Cover June13_Layout 1 04/06/2013 12:18 Page 1
June 2013
Risk management, loss prevention and business continuity
Video analytics for business intelligence Extortion, blackmail and dirty tricks Energy management as an added value benefit Essential news for risk mitigation professionals
Project6_Benchmark_May13 08/04/2013 16:11 Page 1
www.fujifilm.eu/fujinon
Everything in sight
Megapixel Vari Focal lenses 1/3" YV2.7x2.2SA YV2.1x2.8SR4A YV2.8x2.8SA YV4.3x2.8SA YV10x5HR4A YV3.3x15SA YV3.3x15HR4A
D/N
3 MP 3 MP 3 MP 3 MP 1.3 MP 3 MP 1.3 MP
f = 2.2~6 f = 2.8~6 f = 2.8~8 f = 2.8~12 f = 5~50 f = 15~50 f = 15~50
mm mm mm mm mm mm mm
1 /2.7" YV2.7x2.2SR4A YV2.8x2.8SR4A YV3x6SR4A YV3.3x15SR4A
D/N D/N D/N D/N
3 MP 3 MP 3 MP 3 MP
f = 2.2~6 f = 2.8~8 f = 6~18 f = 15~50
mm mm mm mm
1/2" DV3.4x3.8SA DV10x8SA DV10x8SR4A
D/N
3 MP 3 MP 3 MP
f = 3.8~13 f = 8~80 f = 8~80
mm mm mm
1/1.8" DV3.8x4SR4A DV4x12.5SR4A
D/N D/N
3 MP 5 MP
f = 4~15.2 mm f = 12.5~50 mm
D/N
D/N
Fujinon. To see more is to know more.
comment_riskuk_Dec12 04/06/2013 12:26 Page 1
Comment
Editorial Comment he recent much-publicised news that Defense Distributed had designed, tested and made available the plans to create a firearm from 3D printer files has created much debate about this use of the technology. Whilst the launch of the Liberator plastic gun made headlines around the world, it was – at that time – just the latest step in the creation of 3D printed weapons. Previously, a modular assault rifle had been created with the lower receiver being printed from a 3D file. Other parts of the rifle, such as the stock and barrel, were purchased freely and without control. The lower receiver is the only element of the weapon considered a ‘firearm’ under law in the US, and is therefore the only part which is regulated for sale. Whilst much of the coverage of the Liberator raised concerns over widespread access to firearms and the potential for weapons to be internationally distributed, this misses the important issues raised by an on-going programme of development. The launch of the Liberator, and the shortlived distribution of the files required to create the firearm, seems to be a political statement. Whilst there have been claims of cryptoanarchism, the main message is one that challenges perceptions of how gun control laws conflict with the real world. Whilst many have viewed the creation of a 3D printable weapon as making guns available to all, the reality remains that for most people intent on obtaining a firearm, the 3D process is expensive, difficult and likely to deliver a product that is as dangerous – or sometimes more dangerous – to anyone firing it than to those in front of the gun! The manufacture of rudimentary weapons is nothing new. Zip guns have been widely made and used by criminals and gang members for decades, and in many countries in the Western world the practice only died out because it became easier to attain genuine firearms via the black market. The biggest issue, and the one that should concern risk mitigation professionals,
T
It is important not to miss the real concerns surrounding the creation of 3D printable weapons... especially those in the airport, port and borders agencies, is that guns created from 3D printing could be undetectable by current technology. The Liberator includes a mass of metal in its design in order to meet legislation that firearms must be detectable. However, it could easily be removed. If the objective of Defense Distributed was to make undetectable weapons available to terrorists and criminals, it could be argued that their approach would have been significantly more clandestine. Not only would it have afforded them a less fraught entry to market, it would have also earned them more money. In the past few days, news has surfaced of a newer 3D printed weapon. Named the Lulz Liberator, this is claimed to be significantly cheaper to produce, more accurate, and can fire more rounds. There is no doubt that further advances will occur, and costs will fall while reliability increases. With claims that military research departments are experimenting with everything from 3D printed drones to weapon parts that can be created in the field, debating the future of 3D printing for the creation of weapons and weapon parts is pointless. Just as the growth in IT technology affords us a wide range of benefits, so those benefits will also be realised – in a negative way – by those seeking to create terror-based acts or indulge in criminal activity. For those involved in risk mitigation, it is vital to look beyond the failings of the current crop of 3D printable weapons, and to consider strategies which apply to these threats, along with those yet to unfold. The power of modern technology is changing the risk landscape for many, and whilst the first eye will always be on military, governmental or political targets, the speed of IT adoption by some means those threats can translate into everyday risks in a very short matter of time. Pete Conway Editor – Risk UK
If the final objective of Defense Distributed was to make virtually undetectable weapons available to terrorists and criminals, it could be argued that their approach would have been significantly more clandestine. December 2012
3
www.risk-uk.com
contents_riskuk_Dec12 04/06/2013 13:07 Page 2
EN54-23 Fire Beacons
Superior EN54-23 Coverage With a greater coverage pattern, fewer devices are needed to cover open areas. Sonos Pulse ceiling mount devices have a 15m coverage diameter, which can cover a 10m x 10m room with a single device. A 7.5m diameter product would require 4 devices to cover the same area; 5m diameter coverage would require 9 devices.
Sonos Pulse VAD
7.5m VAD
5m VAD
C-3-15
C-3-7.5
C-3-5
1 Beacon
4 Beacons
9 Beacons
Signalling Solutions
contents_riskuk_Dec12 04/06/2013 13:08 Page 3
June 2013 Signalling Solutions
Sonos Pulse Ceiling EN54-23 Coverage: C-3-15
Contents 3 Comment The risk landscape will evolve rapidly as new technologies – and new threats – emerge, and those involved with risk mitigation must be ready to act
6 News News stories relevant to risk management professionals
12 Extortion, Blackmail and Dirty Tricks If your business is faced with extortion-based threats, do you mitigate or negotiate? Risk UK considers the best approach to achieving a resolution
Sonos Pulse Wall EN54-23 Coverage: W-3.5-11.5
18 Energy Management For many businesses, existing systems can address energy wastage and deliver true cost savings through the use of occupancy-related data
22 Video Analytics Risk UK considers the potential to realise management benefits from analytics technology, and questions whether it offers more to business intelligence applications than it does to security implementations
29 Cyber and Data News News of interest to data security professionals
33 Vertical Sectors
FEATURING:
Risk UK introduces sector-specific information, and looks ahead to some forthcoming markets including retail, transportation, petrochemical, food processing, utilities, education, border control, data centres, city centres, health, construction and the leisure industry.
44 Next Issue Risk UK looks ahead to the July 2013 issue
71 Risk UK Directory ŕ EN54-23 compliant beacon technology ŕ Wall and ceiling mount light orientations ŕ Wide coverage pattern - one device can protect most rooms ŕ 20mA beacon current @ 0.5Hz flash rate
ISSN 1740-3480 Risk UK is published 12 times a year and is aimed at risk management, loss prevention and business continuity professionals within the UK’s largest commercial organisations. © Pro-Activ Publications Ltd, 2013 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without the written permission of the publisher. The views expressed in Risk UK are not necessarily those of the publishers.
