 100 teaching staff would gain access between different points around the building. Not only was the system difficult to maintain but it became increasingly expensive to run because pupils kept losing their cards. All the ievo Ultimate readers secure and monitor access on entry points between two main school buildings, which enables further control over sixth form pupils and the remainder of the school year groups. Managing Director of Spider Technologies, Steve Jones, said: “Having researched an access control solution to solve the problems faced at Emrys ap Iwan there was no doubt in my mind that ievo would be fit for the job. I was incredibly pleased with how well ievo Ultimate interfaced with Paxton Net 2, it made the installation process run a lot smoother and, of course, reduced disruption on site, which was a major relief because I had a tight schedule to abide by in order for the system to be completed before the next school term began.” There were three main reasons why the ievo ultimate fingerprint readers increased efficiency, security and reduced the cost of maintenance at the school Firstly, using the ievo Ultimate reader permitted school management to control access rights between the two separate buildings on the grounds. Using Paxton’s market leading access control system, Net2, Emrys ap Iwan management were able to control what times each year group entered each school building. The buildings are accessible by all pupils however some parts are only designated for staff and sixth form only, such as main entrance and access to an adjoining further education college on one of the sites. Access levels are therefore granted to sixth form pupils and staff continuously whilst remaining year groups gain access to general exterior doors between five-minute lesson changeovers only. Secondly, management at the school were worried about vandalism, which is why one of their requirements was a robust access control product that would be able to function in any adverse environment. At Emrys ap Iwan the Ultimate reader was installed on main external doors, which caused no problems for the robust reader. Ultimate

is manufactured in Polycarbonate ABS and the fingerprint sensor is encased within toughened glass. In addition it is IP 65 rated meaning it will function with water and is dust tight. Finally, they required a security system that would be up and running within a short period of time. Therefore, ease of use and usability played a major factor. The registration process of enrolling and training the pupils and staff on how to use the system took around two days. End user guides and posters were supplied with each reader so that there was no confusion on how to use the product and it provided information on data protection, which was useful for parents or guardians of young adults being registered. Nayland Southorn, Headteacher of Emrys ap Iwan, said: “Ysgol Emrys ap Iwan in Abergele, N.Wales is a very large school, spread over several sites with multiple entry/exit points. This has always posed a significant access and security problem for us, with students, staff and visitors alike. Our existing swipecard system was proving to be inadequate for need and increasingly difficult to maintain. We contacted Spider Technologies to look in to the issue and they operated with great speed, professionalism and efficiency to investigate our concerns and to come up with a reliable and cost-effective solution. The rapid installation of the ievo Ultimate fingerprint readers has proved to be a tremendous success, immediately solving all of our access and security problems in one fell swoop.” n See www.ievoreader.com

IN Security I July 2012 I 11


product and industry news

CCD adds the human factor to the panic room The Panic Room Company has secured a working collaboration with CCD, a specialist London-based design consultancy that puts the science of ergonomics and human factors into the heart of complex buildings – the panic room being the perfect complex candidate. Steve Brook, Business Development Director for the Panic Room Company, said: “While the Panic Room is seen as a temporary refuge and time spent within is likely to be minimal due to the hi-tech connectivity to the ‘outside’ world and rescue services, it is nonetheless important that occupants feel comfortable. CCD has made it its business to assess how humans interact psychologically in confined spaces without natural light and, for us, their expertise is invaluable. Together we are now creating ergonomic and aesthetic concept panic room interiors that help minimize stress whilst remaining functional. It’s a very intricate and interesting process.” CCD has designed specialised working environments for over 30 years including those for the emergency services, the security industry and the military sector. For example, in the design and layout of command vehicles, CCD has faced the twin challenges of confined spaces and large quantities of equipment. The systematic approach used here can be adapted and applied to the panic room. John Wood, Executive Chairman for CCD, explains: “Our design philosophy is very much human-centric and we believe that any built environment has to serve the people it was intended for. With the Panic Room, the occupants will be under stress as they imagine the threat on the other side of the steel and it is our forte to minimise this negative impact. Similarly, by applying human modelling techniques, we can ensure that every cubic centimetre within the panic room is optimally used – from storage to bunk beds, kitchenettes to

washbasins. By refining the interior of these safe rooms, we’re adding real value to the product.” CCD works as a multidisciplinary team using experts in psychology, ergonomics, interior design, nutrition, lighting, acoustics and CAD modelling. With this team approach, specialist lighting can combine with careful use of interior finishes and colours to mitigate feelings of claustrophobia in a windowless environment occupied by susceptible individuals. And, fortunate for the Panic Room Company, with a track record of over 375 successful command centre commissions undertaken in the UK and overseas, CCD has the world leading team in this area. The panic room is a safe last point of defence and can be specified to withstand powerful weapon attacks. For commercial or domestic use, the unit is easily installed and can be connected to complementary security devices. The environment is comfortable and sustainable with air filtration, back-up power, fresh water and basic toilets all part of the concept. CCD is just one such coalition that the Panic Room Company has formed to create a total solution for its clients alongside partnerships with smoke screen, carbon air cleaning and a range of communications solutions. n See www.thepanicroomcompany.com

Titanic Belfast chooses Townscape counter terror blocks TOWNSCAPE Products Limited is helping to safeguard one of the UK’s highest-profile new visitor attractions against the threat of terrorism. Townscape is supplying 47 Counter Terror (CT) Blocks, designed to stop vehicle-based attacks, to Titanic Belfast, one of Northern Ireland’s signature tourism projects in a deal worth more than £100,000. Titanic Belfast enables visitors to re-live the Titanic story, from her birth in Belfast to the fateful maiden voyage and eventual discovery on the seabed. The museum is expected to attract 425,000 visitors annually and opened on 31 March 2012. Townscape’s CT Blocks, which it manufactures at its Sutton-in-Ashfield factory, each weigh in at 2.2 tonnes and are made using a special mix of

12 I July 2012 I IN Security

aggregates designed for ultimate strength. The CT Blocks only require minimal groundwork due to their low profile foundation, making them cost effective to install without compromising on security. CT Blocks are positioned where a building is vulnerable to vehicular incursion and meet the PAS 68 Standard for vehicle immobilisation. Jonathan Goss, managing director of Townscape Products, said: “Visitor safety is of utmost importance and we worked closely with the architects and Harcourt Construction, who built Titanic Belfast, to supply Counter Terror blocks that are a proven, tested defence against vehicle based terror attacks. n See www.townscape24.com