Risk UK is currently available for an annual subscription rate of £78.00 (UK only)
Editor Pete Conway Tel: 0208 295 8303 E-mail: pete.conway@risk-uk.com Design & Production Matt Jarvis Tel: 0208 295 8310 Fax: 0870 4292015 E-mail: matt.jarvis@proactivpubs.co.uk Advertisement Director Paul Amura Tel: 0208 295 8307 Fax: 0208 295 1919 E-mail: paul.amura@proactivpubs.co.uk Administration Tracey Beale Tel: 0208 295 8306 Fax: 0208 295 1919 E-mail: tracey.beale@proactivpubs.co.uk Managing Director Mark Quittenton
RISK UK PO Box 332, Dartford DA1 9FF
Tel: +44 (0)1706 233879 www.klaxonsignals.com/fire
Chairman Larry O’Leary
Editorial: 0208 295 8303 Advertising: 0208 295 8307
5 www.risk-uk.com
news jun13_riskuk_jun13 04/06/2013 12:39 Page 2
News EMEA security survey highlights integration
Fike supports training centre Fike Safety Technology (FST) has donated its Twinflexpro intelligent two-wire fire alarm systems to DCET Training, one of the UK’s providers of accredited training courses for the fire industry. Formed in 1995 by the electrical contracting industry, DCET has three training centres in Exeter, Plymouth and Redruth, and provides a wide range of training including apprenticeships, wiring regulations, inspection and testing and advanced level 4 diplomas. DCET has always had close links with the fire industry and has developed and delivered its own fire alarm familiarisation courses for many years. The business actively promotes the importance of fire alarm training, and works with the FPA to offer accredited fire alarm and emergency lighting courses at their centres and on site. The Twinflexpro panels and detectors will be used not only on FPA courses but also to show electrical apprentices a fully functioning fire alarm system based on the latest technologies.
6
www.risk-uk.com
VidSys, a provider of Physical Security Information Management (PSIM) software, has announced the findings from its second annual EMEA Security Survey. The sample included senior-level IT and physical security professionals from public sector, corporate enterprise and national government organisations, and revealed a focus on integration technologies and tools that facilitate improved collaboration and information sharing. The results highlighted that organisations see the importance of implementing standard operating procedures (SOPs), and are focusing on risk assessment as a key tool in prioritising security spending. Survey findings indicate that financial challenges continue to be the biggest obstacle to more rapid deployment of security solutions for some organisations. More than 35 per cent of respondents reported that they use security devices and systems from six to ten manufacturers, with many describing their security environment as being composed of multiple technologies that are individually managed through multiple, distributed locations. Over 50 per cent of those surveyed rank the deployment of integration technologies as one of the top three items they plan to implement in order to improve their operations in the next 12-18 months, while 80 per cent of respondents rank the ability to leverage both physical and IT security together to identify, manage and resolve security situations as ‘important’ or ‘extremely important’. When asked to identify the areas of biggest concern to their organisation’s current situation management operations, 50 per cent of respondents named risk management. In addition, 71 per cent specifically noted plans to invest in risk management technologies in the next 12-18 months. Though showing signs of improvement, budgetary concerns continue to hinder the development of the security environment. Respondents said that insufficient budget is by far the biggest organisational obstacle to moving their security operations forward during the next 12-18 months.
news jun13_riskuk_jun13 04/06/2013 12:40 Page 3
News
TSI reports high interest in Diploma The Security Institute has reported high levels of interest in its Diploma in Security Management. A key part of its on-going commitment to raising professional standards, the Diploma was launched in 2009 and is aimed at middle and senior managers seeking career advancement via an industry specific qualification. Over 100 people successfully completed the course in 2012. ‘The qualification is open to all those who work within the private and public security sectors and who possess a minimum of five years’ security management experience,’ stated Di Thomas, general manager at the Security Institute. ‘It offers a logical progression from our Certificate in Security Management and those currently on the course include security managers, health and safety managers, facilities managers, senior police officers, fire service personnel and experienced members of the armed services.’ Combining theoretical and practical content, the Diploma is available as a distance-learning course, and is recognised by four of the UK’s top universities – University of Lancaster, University of Leicester, Buckinghamshire New University and University of Portsmouth. The course consists of five mandatory modules and usually takes no more than 12 months to complete. Many of those taking the course have full time jobs and the content has been designed to allow students to configure their coursework around their daytime activities. Support, advice and guidance is also offered from a number of expert tutors who, as well as configuring the course content, are also members of the Security Institute and holders of Masters’ degrees in security. Successful students are awarded an Edexcel accredited BTEC Level 5 Professional Award in Security Management. The Diploma in Security Management acts as a stepping stone to higher education and is now recognised as a part of existing degree courses. The Institute of Criminal Justice Studies at University of Portsmouth recognises the Diploma, and awards 80 credits towards a total of 360 for its BSc (Hons) Risk and Security Management. University of Lancaster awards the Diploma to those completing its Foundation Degree in Security Management at Blackburn College, while University of Leicester exempts students from three core modules on its Foundation Degree in Security and Risk Management. Buckinghamshire New University offers credits towards the second year of its BA in Security Consultancy. Upon embarking on the course, individuals are encouraged to apply for student
Mitie announces annual results Mitie, the outsourcing company, has announced its results for the year ended 31 March 2013. The headline results reflect strong revenue and earnings growth, with revenues up 8.4 per cent to £1,980.6m and operating profit before other items increasing by 8.3 per cent to £122m. The company reported organic headline revenue growth of 5 per cent. It mobilised an integrated facilities management contract for Lloyds Banking Group, at £775m over five years. There were also new contracts with BSkyB and Ladbrokes, as well as property management contracts for London Borough of Hammersmith & Fulham and Golding Homes. The acquisition of Enara for £110.8m delivered an entry point to grow within the wider healthcare market. Ruby McGregor-Smith CBE, Chief Executive of Mitie Group, stated, ‘We have had another good year with success in achieving organic growth driven by new and expanded contracts, as well as completing a strategic acquisition in healthcare. Whilst the economic environment remains challenging, we have reshaped the business to focus on long-term facilities management opportunities, as well as higher margin healthcare provision and energy consulting, all of which will support our growth aspirations. ‘We expect outsourcing opportunities will continue to grow, with a trend towards more clients seeking to access integrated services. We are positioned to build further on our long track record of sustainable profitable growth.’ membership of the Security Institute, which remains valid whilst they are studying. Blackburn College and University of Leicester offer this as standard to all their security students. After they have finished the course they become eligible to apply for full membership grade and can gain access to the complete range of benefits.
7
www.risk-uk.com
news jun13_riskuk_jun13 04/06/2013 12:40 Page 4
News
Cost of ‘unhealthy’ workspace claimed at £7 billion
Connexion2 acquired by Kings III Lone worker system supplier Connexion2 has been acquired by the US-based emergency communications company, Kings III, in a strategic move to strengthen core business offerings and to develop sales strategies in new target regions. Both businesses supply solutions to a range of market sectors and share a customer-centric ethos. The acquisition will allow the business to increase the scale of its lone worker solution whilst ensuring that customers continue to receive the right level of support. Connexion2 was launched in 2003, and manufactures the Identicom lone worker device. The manufacturer claims there are over 110,000 devices in circulation offering verbal abuse capture, man down detection, GPS and camera functionality in a discreet unit. Kings III was founded in 1989 and provides emergency communication solutions across North America. The business also provides turnkey solutions for use in elevators, at poolside, in garages, car parks, cash machines, arenas and large facilities. Connexion2 will retain its existing trading name and brand presence throughout the United Kingdom. The acquisition will help facilitate development of a number of key European and Asian markets.
Murco refrigerant leak detectors receive UL approval Murco’s range of refrigerant leak detection products are UL 61010-1 approved, meeting the industry standard to provide adequate protection for end users against fire and shock. The full range of Murco products (MGD, MGS, IAM and ST-IAM) have passed the UL 61010-1 approval for electrical measurement and test equipment. Murco’s gas leak detectors alert personnel of potentially hazardous conditions through a range of products which can detect almost any gas including every refrigerant gas such as
8
www.risk-uk.com
Unhealthy workspaces are costing UK businesses more than £7 billion per annum in sick pay, according to ergonomics company Fellowes. A new survey has been cited as illustrating that badly set up or poorly equipped workstations result in one in five office workers missing almost three weeks of work a year from health problems such as backache (40 per cent), tense shoulders (37 per cent), eye problems (30 per cent) and depression (17 per cent). Creating a comfortable and productive environment for employees is not a big investment, according to the company, and can positively affect the bottom line of a business. One half of office workers report that they’ve not had workstation risk assessments in the last 12 months despite it being a legal requirement. In addition to the lack of risk assessments in the workspace, a further 40 per cent of employees do not have access to ergonomic accessories which can help to relieve or avoid poor posture and discomfort. The research found that almost half of those questioned said health problems caused in the workplace were having a negative impact on their personal lives, with 16 per cent saying it damaged relationships and one in five suffering lasting depression as a result. General practitioner and health broadcaster, Dr Sarah Jarvis, stated, ‘The impact of the working environment on office workers’ health is all too often overlooked by businesses. What is very clear from the research is that the way you work and the equipment you use has a major impact, not just on your workplace health, but on your wider health too. ‘On a daily basis I see many patients suffering particularly from back pain, and I ask routinely about workplace set-up because I know the consequences of poor posture and spending long periods sitting in the wrong position.’ Ammonia (NH3), Carbon Dioxide (C02/R744), R134a, R404a, R407a, R410a, R507a, R11, R12, R22, R600a, R290 and many more. General Manager Derek Ryan stated, ‘At Murco safety is our primary concern. UL 61010 is a European recognised safety certification which reinforces Murco and Bacharach’s product credibility to end-users across our full range of products.’ Murco supplies detectors targeting all applications in the refrigerant and air conditioning industry. From large supermarkets to cold rooms or small plant rooms, all detectors are compliant with F-Gas Regulation, EH40, EN378, Ashrae 15, Ashrae 147, UL and CE.
dycon ad risk jun13_Layout 1 04/06/2013 13:41 Page 1
Dycon have 12 & 24Vdc
Dycon only re manufactu in Wales
solutions from 1 to 10A
Boxed or PCB
– all switched mode
only options
technology
for maximum
p.s Dycon have only
flex ibilit y
ever made switched mode!
Purchasing Dept, we need new, greener PSUs now! We need energy-efficient PSUs. We don’t want to be at the mercy of Far East delivery schedules so please look for a hi-tech UK manufacturer. Can you find a single source for all our needs, Intruder, Fire, CCTV, Access and PoE!
Each Dycon PSU saves at least £20 electricity p.a. compared to old conventional linear PSUs.
Dycon
It’s a no brainer then!
call DYCO N today
01443 471060
m info@dyconsecurity.co
They even have spec circuits that can
ial
extend battery life
by up to 12 months,
how much will that
save us each year service calls??
on
news jun13_riskuk_jun13 04/06/2013 12:41 Page 6
News
NAID Certification expands in United Kingdom UK-based secure destruction company Glazewing has earned NAID AAA Certification for compliance with operational and security specifications for its information destruction processes and services. NAID AAA Certification is earned by completing a security audit conducted by an accredited security professional. To maintain the certification, Glazewing will be subject to surprise audits as well as routine scheduled audits. NAID CEO Bob Johnson stated, ‘According to the UK data protection laws, organisations have a responsibility to make sure destruction services can adequately protect personal information. Glazewing has made fulfilling that responsibility much easier by becoming NAID certified. ‘We learned many years ago that frequent unannounced audits dramatically enhanced compliance. They have to know an audit can come at any time, even if they recently had one.’ Glazewing joins Shredall and Allshred who have already achieved NAID AAA Certification. Though the number of certified companies in the UK is small, it is growing as customers demand vendor qualifications. NAID currently has more than 40 member locations in the UK and almost 2,000 member locations globally.
Rospa Gold Award for fourth year For the fourth year running, McArthurGlen has been presented with the Gold level health and safety award by UK-based safety charity, the Royal Society for the Prevention of Accidents (Rospa). Part of the Rospa Occupational Health and Safety Awards, it was presented on 16 May at a ceremony at the National Exhibition Centre. The awards scheme dates back 57 years and is claimed to be the longest-running programme of its kind in the UK. The scheme recognises commitment to accident and ill-health prevention, and is open to businesses and
10
www.risk-uk.com
Wireless bridges help manage Sainsbury customer car parks Wavesight’s outdoor wireless CCTV transmission bridges have been chosen by Euro Car Parks and deployed at multiple Sainsbury car park locations throughout the UK. Sainsbury has over 1,000 stores nationwide and offers its customers free parking. However, not all those parking actually use the stores, resulting in lost sales and revenue. The supermarket chain began noticing that people using their car parks but not shopping at their stores were reducing the number of spaces available for customers. The national car park management company, Euro Car Parks (ECP), was appointed to install ANPR technology to combat this problem. People leaving their vehicles in the supermarket’s car parks for over the permitted time automatically receive a Parking Charge Notice through the post. To achieve effective monitoring, ECP commissioned the installation of ANPR camera solutions that read and store the number plates of any vehicles entering and exiting the car parks. To avoid any potential disruption and to keep costs low, wireless technology is used as a transmission medium for sending the images back to the stores, where they are stored. This solution means that civil engineering works are not needed; power for the wireless radios and cameras is provided via existing car park lighting columns. organisations of all types and sizes, both national and international. The scheme not only looks at accident records, but also entrants’ overarching health and safety management systems, including practices such as leadership and workforce involvement. David Rawlins, Rospa’s Awards Manager, stated, ‘Rospa firmly believes that organisations which demonstrate commitment to continuous improvement in accident and illhealth prevention deserve recognition. McArthurGlen Group has shown that it is committed to striving for such continuous improvement and we are delighted to honour it through the presentation of an award.’ David Norris, Operations Director at McArthurGlen Group, added, ‘This is a great honour to receive such a prestigious award. At McArthurGlen, we are committed to providing the best possible shopping environment. Safety is a key issue, and we are committed to continuously improving our standards.’
000__RiskUK_dec12 04/12/2012 13:26 Page 1
s
Open up your mind for new possibilities Cerberus PRO - the open protocol solution for best fire protection
www.siemens.com/cerberus Cerberus PRO now comes with an open protocol for EN 54-13 approved systems that allows greater freedom of choice.
A wide, open horizon is a promise. A promise of freedom and countless opportunities. All of a sudden, everything becomes possible. Cerberus速 PRO opens up to a new horizon and a higher level of freedom. With an open protocol, it lets you discover a whole new world of state-of-the-art fire detection. Keep peace of mind, while Cerberus PRO protects people and assets from fire with the highest possible standard of safety, reliability and service.