The choice you always wanted

Bosch Security Systems extends its video portfolio with an all new affordable product range. Finally, everyone can afford the best! The Bosch small business portfolio of professional CCTV solutions is now available. Delivering reliable, long-lasting performance at a competitive price, Bosch small business products combine great image quality with the lowest maintenance needs. They are also easy to install and operate, ensuring fast, simple set-up to save you time, effort and costs. Bosch small business products are perfect for a broad range of applications such as small businesses, retail and schools. So don’t delay, visit your local distributor today! www.boschsecurity.com


product and industry news

StrikeForce provides affordable protection from data breaches StrikeForce Technologies, creators of two factor outof-band authentication and anti-keylogging keystroke encryption, have launched a new package aimed at small businesses. StrikeForce’s SMB offering combines both GuardedID and ProtectID into an affordable bundle that protects these businesses from identity theft and data breaches. According to a recent data breach study by Verizon, businesses with 11 to 100 employees are by far the most targeted groups being attacked, over four times more than the second highest group (101 to 1000). Most of these attacks come from the outside using keylogging malware. Keyloggers (malware that records every keystroke you type into your computer) are common tools used by hackers to steal user names, passwords, personal and business information. The best anti-virus programs can only detect about 20% of keyloggers and new ones are being developed every day that are able to bypass detection completely. StrikeForce’s GuardedID anti-keylogging software protects the SMB by encrypting each and every keystroke in real-time, preventing keyloggers from stealing their data. “Most small businesses feel that they are safe by using anti-virus programs and firewalls, but for today’s cyber criminals, that’s child’s play,” said George Waller, EVP of StrikeForce. “The SMB community has become easy prey; all it takes to get hacked is for one employee to

open an infected email, or visit a commonly used website that has been tampered with and is now a harbinger of malware, or, download a presumably safe file from a business associate or friend. Hackers are taking advantage of the common things we do every day to communicate with others.” “Combining our anti-keylogging with our out-of-band authentication will provide military-grade protection to the SMB for a small price tag,” says Waller. “ProtectID is our patented out-of-band authentication platform that enables SMB’s to use their mobile devices to login to their corporate VPN’s, customer contact databases and cloud applications, etc. Our SMB offering protects data from being stolen due to keyloggers and unwanted access due to the lack of two-factor out-of-band authentication.” n See www.guardedid.com

AMG-Panogenics signs deal with Tecton AMG-Panogenics, the British manufacturer of 5 Megapixel cameras, solutions has entered an OEM partnership agreement with Tecton, the UK-based designer, developer and manufacturers of closed circuit video equipment for commercial, security, government and broadcast applications. Under the new agreement, Tecton will integrate PanoCam360 into all their video management systems complementing Tecton’s unique range of British made products, fully capable of making the most of HD video. Founder and MD of Tecton, Chris Hall, said: “While working with a client on a large high security CCTV recording system, Tecton was asked to recommend a good HD omni-directional video source. After testing, Tecton didn’t hesitate to recommend the AMGPanogenics PanoCam360 model, which is now fully integrated with our range of HD recording products. Our customers expect Tecton to deliver superior quality video and we were happy to be able to do this with the AMG-Panogenics camera.”

14 I July 2012 I IN Security

CTO of AMG-Panogenics, David Myers, said: “Tecton has a really interesting client base in the UK in particular and a well-deserved reputation for delivering sophisticated CCTV solutions in very demanding environments. The company is dedicated to supplying technologically advanced security solutions and their focus on quality and customer service matches the ethos AMG-Panogenics works with. I have no doubt that Tecton will find a number of interesting projects where PanoCam360 will add value and save costs, and we’re looking forward to a fruitful relationship over the coming years.” n See www.amgsystems.com


Airport security set to take leap forward Police and security teams guarding airports, docks and border crossings from terrorist attack or illegal entry need to know immediately when someone enters a prohibited area, and who they are. A network of surveillance cameras is typically used to monitor these at-risk locations 24 hours a day, but these can generate too many images for human eyes to analyse. Now, a system being developed by Christopher Amato, a postdoc at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), can perform this analysis more accurately and in a fraction of the time it would take a human camera operator. “You can’t have a person staring at every single screen, and even if you did the person might not know exactly what to look for,” Amato says. “For example, a person is not going to be very good at searching through pages and pages of faces to try to match [an intruder] with a known criminal or terrorist.” Existing computer-vision systems designed to carry out this task automatically tend to be fairly slow, Amato says. “Sometimes it’s important to come up with an alarm immediately, even if you are not yet positive exactly what it is happening,” he says. “If something bad is going on, you want to know about it as soon as possible.” So Amato and his University of Minnesota colleagues Komal Kapoor, Nisheeth Srivastava and Paul Schrater are developing a system that uses mathematics to reach a compromise between accuracy — so the system does not trigger an alarm every time a cat walks in front of the camera, for example — with the speed needed to allow security staff to act on an intrusion as quickly as possible. For camera-based surveillance systems, operators typically have a range of computer-vision algorithms they could use to analyze the video feed. These include skin detection algorithms that can identify a person in an image, or background detection systems that detect unusual objects, or when something is moving through the scene. To decide which of these algorithms to use in a given situation, Amato’s system first carries out a

learning phase, in which it assesses how each piece of software works in the type of setting in which it is being applied, such as an airport. To do this, it runs each of the algorithms on the scene, to determine how long it takes to perform an analysis, and how certain it is of the answer it comes up with. It then adds this information to its mathematical framework, known as a partially observable Markov decision process (POMDP). Then, for any given situation — if it wants to know if an intruder has entered the scene, for example — the system can decide which of the available algorithms to run on the image, and in which sequence, to give it the most information in the least amount of time. “We plug all of the things we have learned into the POMDP framework, and it comes up with a policy that might tell you to start out with a skin analysis, for example, and then depending what you find out you might run an analysis to try to figure out who the person is, or use a tracking system to figure out where they are [in each frame],” Amato says. “And you continue doing this until the framework tells you to stop, essentially, when it is confident enough in its analysis to say there is a known terrorist here, for example, or that nothing is going on at all.” In addition to port and airport security, the system could monitor video information obtained by a fleet of unmanned aircraft, Amato says. It could also be used to analyze data from weather-monitoring sensors to determine where tornados are likely to appear, or information from water samples taken by autonomous underwater vehicles, he says. The system would determine how to obtain the information it needs in the least amount of time and with the fewest possible sensors.