Cerberus PRO from Siemens is a high quality fire detection system and a future proof investment. It comprises powerful and networkable control panels, intelligent detectors and a broad range of peripheral devices. With more than 160 years of experience and know-how, Siemens offers reliable and false alarm free fire detection.
Answers for infrastructure.
extortion jun13_riskuk_jun13 04/06/2013 13:14 Page 2
Extortion, blackmail and other dirty tricks No business or organisation is immune from the malicious threats of others seeking to exploit some perceived advantage for their own personal gain. Whether it is a disgruntled ex-employee threatening to disclose trade secrets, an unknown individual forewarning of engagement in mass-contamination of the supply chain, or insinuation of potential cyber-attacks, serious threats to an organisation's commercial and reputational interests must be managed quickly, sensitively and with a successful outcome. Risk UK, with the help of legal director Stuart Ponting, considers the issues that face many businesses and organisations.
with a promise – either direct in nature or veiled – to bring that organisation 'to its knees' unless payment is made, services granted, or some other advantage given to circumvent the threat. Perceived vulnerabilities exploited by those making malicious threats often revolve around computer systems, data security, product safety, process control or supply chain integrity. Even more concerning is the fact that often those making the threats are current or former employees of the organisation, or are already known to the business against whom the threat is being made.
The right response hreats for businesses and organisations can come in many shapes and sizes, and from any direction. Most typically, extortion attempts will see an individual attempting to exploit a perceived weakness in an organisation
T
Any threatened organisation must respond immediately, and should take steps to better understand the threat. Those in a position to act must try to establish who is making the threat, and why it is being made. Is it solely for
Stuart Ponting is a legal director with international law firm, DLA Piper. He handles some of the UK's largest corporate crime investigations and is an expert in crisis management.
12
www.risk-uk.com
extortion jun13_riskuk_jun13 04/06/2013 13:14 Page 3
Extortion
financial gain, is there a grudge element to it, does it follow similar threats and seem to be a copycat incident, or are the issues rooted in some personal dispute? Another consideration needs to address what the outcome might be if the threat becomes a reality. By understanding the potential implications to the business in question, its staff, customers and others in the supply chain, then the worst case scenario can be established. This allows for thorough planning. That said, any business facing extortionbased risks must also not respond to each and every threat with a knee-jerk reaction. By better understanding risks and the situational concerns, an informed view can be taken to establish the probability of the threat being executed. Organisations should also take care to ensure they assess whether there are any immediate steps that must be taken to establish the protection of persons or property. This must include staff, third party workers involved with the organisation, and any members of the customer base. By fully understanding the threat, organisations can then assess the various risks, and subsequently outline options with regard to possible responses and resolutions.
Negotiate or neutralise? Immediately after an extortion attempt has been made, organisations have to make a fundamental decision that could arguably shape their entire approach and the ultimate outcome of the issues they face. Also, the decision could have implications with regard to how such risks are addressed in the future. Whilst many extortion and blackmail threats are not made public, businesses which do not take punitive action against those that make such threats – or are unable to take such action – may well find themselves targeted by ‘copycat’ incidents. When an extortion attempt is made, a criminal offence is committed. Most commonly under English law the offence is one of blackmail (contrary to Section 21 of the Theft Act 1968). At this point the police can be involved and investigations may commence with possible arrests being made and prosecutions following. However, involving the police does not suit everyone. Extortion attempts may be illegal, but behind the threats there may be a degree of truth or some vulnerability within an organisation which, if made public, would be far more damaging than the individual extortion attempt itself.
In addition, where more minor threats are concerned (often in the context of an employeeemployer relationship), the police and Crown Prosecution Service may not take the immediate and decisive action required by the employer. There may be no arrests and/or no subsequent prosecutions because the police
At the heart of successfully resolving blackmail or extortion attempts is the need to understand the motives and mentality of those making the threats. 13
www.risk-uk.com
extortion jun13_riskuk_jun13 04/06/2013 13:15 Page 4
Extortion
feel there is insufficient purpose for, or there would be no public interest in, prosecuting the suspect. Apathy from enforcing agencies is likely to be unacceptable to the employer. It may leave the organisation more vulnerable to further attack by encouraging a sense of immunity within those making the threats and/or by increasing hostility between the parties. Immediate recourse to the police is, therefore, not always the most favourable option, but equally any decision not to report a crime must always be carefully considered. If organisations do decide not to involve external agencies and therefore seek to manage the issues on a local level, a clear understanding of how to manage the process is fundamental to ensuring a successful resolution.
Managing the threat At the heart of successfully resolving blackmail or extortion attempts is the need to understand the motives and mentality of those making the threats. The threat may be genuine, but it could also simply be the chosen vehicle – albeit the wrong one – to attract the attention of an organisation that has been perceived, by those making the threat, to have been uncommunicative or unresponsive to conventional dialogue in the past. Where an organisation faces threats from current or ex-employees, or from persons known to it such as suppliers, customers or competitors, it should consider who within the organisation has knowledge or experience of the individuals concerned. Often such experience may be vital in resolving the situation. It is best if those working towards a resolution understand what might be motivating the individual to make the threats, and whether any issues which might be motivating the
Extortion attempts may be illegal, but behind the threats there may be a degree of truth or some vulnerability for an organisation which, if made public, would be far more damaging than the individual extortion attempt itself. 14
www.risk-uk.com
threats have been mishandled at an earlier point in time. Understanding motives often allows the identification of the most appropriate responses, and also the assessment of the genuineness of a threat. Rather than relying on a single individual to manage the issues (which may be the suggested approach in some crisis management protocols), having a select few individuals within the organisation will provide a number of opinions, insights and should produce a more considered view. This can often better identify the most appropriate way forward. Many minds may bring greater clarity, and ensure that personal judgements don’t cloud which approach might be best for the organisation in question. When handling extortion attempts, there is no substitution for experience and where this is not available within the organisation, specialist support should be engaged. The team also needs to be able to operate with unequivocal integrity and ensure that its dialogue and negotiations are not compromised by disclosures that may weaken the organisation more widely if revealed. If the organisation is perceived to be vulnerable to threats, especially if it seeks to resolve matters with a swift and full financial settlement, it may simply serve to encourage future prospectors. If negotiations are considered as an avenue worth pursuing, it may be appropriate to ensure that all dialogues and communications between the two parties are recorded. Whilst some issues can be resolved with dialogue, discussion and perhaps even an agreed settlement, others will not. An organisation may simply not be able or willing to meet the demands of those issuing the threat. At this point, police involvement could be unavoidable. Having clear, detailed and contemporaneous notes will assist the police with their investigations. They will hopefully also assist the organisation, both in terms of ensuring that its reputation is not damaged as a result of negotiations, and in providing an audit trail that may prove invaluable after the event has been concluded.