IN Security I July 2012 I 15


Show Review

IFSEC International 2012 Success for IFSEC International as show’s comprehensive offering delivers significant visitor numbers

U

niting the entire security buying and influencing chain to create an unrivalled business platform, IFSEC International delivered its most comprehensive show ever and is delighted to report an impressive 24,933 total attendees (subject to ABC audit), a clear increase in the pure security audience and a staggering 25 per cent increase in end-users attending the show. Established almost 40 years ago, IFSEC International took place at Birmingham’s NEC, UK on 14-17 May 2012, as not only UBM Live’s flagship security exhibition, but also the world’s largest annual security and fire event. More than 700 exhibitors were present at the show, including more than100 companies exhibiting for the first time. IFSEC International has undergone an overhaul of its content as it keeps pace with and reflects the changing trends and concerns within the security industry, representing the latest

16 I July 2012 I IN Security

product innovations, technologies, services and solutions applicable to this broad industry sector. As a result, the show reports a 68 per cent increase in the number of visitors attending education sessions at the show, representing approximately 10 per cent of total attendees. Keith Crouch, Loss Prevention Manager at Super Group, visited the show and said: “We work in retail so we’ve picked up things that would help improve our systems. We’ve made good contacts which has been really useful, and the CCTV seminar session run by Tavcom Training was excellent.” Show organisers UBM Live injected major investment into IFSEC International’s education programme this year, including the new Security Management Education Theatre, created for security managers and all those responsible for managing the security of their organisation, such as facilities, estate and building managers. Of particular note,

2012 saw a significant increase in end-user visitors from across the retail, transport, and facilities management sectors. Eng Fernando Mendes from IVV Automacao LDA also visited and had the following to say: “I come every year to this exhibition and think it is one of the most important exhibitions in Europe. We are professionals; we are importers and distributors of this stuff so we have to come. This year is better than last year – more people. I will be coming next year. “I come to IFSEC to check out latest technology that’s available and how it is moving forward all the time. I found a number of products suitable for the environment I work in. We looked at the seminar on 2012 and IP which we found very interesting.” A hot topic for the industry which was heavily reflected at IFSEC International 2012 is IP and the move towards convergence. A bespoke education programme with an emphasis on IP and integration


“In four days at IFSEC you can accomplish what would take you a whole year to do if you had to meet separately”

skills and knowledge contributed to a 40 per cent rise in visitors from the IT/networking/telecoms sector, reinforcing IFSEC International 2012 as the most important destination for discussion and debate on the future of electronic security. As part of this IP education drive, IFSEC International 2012 debuted the ipAssured Education Zone, presented by Anixter. The ipAssured Education Zone was an exclusive area where a team of experts offered presentations on leading industry trends. With the objective to make IFSEC International 2012 the meeting place for debate on the wider issues affecting the security world, the team worked with industry partners to deliver thought-provoking discussion on topics of crucial importance to the future of the industry. “IFSEC is a place where all of the manufacturers of security products merge together”, said Glenn Fletcher, UK & Ireland Sales Manager for Milestone Solutions.

“In four days you can accomplish what would take you a whole year to do if you had to meet separately for meetings and arrangements.” Boasting eight seminar theatres in total, the extensive and freeto-attend education sessions and workshop programme ensured IFSEC International offered more education than ever before. IFSEC International is supported by leading industry and government associations and organisations: the British Security Industry Association (BSIA), UKTI/DSO, ASIS, National Security Inspectorate (NSI), Security Institute, Fire Industry Association (FIA), The Association of Police & Public Security Suppliers (APPSS) and The International Security Industry Organization (ISIO). James Kelly, Chief Executive of the British Security Industry Association said: “The British Security Industry Association enjoyed another successful year at IFSEC International, welcoming almost four times more visitors to its stand than in 2011.”

Huw Edwards, Norbain’s Marketing Communications Director, said: “IFSEC International has always been a great forum for networking and meeting with new and existing customers. This was a particularly exciting IFSEC for Norbain as it gave us the opportunity to launch and gather initial feedback on a range of new services, including Service Plus, Norbain Academy and my-nvc.com.” As keeping abreast of the latest industry trends is essential to visitors, IFSEC International 2012 saw the introduction of a number of key product areas. 2012 saw the showcase of IFSEC International’s first Lone Worker Protection Product Area, sponsored by Connexion2, created to support and protect the UK’s 8m lone workers. With everincreasing numbers of lone workers, IFSEC International recognises that it is crucial that employers have an effective system in place for the protection of their staff. Managing risks in the workplace is a duty of care issue. >

IN Security I July 2012 I 17


Show Review

“IFSEC International defined itself as the must-attend event that represents the ‘entire security buying and influencing chain’ from across the globe”

Adding to this, a number of new and interactive feature areas such as How Lighting Affects Surveillance and the ipAssured Education Zone, hosted by Anixter, proved incredibly popular throughout the four days of IFSEC International. Acknowledging a number of successes across the security sector this past year, the IFSEC International Security Industry Awards, produced in association with the British Security Industry Association (BSIA) and headline sponsored by Norbain Group, took place during IFSEC International. Proving to be a highlight of the week, this spectacular night, hosted by BBC sports favourites Mark Lawrenson and Dan Walker, saw more than £4,000 raised for its charity partner ActionAid. Charlie Cracknell, Event Director for IFSEC International, said: “IFSEC International defined itself as the must-attend event that represents the ‘entire security buying and influencing

18 I July 2012 I IN Security

chain’ from across the globe. With a strong proposition combining the leading security and fire manufacturers, integrators, training via first-class free education, new show features, interactive experiences and networking, IFSEC International stepped up to the challenge. This has only been possible with the support of our partners and exhibitors and the commitment from our visitors”. Demonstrating a variety of the latest industry products and developments from across the globe, the international contingent once again excelled itself at IFSEC International this year. With eight country pavilions including China, Taiwan, Korea, Germany, France, Italy and the USA accommodating leading manufacturers and suppliers, IFSEC International cemented its position as a leading global industry event. n Visit www.ifsec.co.uk/global for more information.

A IFSEC International 2013 takes place from 13-16 May 2013. For further information or to discuss exhibiting opportunities please visit the website at www.ifsec.co.uk or contact Peter Poole, Event Manager: Tel: +44 (0)20 79218284 Email: peter.poole@ubm

14-17 MAY 20 NEC BIRMING


power of integration

Easy security management with Honeywell WIN-PAK® integrated solutions. Security installers are facing increasing demands to provide sophisticated security systems that are scalable, easy to manage and easy to customise. With that in mind Honeywell provides the WIN-PAK® software that enables integration of access, video and intrusion detection systems. As the software supports both analogue and Honeywell IP video platforms, installers can easily migrate their customers to the latest IP digital technology with minimal disruption to their business. WIN-PAK's innovative technology allows the integrated system to be managed efficiently via one single software interface, simplifying control for the user. And with over 100,000 systems installed globally, installers can rely on WIN-PAK for powerful functionality and proven performance. It's the power of integration, it's the power of Honeywell.

To find out how others have benefited from the power of integration, visit our website at www.honewell.com/security/uk/integration © 2012 Honeywell International Inc. All rights reserved.


Power Solutions

Powering stand-alone security Fuel cells are the ideal solution for those looking for a silent source of extended run power for indoor or outdoor security applications

B

usinesses are increasingly experiencing situations where there is a need to protect assets using security applications like CCTV where there is no ready access to grid power. Stationary audio and video surveillance systems for monitoring and protecting people and equipment are becoming more common in locations such as building sites, public events and festivals, along highways and in other remote locations. More often than not these kinds of locations do not have access to the mains grid,

20 I July 2012 I IN Security

which means that other sources of remote power must be sought. Typically the power demand is relatively low, which often means batteries are used to provide the power required. But, depending on the number of batteries in place, the operator will need to replace them regularly with fully charged batteries to ensure continuous power. As an alternative to batteries and traditional generators, fuel cells can provide reliable off-grid power for security applications for weeks on end, without the need for costly field maintenance trips.

Fuel cells also offer a much better solution than traditional generators, especially where there is a need for covert installations for undercover surveillance. A fuel cell is quite simply, an electrical generator that works very much like a battery. The only difference is that instead of recharging it, it is refuelled like a traditional generator. Put simply, a fuel cell generates electricity by reacting fuel and air without burning. For standby power systems, businesses can use fuel cell generators in place of traditional generators, and


Fuel cells are a clean energy alternative. The electricity is created via a chemical reaction and the only emission is water vapour. This makes the unit more versatile as it can be used both outside and indoors

enjoy some significant benefits that are advantageous to security applications. These include:

Long runtimes Fuel cells will produce power 24/7 regardless of the weather conditions (unlike some renewable energy alternatives). This makes them viable for off-grid surveillance and security applications, as well as standby power. As long as there is an ample supply of fuel, the fuel cells will supply power for as long as it is needed.

Cleaner emissions Because diesel generators produce

harmful emissions – such as carbon dioxide, carbon monoxide and nitrogen oxide – they have to be placed outside where it is completely ventilated. Fuel cells conversely are a clean energy alternative. The electricity is created via a chemical reaction and the only emission is water vapour. This makes the unit more versatile as it can be used both outside and indoors.

operational, which again makes them ideal for indoor use or where noise may be a problem.

Less noise

With few moving parts, fuel cells require little maintenance. This makes them a more efficient and reliable power source with lower lifetime costs than traditional generators.

Perhaps one of the biggest drawbacks of using a diesel generator is the noise it produces: typically about 90dBA. In contrast, fuel cells are virtually silent when

Non-detectable Fuel cells are suitable for silent operations. A running, integrated fuel cell cannot be recognised from the outside. No vibrations, noise, exhaust or heat are detectable.

Low maintenance

AVAILABLE PRODUCTS The following are three fuel cells that are most suited to security applications for providing prime power in off-grid applications: EFOY Pro range The EFOY Pro range from SFC Energy is family of methanol fuel cells offering up to 100W of continuous power. These units are plug-and-play prime power solutions offering long runtimes for autonomous power. Mobixane The Mobixane from Air Liquide Hydrogen Energy is a portable hydrogen fuel cell that can generate up to 2.5kW of power. The unit is supplied as standard with sufficient hydrogen storage to run the fuel cell at peak load for up to eight hours, but fuel can be supplied to run the unit for any length of time. CommPac 500 Air Liquide Hydrogen Energy’s CommPac 500 offers 500W of fuel cell power for runtimes of up to eight weeks. It can be installed quickly and easily and requires little maintenance.

IN Security I July 2012 I 21


“the first company in the UK to have developed and installed fuel cell technology for standby power applications”

Experience the Benefits for Yourself At UPS Systems we’ve installed more fuel cells in the UK than any other company. And our experience is that once a customer has experienced the unique benefits of fuel cells they quickly become an advocate.

UPS Factfile Who are UPS Systems? Founded in 1993, we pioneered the concept of “one-stop-shop” distribution for standby power products, creating a single source for UPS and generators from all major suppliers. We are also the first company in the UK to have developed and installed fuel cell technology for standby power applications. How often is your product portfolio updated? Being the UK’s largest independent supplier of standby power solutions, we maintain a comprehensive cross-matched database of standby power solutions from all the world’s major manufacturers. We constantly update this database as new products and product upgrades become available, or when changes are made to the specification or price. What services do you offer? We help our customers to identify a suitable solution to meet their exact requirements. Customers have access to a complete range of standby

22 I July 2012 I IN Security

power services, from initial sizing advice to complete project management that incorporates system design and integration, delivery, off-load and installation through to full system commissioning. We also provides annual maintenance contracts – including preventative maintenance visits, remote system monitoring and engineer call-out for generator and fuel cell installations. What else do you supply apart from UPS and generators? We are an authority on fuel cell technology, and implemented the UK’s first two commercial hydrogen fuel cells providing standby power. Covering prime power and standby power solutions, our fuel cell product portfolio embraces systems powered by methanol, hydrogen and natural gas. We are currently working on projects where our customers will use fuel cell technology to supply backup or prime power to telecommunications, remote telemetry, portable signage and renewable energy applications.

What makes you different? We are completely independent of any product manufacturers; this enables us to offer impartial technical advice across the widest range of standby power solutions. We are very different from manufacturers or most resellers, who can only propose solutions from within the product ranges they supply – our recommendations are based solely on the ability of a product to do the job required. Who can be contacted for more information? For background information, case studies or supporting photography on fuel cells, please contact: Chris Dace, Resonates Tel: +44 (0)1635 898361 upssystems@resonates.com For further information about UPS Systems – the company, its management and people – please contact: Roger Foggitt, Marketing Manager Tel: +44 (0)1488 680521 rfoggitt@upssystems.co.uk n



surveillance

Doing time Kevin Brownell and Martin Grigg consider the surveillance and access control challenges facing stakeholders in the custodial sector and assess the solutions available to them


Video analytics has come of age in recent years in terms of the precision with which the software can be “taught” to recognise and discount ambient or acceptable movement and so minimise nuisance alarms

H

owever it is expressed – and prison authorities will use a different vocabulary from that of security manufacturers – the aim of everybody in the custodial field must be to be innovative while also minimising risk. In such a demanding environment as the custodial market, true innovation through a so-called “best of breed” approach is unlikely to come in the form of an integrated set of products from a single manufacturer. It is up to the consultant to combine individual offerings, and even a moment’s thought will reveal how wide that product range might be. Perimeter intrusion, access control, CCTV, video analytics, thermal imaging, biometrics, video conferencing, asset tagging and X-ray are just a few of the areas that a consultant in the prison sector must cover. As we walked the floors of IFSEC recently, pondering a future prison installation, eager sales people assured us that their ONVIF or PSIA compliance guaranteed compatibility with any other security discipline we might have in mind. If we had so much as hinted at the complexity of the project we were dealing with they would have run a mile. One of the biggest challenges in custodial environments is the speed with which incidents can develop. A prison officer who has been alerted to an affray needs to make a series

of decisions based on accurate information: “What is the nature of the alarm or problem? Who is involved? What kind of resources do I allocate? Do I need external support? Is this situation likely to escalate?” Frequently, if an incident is to be resolved successfully with the help of security technology, warders will rely not so much on the functionality of individual products but on forethought from a consultant and the whole methodology put in place by the integrator when combining those products.