Considering continuity Often, organisations responding to extortion attempts focus solely on neutralising the immediate threat and do not give adequate consideration to business continuity plans. In parallel to managing the extortion attempt, organisations should immediately consider what steps they can take to mitigate any impact on operational and reputational resources,
015_Layout 1 04/06/2013 14:06 Page 1
VIMPEX Shaping Alarm Technology
extortion jun13_riskuk_jun13 04/06/2013 13:16 Page 6
Extortion
should the threat be executed. Also, consideration should be given to protecting people and assets during the process, as well as ensuring plans are in place should any follow-up or copycat threats be made. Elements that need to be addressed include decisions relating to the implementation of additional security measures, whether these be permanent changes or processes introduced on a temporary basis. Where data is threatened, steps should be taken to ensure that remote back-ups are in place, and that resilient and/or redundant systems can be accessed if required. Where threats might affect the supply chain, alternative suppliers should be identified, along with additional processes to ensure continuity. Confidential discussions should be held to ensure that any potential supply chain transition is smooth and fast to implement. Ensuring that business continuity is maintained protects the company and strengthens the organisation's negotiating position. Often, some degree of negotiation can ‘buy time’ to allow appropriate measures to be taken. A blanket rejection could lead to immediate execution of the threat. The decision to involve third parties will ultimately rest with the organisation, although in some circumstances where support is required, varying degrees of disclosure will be necessary and must be carefully managed. An organisation may have insurance cover for the costs associated with handling extortion issues and, if those threats materialise, there
16
www.risk-uk.com
may be policy coverage for any business interruption that occurs as a result. Clearly, in such a situation, insurers will need to be involved to protect the company's interests, but organisations must be clear about when they should make a notification and how that may impact on their overall strategy for handling the incident.
Moving on It will never be possible to totally eliminate the risks of extortion attempts or blackmail, nor for organisations to plan for every eventuality in the future. However, it is critical that after a business recovers from such an attempt that it learns from the experience, reviews its systems and procedures, assesses its response team actions and its overall conduct during the crisis. Thorough business continuity planning and regular testing of an organisation's crisis management systems can also go a long way towards mitigating future attacks, or at least the impact that they might have. A business may not be able to anticipate the threat of extortion or blackmail, but they can prepare and rehearse for all eventualities on a more general level. Finally, if an organisation thinks that such events will never happen to them because they have the systems and procedures in place to prevent any threats, management should apply themselves to consider how they would bring their own organisation to its knees. It won't take too long to find a way. Then it is time to work out how to close that gap.
017_Layout 1 04/06/2013 14:13 Page 1
OxyReduct® fire prevention
REMOVING THE T H R E AT O F F I R E .
The new Library of Birmingham has chosen OxyReduct® to protect its valuable archives, the same as over 700 other businesses and organisations around Europe. No matter how good your fire detection, extinguishing or suppression system is, a fire has to start for it to work – so some damage is inevitable. In mission critical applications where any business interruption is unacceptable or where warehouse stock or archives are invaluable, a different approach to fire prevention is needed. OxyReduct® employs innovative technology that continuously reduces the oxygen level in a room by adding nitrogen to the air. The oxygen is reduced to a level in which combustibles do not inflame and an open fire is impossible. Importantly, people can enter the area of risk. Visit our in-house demonstration facility and experience a fire-free environment at first hand.
www.wagner-uk.com
energy jun13_riskuk_may13 04/06/2013 13:11 Page 2
A Secure Approach to Cutting Energy Costs? For many businesses and organisations, reducing energy wastage is an important consideration. Such an approach can allow a business to boost its green credentials, reducing its carbon footprint, but of greater importance is the fact that energy reductions equate to reduced costs. What many end users might be unaware of is that if sites have advanced access control and intruder detection systems in place, they probably already have a solution which can help achieve these vital savings. Risk UK considers the security and safety solutions the can help deliver real-world economies. ost businesses and organisations will be aware of the impact of rising energy costs. Indeed, it is almost a regular feature of any survey considering risks against businesses in the UK that one of the top concerns is the cost of energy. Various increases in the cost of power are regularly perceived as the most significant risks against future business prosperity. Additionally, many business leaders cite the associated cost increases as being a significant driver towards lower levels of job creation. Businesses and organisations also understand that rising energy costs are a key concern with regard to whether a business can operate in a competitive market. A survey carried out earlier this year by Green Monday, gathered opinion from many of the UK’s largest businesses and organisations. It revealed that 62 per cent of respondents believed that UK energy costs were higher than, or would become higher than, those of similar economies from around the world. In the past, many businesses thought that the financial burdens associated with future energy usage would not come from the actual costs of fuel, but from the number of regulations and schemes being introduced to encourage compliance with the green agenda. However, the everyday costs of energy have become the major concern of a wide range of businesses, both in the service sector and mainstream industry. As an example, recent reports showed that 85 per cent of IT-based businesses considered that the rising cost of power represented a major concern to the long-
M
18
www.risk-uk.com
term viability of their organisations, with nearly 65 per cent also believing that the increased levels of environmental legislation represented a significant risk to long-term prosperity. Many businesses and organisations in the UK are exposed to a fair degree of vulnerability when it comes to energy costs, whether those are due to the rising price of power or the costs associated with environmental legislation. For many, the immediate reaction is to seek out new systems and solutions which deliver greener performance, enhanced efficiencies and a greater degree of control. This is often seen as the more immediate route to achieve cost reductions. Often, in the short term, these types of ‘solutions’ require an initial capital investment. The businesses and organisations then hope that the economies realised in later years will justify the degree of investment being made at the time. Of course, future price rises and any unexpected additional legislative moves will impact on the return-on-investment period. In reality, the escalating costs of energy need to be addressed through a combination of approaches, and whilst investment in more efficient systems for future benefits is certainly not to be ignored, it rarely offers benefits on day one. However, in the longer term, a brief look at the energy landscape for UK businesses does indicate that costs will continue to rise. The British Chambers of Commerce have called on the Government to address concerns over energy costs, with 40 per cent of businesses stating that energy costs have already adversely affected growth. Ofgem's energy capacity assessment predicts that spare power capacity could fall to 4 per cent in a few years time, leaving the UK reliant upon imported gas, which will cause significant price rises for businesses.
Immediate action Whilst replacing systems and devices with ones rated as being more efficient remains a significant move for many businesses and organisations, most identify the need to reduce current costs as a more important driver when considering energy management. Indeed, for many businesses, addressing traditional energy
energy jun13_riskuk_may13 04/06/2013 13:12 Page 3
Energy Management
wastage can deliver significant savings in the short term. Often the majority of such savings can be realised, because many businesses will already have in the place the systems required to achieve these economies. It can sometimes require nothing more than a simple shift in considerations of how the various existing technologies are utilised. It is interesting that for many businesses, the ‘public perception’ they wish to promote regarding energy use is that of active reduction of the carbon footprint, along with social responsibility. However, often the more significant driver is simply cutting costs. With that in mind, eliminating energy wastage actually achieves all three goals. Where a business or organisation has invested in an advanced intruder detection or access control system – or an integrated solution that encompasses both technologies – there will be inherent functionality which can be exploited with regard to the overall reduction of energy wastage.