Scene analysis But certain developments have been crucial, and video analytics is a key area for any consultant who is serious about ensuring prisons benefit from CCTV. In our own custodial work for c-hq security services, increasingly sophisticated scene analysis algorithms and alarm optimisation are proving vital, not only in preventing escape but reducing attempts at self-harm and smuggling of contraband. Research conducted by criminologists at the University of Queensland and published in The Prison Journal for June 2008 remains valid – the conclusion being that CCTV has a greater impact on non-violent, planned misconduct than on spontaneous violence. This is particularly relevant to self-harm where video analytics can alarm on

movement in a cell above a certain height in the event that an inmate is looking for a ligature point. During the very month that consultants like us were assessing products at IFSEC and judging their potential to safeguard prisoners, two deaths occurred on the same day at a young offenders centre in Belfast, with the Northern Ireland Prison Service reporting that a ligature had been discovered in both cases. The fact that the prisoners did not appear to know each other and the deaths are not being linked underlines the scale of the problem. It is a primary duty of any security consultant in the custodial sector to envisage how a determined, knowledgeable inmate may contrive to self-harm and then to work with prison authorities in ensuring that cell design minimises this risk.

Not a one-way street Video analytics has come of age in recent years in terms of the precision with which the software can be “taught” to recognise and discount ambient or acceptable movement and so minimise nuisance alarms. Analytics can now alert warders or custody desk staff to behaviour that is consistent with a prisoner being in distress, such as a adopting a prone position in an inappropriate part of the cell. A common misconception is that prisons and correctional centres >

IN Security I July 2012 I 25


“Analytics can now alert warders to behaviour that is consistent with a prisoner being in distress, such as a adopting a prone position in an inappropriate part of the cell” are an anomaly within the security sector, in that the sole remit of authorities is to ensure inmates remain within an enclosed site. But diligent consultants and innovative manufacturers have been quick to realise that keeping would-be escape assisters out of a designated sterile zone is also an important task for prison authorities. Perimeter protection technology can be combined effectively with video analytics to address this.

Jailbirds with a difference The subtlety of activity by collaborators on the outside is a consistent wonder to us. This was reinforced recently when c-hq spoke to developers at a VMS manufacturer who told us that the standard behaviour of throwing a tennis ball full of heroin or cocaine over a perimeter fence has been replaced by the more subtle tactic of stuffing a bird carcass with drugs. Our associate is now considering how to create an algorithm variant that will create an alert on such a scenario. If you doubt any of this, a simple Google search on the topic will give you a documented case at Mount Eden Jail in New Zealand.

Cell call systems and lifesigns monitoring Developments in virtual visitation should be distinguished from cell call systems involving the bi-directional relay of video, graphical and audio data between a cell and a control room or charge desk. Here, prison authorities can impart information such as details of a scheduled fire alarm, cell inspection, work routines and visits by health workers. Prisoners can contact their legal representatives or professionals who are helping them with counselling and drug detoxification. Recent advances in custodial control room management software mean that, at tender stage, prison authorities should now be specifying systems

26 I July 2012 I IN Security

that support cell call, intercoms, panic alarms, lone worker protection, alarm management functionality and vital signs monitoring.

End-to-end auditing Successful implementation of surveillance technology at custody suites relies on rigorous end-toend auditing from initial reception to booking-in and detention. The demands made on such systems by ACPO guidance documents and the Investigatory Powers Act 2000 are some of the most stringent within the security industry. Technology should be demonstrably easy to use with footage being available 24/7 to authorised personnel. Similarly, time stamping and clock synchronisation throughout a facility must be scrupulous. A principal reason for these demands is, of course, to ensure detainees are cared for appropriately and there is transparency at all times. But the measures and legislation are also designed to prevent spurious complaints and allegations. Responsible, informed security consultants working in the custodial sector will strive for an integrated environment in which video, audio and access control function together in a single solution but without losing sight of the fact that the role of electronic surveillance is to support manned guarding and not replace it.

Joined-up thinking Even though they are technicians by profession, it is crucial for consultants and installers to think outside their engineering remit. Research coming out of the Jill Dando Institute of Crime Science at London University is stressing how technical innovation should be combined with good staff relations, the listeners’ scheme and an environment that is normalised wherever possible. Judicious application of surveillance products by a responsible installer working with the right consultant can achieve a balance between securing the facility, maximising staff safety and protecting prisoners’ rights. If this balance is struck, warders can spend less time as traditional gaolers and are freed up to maximise inmate welfare. Kevin Brownell and Martin Grigg are directors of Sussexbased c-hq security services. They have combined experience in the security industry stretching over half a century and their backgrounds cover many aspects of electrical engineering. c-hq security services is an independent specialist security technology and resilience consultancy practice with a demonstrable track record in successful prison and custodial applications. n For more information, go to: www.chqconsulting.co.uk



audio-visual

Watching the Games Panasonic audio-visual security equipment contributes a safe and enjoyable London 2012 Olympic and Paralympic Games 28 I July 2012 I IN Security


”Electronic surveillance is one of the key tools, not only for making the Games a secure event but also for helping with monitoring and control of large groups of people and transportation management,” explained Sean Taylor, Senior Manager of Panasonic London Olympic Project Office

S

ince the founding of the International Olympic Committee (IOC) in 1894, planning and organising what is renowned as the world’s foremost sports competition has grown to be a vast undertaking, with more than 200 nations competing in the summer Games every four years. With London 2012 swiftly approaching, the London Organising Committee for the Olympic and Paralympic Games (LOCOG), has for several years been focused with the task of staging a memorable Olympic and Paralympic Games in the UK’s capital. With 26 Olympic sports and 20 Paralympic sports, it is the equivalent of staging 46 World Championships simultaneously. Events must be organised across 37 competition venues, with 14,700 athletes, 21,000 media and broadcasters and approximately 10.8m ticket-holders. With the clear objective to ensure a real legacy to inspire people to join in and truly make the London 2012 Games “everyone’s Games”, it is of essential to ensure the safety and

security of everyone participating at every level across all the events, to deliver an experience which everyone can enjoy. The Olympic Park itself is the size of 357 football pitches, and with up to 800,000 extra visitors expected in London on the busiest day of the Games, the surrounding areas such as the “last mile” – the final miles walk from the main London Transport links to the London 2012 venues – will be a key focus for the various agencies and organisations involved in security. “In these locations electronic surveillance is one of the key tools, not only for making the Games a secure event but also for helping with monitoring and control of large groups of people and transportation management,” explained Sean Taylor, Senior Manager of Panasonic London Olympic Project Office. “Our involvement with the Olympic Games – and TOP sponsorship as Official Worldwide Olympic Partner in the Audio and Visual Equipment category – has been in place for more than 20 years, but Panasonic

contributes to the success of the Games beyond sponsorship alone and is deeply involved with the Games as the primary supplier of AV equipment solutions. These range from large displays, broadcast equipment and of course CCTV surveillance solutions at event venues and live sites, and even equipment used to support training programmes of athletes such as the British sailing team and heptathlete Louise Hazel.”

A “turnkey” surveillance solution In terms of size, LOCOG’s Security Overlay Project is one of the single biggest procurements of security products ever completed in the UK. Although the event timescale is just 77 days, it includes back-to-back multiple installations occurring simultaneously during the Olympic and Paralympic Games sports schedules. The co-ordination of the project is therefore huge, with up to 50 different contractors on site at any one time. One of the biggest challenges of the project is a requirement >

IN Security I July 2012 I 29


“The Panasonic surveillance solution will play a key role in assisting with crowd control, asset protection, monitoring of pedestrian and vehicle screening areas and as support for the venue security control centres” to deliver a completely workable “turnkey” solution. With so many sites being used, which normally are not used for these types of events, the need to get everything installed and up and running correctly in the limited time between scheduled events is imperative. Panasonic’s approach to this has been to address the specific requirements of the various customers and stakeholders, which has resulted in the pre-configuration of systems, asset tagging and even customising cables and packaging to make the workflows as seamless as possible. What is more, Panasonic had established a pre-configuration team at the Panasonic System Networks UK Engineering Centre in Newport, where a modular approach had been taken to every aspect of the install project to assist with and help ensure a reliable and fast installation of the surveillance equipment. Two types of Panasonic IP surveillance equipment will be employed during the Games: one static camera and one pan-tilt and zoom (PTZ). In addition, the WJND400 and WJ-NV200 network video recorder (NVR) recording systems will be used, along with the associated monitoring and control screens. The Panasonic surveillance solution will play a key role in assisting with crowd control, asset protection, monitoring of pedestrian and vehicle screening areas and as support for the venue security control centres, which are directly linked to the emergency services. With Panasonic known as such a reliable brand in all the markets in which it operates, and with a long history of providing electronic surveillance and many other AV equipment solutions to the Olympic Games, Panasonic is proud to be helping make sure the London 2012 Games are an experience which everyone can enjoy. n

30 I July 2012 I IN Security

Panasonic announces new security team leader Following the promotion of Paul Meehan from his position as Head of Panasonic Security Solutions to Head of Panasonic System Communications Company Europe (PSCEU), Panasonic is pleased to announce the appointment of Ian Compton as Head of Security UK and Ireland. Compton brings with him a wealth of valuable industry insight from previous senior sales management roles. Compton’s sales career began at Alban Group where he was a sales manager for Northern UK & Ireland. Ian also fulfilled a position at Morley Electronics Ltd as National Sales Manager. Ian subsequently developed his career in electronic security by joining HID Global, a leading provider of secure identity solutions, where he worked in sales and business development positions. This later led to him becoming the company’s Director of Sales. Ian’s rich background in sales, electronics and security solutions, along with his strong knowledge and leadership skills, will enhance the PSCEU team. Ian explained his reasons for joining and what he can offer to Panasonic: “I bring a wide range of experience from the electronics and security industries, along with a fresh approach to leadership which I will use to motivate and maintain the team’s consistent focus on security projects and customer centric solutions.,” he said. “Panasonic is a true leader in technology with a very wide gamut of business technology solutions, and this huge capability to serve across a wide range of requirements is an important part of what makes Panasonic attractive to me and our partners.”


Dual vision, Real time. ULISSE COMPACT THERMAL The positioning unit oers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTS www.videotec.com


access control

Safe as houses

Ingersoll Rand’s PegaSys intelligent access control system has revolutionised security for a French holiday village

T

he Cap France Holiday Village in Terrou near the Causses du Quercy Natural Park has recently been renovated by volunteers to bring the holiday facilities back to life in order to revitalise tourism in the area. The holiday village includes 60 villas which are rented to holidaymakers, together with associated services including restaurants, entertainment halls and an administration block. It is managed by Cap France, a federation of holiday villages comprising 103 destinations across France – in locations covering the seaside, mountains and countryside.

32 I July 2012 I IN Security

The brief With more than 120 keys being issued on a weekly basis, along with staff keys and pass keys for cleaning staff, the original key-based system was proving inadequate. Guests losing keys, or forgetting to return them at the end of their stay, plus staff losing pass keys, all contributed to very real security concerns for guests and their belongings. As part of the renovation, Cap France wanted to update and replace the traditional locks with a system which could better cope with the high number of visitors and weekly turnaround of guests. Security aside, the existing key

system was also difficult to manage because replacements and cutting requirements took up valuable staff time and generated repeated additional expense.

The solution Ingersoll Rand has worked for several years with the Cap France Group and has a long, proven history of success for this type of application. To resolve the problems, it was decided to use an access control system that was cost-effective to install, capable of coping with the influx of visitors and easy to update and control from a central location. It was also important to find a system which would allow reduced running


The PegaSys intelligent access control system is a perfect example of how a system can save both time and money for administrators while enhancing security and guest safety

A beacon of security

costs for items such as ongoing key duplication and management. The PegaSys intelligent access control system is able to meet all these needs. It is a perfect example of how a system can save both time and money for administrators while enhancing security and guest safety. Basically, it provides an instant and economical way to upgrade mechanical doors to an electronically-controlled access solution. It is easy to manage and designed for sites such as this where its wire-free interface can control access to the entire village from a central location without the need to hardwire each terminal. The administration office is able

to issue cards to visitors as they arrive and cancel lost or stolen cards, all with the touch of a button. Staff keys can also be programmed to permit access to specific areas, thereby eliminating the previous site-wide access which was possible with pass keys. Another benefit of PegaSys is its ability to record and provide an audit trail for each card. For example, should a question be raised by a member of staff or a guest about a specific incident, the audit trail enables the administrator to find out who accessed which areas and when. PegaSys is simple and easy to install and manage. It is specifically designed so it can not only be retrofitted to traditional euro cylinders, but will also complement existing technologies – so that sites that already have systems such as Mifare Classic or Legic can easily integrate them. Terrou Site Director Jean Christophe Veau comments: “The PegaSys system is perfect for us and has totally solved our problems about site security. There were no installation or configuration difficulties and we are now much more comfortable with the knowledge that access to individual guest villas and staff areas is tightly controlled. We really like the traceability function which is so important should a concern be raised because it lets us ‘see’ past events and which staff and guests accessed where.” n