Such systems can allow a degree of automation to be introduced that allows the elimination of unnecessary power consumption, because it can be based upon occupancy and use of an area, whether that be on a room-byroom basis, or by department, or even by building on a campus-type application. The implementation of occupancy-based automation can work in two ways. The most obvious approach is for systems to be shut down, or put into a ‘sleep mode’, when the areas are either not being used, or are unoccupied. In some cases, this approach can present threats with regard to health safety. For example, if an area of a processing plant requires ventilation for safe use, many organisations are loathe to shut this down when
The escalating costs of energy need to be addressed through a combination of approaches, and whilst investment in more efficient systems for future benefits is not to be ignored, it rarely offers benefits on day one. 19
www.risk-uk.com
energy jun13_riskuk_may13 04/06/2013 13:13 Page 4
Energy Management
areas are not occupied, for fear that employees could enter the area and start work again without remembering to reactivate the ventilation first. However, occupancy-based solutions can ensure that such systems are always operational when areas are in use, just as they can ensure systems are shut down when not in use. Whilst both technologies – intruder detection and access control – can offer status updates on the occupancy of an area, certain provisos do require consideration. With intruder detection systems, the reason for the use of such a solution is to prevent unauthorised access created by forcing an entry to a site. Typically, such systems will be designed to detect motion at the earliest opportunity. Therefore, if an area does not border the perimeter of a building, and does not attract any significantly high risk, then it is unlikely to be covered by the solution. Intruder detection is typically concentrated on the perimeter and potential points of access and egress. If an intruder breaks through a door and passes through a corridor, that is where the
Where additional devices are deemed to be necessary, a decision could be made to use AND/OR logic, thereby allowing occupancy to be linked with other criteria such as directional movement data to deliver more appropriate results for certain applications 20
www.risk-uk.com
system will detect them. In many applications, it makes little sense to install detection devices in areas where actual entry – without the intruder already having passed through a protected zone – is unlikely. Therefore, it might be necessary to install additional devices. If this option is required, then these additional devices can enjoy an added degree of flexibility, as they will not form part of any standards-approved alarm system. This could – for example – allow AND/OR logic to be employed, delivering directional discrimination when making energy-based decisions. By its very nature, access control reports realtime information about the occupancy of protected areas. Whether by department, building or even down to individual offices, modern access control solutions can allow reports to be analysed to assess the occupational condition of varied parts of a site. Dependent upon the degree of information held on individuals, the system could even be used to assess the roles of individuals within a designated area. For example, the system could close down IT systems, telephony and lighting when a department is unoccupied and all staff have ‘left’ the zone. Only lighting or basic level power would be restored if a cleaner or security officer then enters the area. Even during the working day, occupancy of each area could be continually assessed, allowing energy wastage to be minimised on an on-going basis. Where access control and intruder detection systems co-exist and are integrated, the two can work together to deliver ever more credible results. Because the system can assess who is in any given area, and then correlate that information with real-time motion sensing, a more intelligent approach to energy management can be delivered. The system could effectively use considerations based upon who is an a designated area, why they are (decided, for example, by their job role) and what they are doing (assessed by real-time motion tracking). The two elements working together can also ensure that security, which is the main reason for the installation of these systems, is not compromised.
In summary Access control and intruder detection systems both use occupancy-related data for differing reasons. It is not difficult to reassess how that data can be applied to simple energy management tasks. As such, these systems can offer low-cost but effective energy management to many sites.
021_Layout 1 04/06/2013 14:40 Page 1
Simply Brilliant Setting new standards for Access Control, Security and Automation SCALABLE True Enterprise solution delivering 1000's of controllers, 1000's doors and 1000's of zones POWERFUL State of the art electronics designed to give many years of seamless operation RESILIENT Designed with high level of self-protection EFFORTLESS Simple "Plug & Play" system expansion
ARRANGE A DEMO Call the Integriti team on 0845 470 5000 or email integriti@innerrange.co.uk
FLEXIBLE Range of Controllers & LAN modules designed to meet simple or complex access control, intruder detection and automation specifications FAST Streamlined installation and commissioning
“Integriti is a true Enterprise solution controlling thousands of doors and zones across multicontroller IP networks”
CONTRACT SECURITY SERVICES LIMITED CASH & VALAUABLES IN TRANSIT (CViT) SERVICE PROVIDER CASH PROCESSING & BANKING SERVICE (INCLUDING COLLECTION AND PROCESSING FROM CAR PARK MACHINES)
CASH CONSOLIDATION SERVICE SECURITY GUARDING AND MOBILE PATROL HEAD OFFICE: CHALLENGER HOUSE 126 GUNNERSBURY HOUSE LONDON W3 8LH T: 020 8752 0160 F: 020 8992 9536 E: info@contractsecurity.co.uk www.contractsecurity.co.uk
SALES: T: 01622 792639 F: 01622 882084 E: sales@contractsecurity.co.uk
DEPOTS: Brentford, London | Larkfield, Kent | Andover, Hampshire
anal jun13_riskuk_jun13 04/06/2013 12:56 Page 2
Adding Business Intelligence As advanced technologies are increasingly integrated with video surveillance solutions, so the range of benefits available to businesses and organisations increases. Whilst the main purpose for video surveillance deployment remains security, the flexibility which is inherent in modern systems allows an ever greater number of added value propositions to be exploited. One example comes in the form of video analytics; a technology which arguably makes more sense with regard to business intelligence than pure security applications. Risk UK considers the role of the technology as a management tool. ideo surveillance offers a wide range of benefits. These include security – both during and after events, where monitoring, information gathering and examination of incidents can all be achieved – and life safety. These two applications are amongst the more common uses for the technology. However, video captured by such solutions can also be utilised for a wide range of other applications,
V
22
www.risk-uk.com
such as training, management of personnel and traffic, process control, system status monitoring, web attraction, etc.. Typically, one system can be used for a wide range of tasks, allowing economies of scale to be created. Streaming and managed video is a very flexible tool, and the ability to create ‘layers’ of functionality allow diverse uses of the captured footage, typically without any compromise on the quality and credibility of video streams required for security and safety purposes. For many sites, whilst the security and safety elements are necessary, and are often the core reason why such solutions are specified, the additional functionality delivers tangible returnon-investment (RoI). While many speak of RoI when considering security systems, this is often very hard to quantify. Many of those selling solutions will hype up how their specific flavour of surveillance technology has a better RoI than others; typically these are the technologies they are trying to disrupt. As the economic climate
anal jun13_riskuk_jun13 04/06/2013 12:57 Page 3
Video Analytics
remains somewhat frosty, the RoI arguments are getting louder. The problem with this is that where security is concerned, RoI figures usually represent little more than guesswork. Most security systems do deliver a RoI. However, unless a business or organisation can formulate specific losses over defined periods of time, and then demonstrate that those losses have either been reduced or eliminated, it’s very difficult to put a clear figure on RoI. That said, few risk managers will expect RoI from a solution put in to mitigate sporadic and unforeseen risks. However, where the video is also utilised for other purposes such as site management and process control, RoI becomes a clear and identifiable benefit. Given current trends in technology, one aspect of advanced video solutions that delivers both security and business intelligence benefits is video analytics. Indeed, it could be argued that the technology offers a wider range of benefits when used for business intelligence and site management than when it is deployed purely as a security tool.