Lighthouse Healthcare provides specialist support and rehabilitation services for people with challenging behaviour and complex needs across eight hospitals and care homes in England and Wales, with a total of 174 beds and over 600 staff. It was originally formed through the acquisition of a number of different trading companies, and the merger necessitated a uniform set of systems and procedures for shift planning and absence management as well as timesheet management. One of the original group companies was already using Interflex for its timesheet management while others within the group were using basic spreadsheets or even manual systems. This eclectic mix of procedures needed reorganisation into one single efficient system which could cope with various demands and aspects of HR management. Ingersoll Rand Security Technologies was approached to investigate and provide a solution. Following detailed discussions which aimed to identify all the required functions, a combination of solutions was suggested. These included biometric hand readers linked to the Interflex IF6020 software management system. The system was ultimately specified as it was shown to be highly efficient, scalable and adaptable. Biometric hand readers are a quick and easy way to prevent unauthorised entry to sites while permitting authorised personnel to access secure areas. When linked to the Interflex IF6020 it works in harmony to provide accurate time and attendance information, shift patterns, holiday and sickness information all of which feeds into the payroll system ensuring complete accuracy of data. >

IN Security I July 2012 I 33


“The PegaSys intelligent access control system is a perfect example of how a system can save both time and money for administrators while enhancing security and guest safety”

In addition, the system can be used for shift planning and rostering, as well as for human resources data, audit trails and better management of resources which reduces the need for external agencies. It can also be used for better monitoring and accountability of hours worked when used to check contractual obligations. The system is controlled centrally and provides real-time data which helps to identify and eliminate problems. Another advantage of the centralised system is that reports are managed and used by the people who need them (such as head office), eliminating the need for individual unit managers to produce and issue reports, thereby freeing up their time. Biometric hand readers are a quick and easy way to prevent unauthorised entry to the sites while permitting authorised personnel to access secure areas. The biometric hand reader captures a three dimensional image of the hand using a 32,000-pixel image array. More than 90 measurements including the length, width, thickness and surface area of the fingers and hand are taken. An advanced algorithm determines the unique aspect of the hand and then generates a nine byte hand template which is stored and used for subsequent comparisons. The system eliminates the risk of fraud and costs associated with “buddy punching” (two people accessing together). It is currently the most proven biometric system available. n

34 I July 2012 I IN Security


With unique IR lighting concept

• 5-megapixel CMOS image sensor with technology • Automatic Day/Night switching supported by integrated ambient light sensing • Homogeneous IR illumination by high power LEDs • Minimum illumination 0 lux • Megapixel varifocal lens (Day/Night): F1.0 / 2.8 – 11 mm • Frame rate up to 30 fps •

compliant

• Voltage supply via PoE (Class 0) hall 4, stand D80

IR-Cam_186x129_EN.indd 1

06.02.2012 11:05:55

Any App on the Credential of my choice.

)) Any service I can imagine, any security level I desire. All on one chip. On the credential of my choice. Contactless smart card technology: www.legic.com

))


British Security Industry Association

Smarter Event Management James Kelly, Chief Executive at the British Security Industry Association (BSIA), looks at how CCTV can help keep events safe

36 I July 2012 I IN Security


BSIA member companies have been focusing their efforts on how the police can utilise smart phone and tablet technology to further enhance the operational capabilities of video surveillance solutions where crowd management and control is a pivotal requirement

Whether it be a music festival, football match or even the London 2012 Olympic and Paralympic Games, there is little doubt that ensuring the safety and security of thousands of spectators can be a testing business. This is especially true given the dynamic nature of this type of environment, where the situation can change in a matter of seconds due to antisocial behaviour, criminal activity and the clash of rival fans. A key driver for video surveillance technology at events like these is being able to provide the best possible situational awareness so that those in the control room, command vehicle or on the ground can see the bigger picture of what is happening. This wider view, with CCTV footage linked to a digital map of the vicinity, ensures officers and event stewards can be marshalled effectively. At a tactical level, operators can drill down to obtain more detail on a

specific incident as it develops so extra resources can be brought to bear and, if necessary, potential troublemakers identified and dealt with. An additional trend is to provide officers with smart phone and tablet technology so they can access and feed back situationalcritical information. Looking in more detail at the type of solutions now being employed around major events, one capability that stands out is the Football Command Vehicle which offer a high visibility presence. Being mobile and typically featuring multiple CCTV cameras, including a mast-mounted unit, these vehicles provide a good all-round view and can be moved to specific hotspots. This could be where rival fans tend to cross, or adjacent to public houses in the vicinity of a stadium. Experience has shown that careful positioning of a vehicle, in conjunction with a small number of officers, can effectively maintain a large

crowd’s dynamics by moving or splitting sections of fans, thus preventing dangerous bottlenecks and clashes from developing. Alongside vehicles, other rapidly deployable forms of CCTV are also becoming a frequent sight at events, especially those which are temporary in nature such as music festivals. Self-contained mobile CCTV towers can be towed to site and set up on the perimeter and at key areas to monitor and control access. Another approach to surveillance is the use of automatic number plate recognition (ANPR) cameras at the entrance to events to flag-up the vehicles of individuals who have a history of anti-social or criminal behaviour. More recently, BSIA member companies have been focusing their efforts on how the police can utilise smart phone and tablet technology to further enhance the operational capabilities of video surveillance solutions where crowd management and control >

IN Security I July 2012 I 37


“One solution allows police to use their Blackberry phones and tablets to both view and record video footage while they are in the midst of the action�

BSIA Chief Executive, James Kelly is a pivotal requirement. In one solution that is being rolled out, the police can use their Blackberry phones and tablets to both view and record video footage while they are in the midst of the action. Crucially, should an incident suddenly kick-off, they can call up what is happening on their phone so they are not necessarily always relying on someone in the control room verbally relaying what is going on, which can take time. In addition, from a recording perspective, by using the in-built camera on their device they can take a snapshot or record an incident as it happens. A major step forward here is the ability to ensure this evidence can be given sufficient weight in court. Being connected back to the security management platform means there is a time and date stamp associated with the video so it can be logged as an incident in the same way as footage caught on a