Added intelligence To best understand the pros and cons of video analytics, it is worth taking a very brief look at how the technology works. Often referred to as IVA (intelligent video analytics), it is vital to understand that the way the term ‘intelligent’ is interpreted is very different to our understanding of human intelligence. If anything, when used for IVA, it is something of a misnomer. The basis of IVA is a set of complex mathematical algorithms, and these are applied to the content of video images. The processing engine examines the content of each frame of video. With digital images, every pixel expresses a value – effectively a colour level. As the image is created, every pixel in the image frame displays the colour relative to that value. The analytics algorithms look for how these values change, relative to overall scene change, and identifies changes that correlate with those typical of the signature created by any given set of criteria. The real power of video analytics lies within these algorithms, and their ability to quickly and accurately identify change that is consistent with pre-defined signatures. Whilst this is a very basic explanation of the technology, is does illustrate some of considerations for analytics-based systems. Firstly, the system cannot make decisions or apply reason to its processes. If the value of an amount of pixels, in any pre-defined configuration and across a number of predetermined frames, changes within the
parameters set by the algorithm, a ‘rule’ is considered to be violated and an event is signalled. No logic, understanding or assessment of the conditions is entered into. The event is signalled, typically to an operator, who can then make any reasoned judgements. Where complex situations are being managed, it is common practice for numerous rules to be linked, typically using ‘And/Or’ logic. Whilst this is – in theory – a simple step, every additional rule introduces a potential point of failure, and adds complexity to the processing. Where the criteria for an event are simplified, the job of video analytics is made much simpler. This allows the technology to be more effective. Because video analytics looks for exceptions to expected behaviour, the technology works best when specific details of the exception are known and are simple. One problem with security incidents, in terms of establishing analytics rules, is that often the system must address the unexpected. Because criminals will always try to conceal what they are doing, the potential variables which must be programmed into the video analytics engine are manifold. This creates challenges when configuring analytics, and goes some way to explaining why many who use the technology for security purposes often opt for the use of a sterile zone
One problem with security incidents, in terms of establishing analytics rules, is that often the system must address the unexpected. Because criminals will always try to conceal what they are doing, the potential variables are manifold 23
www.risk-uk.com
anal jun13_riskuk_jun13 04/06/2013 12:57 Page 4
Video Analytics
to simplify any use of rules and subsequently boost overall performance. A sterile zone consists of some form of obvious demarcation between an area that people are permitted to be in, and an area which they are clearly excluded from. The idea of a sterile zone is not to physically restrict access to an area – although some sterile zones do just that – but to ensure that anyone entering the zone has done so with intent rather than accidentally. Typical approaches include fencing or other barriers, signage or audiovisual devices. By creating a sterile zone, this establishes that any activity in the area represents a violation, and this fact alone simplifies the creation of analytics rules, which in turn ensures that the performance of the analytics engine is optimised. It is the simplicity of the sterile zone, the ease with which a rule can be created when any presence is an exception, which makes it so effective when compared to scenarios with a greater number of variables. If someone is in the sterile zone, it is an alarm condition. The analytics engine simply needs to identify any person in that area.
The case for management The biggest difference between security tasks and business intelligence tasks is that typically, the latter are simpler to define. This is because the system is looking for something specific and predictable. Security use of video analytics typically looks for exceptions to normal
Video analytics technology can easily be utilised for monitoring processes or production lines, for marketing and footfall analysis, for entrance control, people counting, vehicle management, etc. 24
www.risk-uk.com
behaviour, of which there can be many, some being very hard to predict. It is much simpler to consider behaviours that are expected, and which you want to measure or validate. With most business intelligence-based solutions, the end user wants to be notified of specific events. These could include a conveyor belt in a depot stopping, a queue forming in a retail environment, vehicles travelling in the wrong direction in a car park, the number of people entering or leaving an area exceeding a threshold, etc.. Effectively, if the event which is to be notified contains visual information which can be captured by video – size, shape, colour, direction, motion or non-motion, speed, object appear or disappear, etc. – then a rule can be created. The rule can then be used alone, or in conjunction with other rules, to generate an alert. Video analytics is traditionally used to send an alert to an operator in a control room, to flag an incident as an exception on a recording management system, or to generate an alarm. However, other actions can be set, such as sending an email or SMS message, with a snapshot if required, to an authorised person. Alternatively, automated responses can be initiated. For example, if an area reaches a capacity level, a people-counting analytic program could automatically close a turnstile, or switch an announcement that those entering the area should wait. In truth, the actions instigated by a solution can be as flexible and varied as the causes of an exception. Every application can have bespoke video analytics created easily and effectively. If an offered solution lacks flexibility, then it will never be a wise investment. One example of the flexibility of analytics is used by a logistics company in Germany. Although the system was designed to deliver site security, it is also used to track parcels in the delivery centre. A core function of the system is to monitor the automated system which sorts and manages parcels prior to loading for despatch. Monitoring items on a conveyor belt is simple, because the potential exceptions are basic. If the belt stops running, or if an object is hanging off the side of the belt, or if an object appears or disappears on the belt, then an alert can be generated. These exceptions are all simple to define, and the analytics software does not need a complex set-up procedure to achieve this. As the chance of random or unexpected exceptions is minimal, the resulting simplicity makes the video analytics more efficient, more
025_Layout 1 04/06/2013 14:45 Page 1
multifocal sensor system
The Dallmeier Panomera速 Truck is on tour again!
ROADSHOW
2013
June 10th r Glasgow June 12th r Liverpool June 14th r Bristol June 17th r London
6FDQ IRU PRUH LQIRUPDWLRQ
www.panomera.com
'DOOPHLHU HOHFWURQLF 8. /WG Phone: +44 (0) 117 3039303 dallmeieruk@dallmeier.com
anal jun13_riskuk_jun13 04/06/2013 12:58 Page 6
Video Analytics
reliable, and certainly more cost-effective as a result. It also delivers a very real benefit to the business, and in turn saves money as any delays are immediately notified. Items that go missing in the process can be located by going back to their last ‘appearance’ in the footage to see what has happened. Video analytics technology can easily be utilised for a wide range of tasks beyond security. The technology can be used for monitoring processes or production lines, for marketing and footfall analysis, for entrance control, people counting, vehicle management, etc.. It matters not if the system is monitoring status LEDs or gauges on machinery, directing vehicles to empty loading bays, or even monitoring parcels on a conveyor belt, the technology can deliver benefits. The retail sector is another good example of an industry that can gain significant benefits from the use of video analytics as a management tool. One very simple application for video analytics is queue management. The video surveillance system can flag up any queues at fitting rooms or Point of Sale locations in real time, enabling management to introduce extra staff or open new tills. This ensures that potential customers aren’t lost by simply walking away. Out of working hours, video analytics can be scheduled to provide a high degree of security. Because many sites will be closed and unmanned creates a sterile zone. Effectively, if there is any movement or activity when the site is vacant, this can be assumed to be an alarm event. As with established sterile zones, this
26
www.risk-uk.com
approach allows the technology to deliver consistent performance.
In summary Video analytics, as a core technology, undoubtedly offers much more than security. The systems can be used to instigate actions in response to a wide range of visual exceptions. That these add business value is a bonus. The fact that the technology also introduces the often desired but rarely quantified return-oninvestment is another reason to consider it. Businesses and organisations are in a position where they can realise cost-savings, enhanced productivity and greater control over a wide range of elements within their business. Security and safety can be enhanced, and business intelligence information can be captured and processed to ensure that real-time information is available. Modern solutions can integrate with a wide range of devices such as smartphones, tablets and PCs, thus allowing relevant departments to access the data they require. Control over access levels ensure, however, that someone in the marketing department can view relevant data, but cannot make changes to the core functionality of the solution. In the past, many organisations shied away from the use of video analytics for business intelligence as they were concerned that security might be compromised as a result. Today’s advanced solutions ensure that both uses are well served, but also kept separate, and any conflicts are avoided by strict system control.