38 I July 2012 I IN Security

CCTV camera would be. Another development that is gaining traction is the adoption of body-worn cameras. While historically having the right infrastructure and bandwidth has been an issue for the widespread adoption of these systems, the good news is that this is now being overcome as models are being brought to market that are able to stream video and audio content over advanced next-generation IP radio networks. These are certainly exciting times from an event management perspective, as we witness the roll out of smarter surveillance solutions to deliver an overarching view and to act as a powerful force to complement existing crowd management security measures, allowing the police and venue security personnel to make the most of their finite resources. Regardless of the systems employed, however, the first step

towards ensuring the quality of a CCTV system is avoiding rogue suppliers. Relying on the expertise and advice of quality CCTV providers becomes essential to ensure longevity and reliability of a system, and will provide event organisers with a better return on their investment. Members of the British Security Industry Association (BSIA)’s CCTV section meet strict quality criteria, are keen promoters of best practice in the CCTV industry, and have a wealth of experience securing sporting events. They are therefore best placed to advise on the technology available to secure an event. n For more information visit www.bsia.co.uk/cctv


22-25 OCTOBER 2012 St.Petersburg, Russia Lenexpo

21ST ST.PETERSBURG INTERNATIONAL

SECURITY & FIRE EXHIBITION SECURITY SECUR URITY Y TECHNOLOGY T GENCY NCY RESCUE RES FIRE SAFETY AND EMERGENCY EQUIPMENT RO OAD D AND A TRAFFIC SAFETY ROAD

Information Security. Counter Surveillance

INTERNATIONAL NTEERN NATIONAL SPECIALISED EXHIBITION ATIO ON SSECURITY. COUNTER SURVEILLANCE INFORMATION

WWW.SFITEX.RU +44 (0) 20 7596 5170, contact@securityshows.com


product Listings

  

ABLOY

ompletely equipped according to

solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

Bosch Security Systems

Fermax Our clients are the

Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and individualconference demands solutions. www.boschsecuritysystems.com

Carl Friederichs GMBH

Police vehicles with specialized

DSX manufactures integrated

Abloy Oy is one of the leading manufacturers of locks, locking systems and architectural hardware and the world´s leading developer of products in the field of electromechanical locking technology. ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience. www.abloy.com

Carl Friederichs provides made-tomeasure special-purpose bodies - for cash-in-transit and valuables transport, guard containers, universal information vehicles, service, van and platform bodies or mini-busses for passenger transport. Our flexibility, specific know-how and close cooperation with our clients help us address your special needs and individual demands. technical equipment www.friederichs-germany.de 

main installer companies in the electrical and electronics sector and companies specialising in residential communications and security; professionals with whom we establish lasting bonds based on good purchasing conditions, one to one technical assistance service and an exceptional product, which we design in anticipation of their needs. www.fermaxuk.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com



pt

Dallmeier One of the world

grated

isit ace ined 7th

mm

MAN bus for secure transport of prisoners -

hall 4, stand D80

leading providers of products for network-based video surveillance solutions, already has more than 25 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. completely equipped according to individual demands www.dallmeier-electronic.com

Rapid response vehicle 06.02.2012 11:05:55

Armoured 4x4 sports utility vehicle

Police vehicles with specialized technical equipment

  40 I July 2012 I IN Security  We would be delighted about your kind visit on booth 35 at the Ambulex 2011 taking place at The Fire Service College, Moreton-inMarsh, Gloucestershire GL56 0RH, United Kingdom, on Wednesday 6th and Thursday 7th July 2011.

Rapid response vehicle

Honeywell Security Group

delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com


To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207

ess usiness.

Access )) my Business.

IndigoVison eading manufacturer of end-to-end IP video security solutions for airports, rail, traffic, cities, retail, banking, mining, education, casinos, police, prisons and government. These enterpriseclass systems improve organizations’ operational efficiency, enhance public safety and enable timely emergency response. IndigoVision operates from six regional centers, New Jersey, Sao Paulo, Singapore, Dubai, London and Edinburgh. www.indigovision.com

SALTO understands that new

Legic

Samsung Security

The LEGIC brand is now known around the world and stands for quality in contactless ID technology and in smart card systems for personal identification applications operating at 13.56 MHz. www.legic.com

Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

March Networks

TimeKeeping Systems

working practices means security has to continually change and evolve. With this in mind, SALTO has developed a wide range of innovative products such as the SALTO Virtual Network and XS4 access control platform, while our electronic escutcheons, wall readers and on-line and off-line control units now control security access for a growing range of end users from airports to hospitals, banks to government buildings and universities to hotels. www.saltosystems.com

))

))

))

ity level I desire. my choice. ww.legic.com

29.03.2011 10:55:29

imagine, any security level I desire. n the credential of my choice. card technology: www.legic.com

o.indd 1

29.03.2011 10:55:29

The economical way to mount

multiple screens for Security & Control rooms

Dual vision, Real time. ULISSE COMPACT THERMAL

Mode-al Mode-AL Thedesign positioningand unit offers an integrated

s specifically targeted at and Retail industries as the shelf deliveries, fast t effective product.

The economical way to mount

anufacture an affordable quirements with features mounting of all screen of screens.

multiple screens for Security & Control rooms

at as st

le es en

At March Networks, we focus on delivering intelligent video management solutions that help our customers realize the true business value of networked video. For close to a decade, leading commercial and government organizations worldwide have used our digital video and business analysis applications to reduce losses, mitigate risks, improve security and work more efficiently. www.marchnetworks.com

solution for total darkness, fog, rain or smoke. manufacture Flat Screen Mounting Systems for the Broadcast, Audio Mode-AL Visual and Ltd Security industries. Some of our most Unit 32 Riverside Way popular products include UxbridgeMonitor Stacks, Media Walls, Speed Middlesex Rack and Plasma Stands as well as UB8 2YF our Bespoke Products and Furniture United Kingdom T: +44 (0)including 20 3398 3398 19” Racking, Video F: +44 (0) 870 1359413 Conferencing and Telepresence E: sales-uk@mode-al.com W: www.mode-al.com Solutions. www.mode-al.com

Videotec Dual vision, Real time.

Videotec manufactures in-house ULISSE COMPACT THERMAL a wide range of CCTV products recognized for high performances, flexibility and style. Our mission to lead the field in the development of robust, reliable and high performances mechanical and electronic products for surveillance applications is the driving force behind our success. www.videotec.com

The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTS www.videotec.com Mode-AL Ltd Unit 32 Riverside Way Uxbridge Middlesex UB8 2YF United Kingdom T: +44 (0) 20 3398 3398 F: +44 (0) 870 1359413 E: sales-uk@mode-al.com W: www.mode-al.com

was founded in 1986, is a leading manufacturer of data collection products. Guard1 Plus and The Pipe have been accepted as the preferred and recommended guard tour products of many large companies. As a result, we have had the opportunity to work with many of the largest companies in the security industry. Our customers set a high standard and much of our success has come from working to meet their expectations. www.guard1.com

CCTV PRODUCTS www.videotec.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.