Project1_Layout 1 30/04/2013 13:49 Page 1
Project1_RiskUK_Feb13 01/02/2013 15:15 Page 1
Protecting your SrRÂżts
Loomis can help you to improve your FDVK ÀRZ and it’s security
/RRPis is tKe SrePier cDsK PDQDJePeQt sSeciDOist DQG Ze KeOS tR PDQDJe tKe SuEOic Ă€RZ RI cDsK We do this by providing services to organisations that handle cash, whether they need to transport cash securely, eliminate opportunities for shrinkage or analyse and understand their cash ow in detail. As the UK’s premier cash management specialist, we’re able offer you secure and technologically advanced services at every stage of your cash cycle. They save you money, protect you from shrinkage and attack, and allow you to analyse your cash ow right down to the last detail. Our services are built on strong relationships. No matter which sector you belong to, or what your requirements are, we work with you to continually reďŹ ne the service we offer – give you the best long-term value. If you need cash transit at short notice, collections of varying or smaller amounts, or simply want to pick up the phone and talk to your account manager – we’re here, and we’ll provide a quality of service that we don’t believe is on offer elsewhere.
Contact 0845 309 6419 Visit our website www.loomis.co.uk to ďŹ nd out more about our specialist cash management knowledge.
Our vision is to manage the public ow of cash – and we work to achieve it by providing you with the best, most secure, most technologically advanced cash management services available. 7R OeDrQ PRre DERut /RRPis DQG tKe ZDys Ze cDQ KeOS yRu ZKy QRt cDOO us tRGDy Rr Yisit Rur ZeEsite IRr PRre iQIRrPDtiRQ
Loomis UK Limited - 1 Alder Court, Rennie Hogg Road, Nottingham, NG2 1RX. Registered in England No. 3200432
cyber news jun13_riskuk_jun13 04/06/2013 13:10 Page 1
Cyber News
Infortrend announces 16G fibre channel storage Infortrend has announced the release of its 16G fibre channel (FC) storage solutions. Built upon the EonStor DS G7i platform, the new models provide a full range of options for SMEs and enterprises looking to optimise and future-proof storage infrastructure. The new options are available for the same price as existing 8G FC storage for a limited period. Demand for increased bandwidth and higher throughput has added pressures on technology that powers datacentres, cloud services and high-volume servers. With the introduction of 16G FC, IT departments are given access to an FC with double the throughput of 8GB FC, but that also runs any multi-core processor, SSD-driven application and service, according to the manufacturer. Thomas Kao, Senior Director of Product Planning at Infortrend, stated, ‘The constant demands for faster and higher performance never cease, with enterprises and SMEs always looking to optimise their current systems as well as to future-proof them. Upgrading to 16G FC represents a great leap for those who have invested in fibre infrastructure.’ The storage solutions are available in 2U/12 bay and 3U/16 bay options in FC and Hybrid FC plus iSCSI forms. There are eight 16G FC EonStor DS G7i models available.
BYOD still creates security issues New research from Kaspersky Lab shows 60 per cent of SMBs have only a basic understanding of what company data is stored on employees’ own mobile devices. A recent study by TNS Infratest found that despite the overwhelming BYOD (bring your own device) trend in business, only 35 per cent of IT managers admitted to having strict enough rules and policies in place to provide an accurate overview of company information contained on personal devices. As more employees use their own devices for business purposes, a lack of knowledge on the security implications of BYOD is presenting serious risks. With 525,000 mobile phones reported stolen in 2011/2012 as part of the Crime Survey for England and Wales, businesses can face company data falling into the wrong hands if not effectively managed. In the absence of a clear overview of what company data was on any lost or stolen device, it becomes difficult for IT managers to manage the potential repercussions.
Cyber and Data Security News ZeuS Trojan responsible for half of online banking attacks Along with phishing campaigns, banking Trojans are a principal method chosen by cyber criminals to attack users and manipulate online transactions. The G Data Security Labs analysis for the first quarter of 2013 has revealed that ZeuS Trojans and variants of these are currently the commonest programs used to launch such attacks, representing more than half of all infections detected during the first three months of this year. The ZeuS clone Citadel was one of the biggest culprits. The number of infections has increased slightly compared to the last quarter of 2012, even though arrests have once again been making life difficult for cyber criminals. The number of dangerous malware programs is expected to continue to rise in the coming months. Discovered families of banking Trojans in the first quarter of 2013 showed that ZeuS was involved in 57.58 per cent of attacks. Others included Sinowal (12.63 per cent), Tatanga (11.75 per cent), Bebloh (5.38 per cent) and Bankpatch (5.06 per cent). It is expected that ZeuS, Carperb and the like will continue to consolidate their stronghold in the area of bank customer fraud. The cyber criminals will bounce back from the numerous arrests of recent months, leading to another increase in the number of infections via banking Trojans. The income opportunities for cyber criminals in this crime sector are significant. Cyber criminals will increasingly look to cover their tracks during online banking fraud. As with a number of botnets, communication between banking Trojans and the command-and-control servers will take place in the background via anonymisation services such as the Tor network. In addition to this, experts expect that Twitter and other peerto-peer networks will continue to be misused by criminals. ‘You only need to look at the statistics showing the number of devices lost or stolen each year to see why it is so important for SMBs to have an accurate overview of what company information employees have on personal devices,’ states David Emm, senior security researcher, Kaspersky Lab. ‘Only when clear BYOD rules are in place can adequate steps be taken to build a robust security solution should a device be lost or stolen. To protect data a policy should include encryption, blocking access to the corporate network and, in the best case, wiping all data on the device.’ Encryption of data on devices is one of the most effective measures, but modern solutions also offer remote data wipe functions and GPS localisation of lost devices.
29
www.risk-uk.com
cyber news jun13_riskuk_jun13 04/06/2013 13:10 Page 2
Cyber News
Wi-Fi weaknesses still prevalent Google Android, Apple iOS, BlackBerry and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the potential for exploitation by skilled cyberattackers claims Raul Siles, a SANS Instructor. The vulnerability is dependent on how the network is added to the device and stems from the procedure where mobile devices keep a list of manually configured wireless networks plus any networks previously connected on a Preferred Network List (PNL). Every time the Wi-Fi interface is switched on, and on a periodic basis, the device checks through 802.11 probe requests what networks on its PNL are available in the current location. Based on the responses obtained, it tries to connect to the most preferred network. In the past, this network discovery process was performed by sending a generic probe request as an open broadcast plus specific requests for every network in the PNL. This meant devices disclosed the full PNL in the air, exposing themselves to karma-like attacks where an attacker can identify all the networks (or access points) the mobile device is trying to connect to and impersonate them. These fake networks can trick a victim’s device into connecting to the attacker’s network that then captures and manipulates its traffic to launch additional advanced attacks. ‘This situation has been known since 2004; Microsoft fixed it for Windows XP in 2007 and recently in Windows Phone devices, but it seems the other mobile device vendors are not as concerned,’ states Siles.
Carmarthenshire County Council takes data protection steps Carmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event Management) to reduce the cost of meeting regulations associated with the sharing of information on the Government’s secure extranet. The Welsh county council reviewed alternative solutions when its incumbent solution ran out of capacity and needed upgrading. All public bodies that connect to the UK Government’s Connect Secure Extranet are required to comply with a Code of Conduct, known as the Good Practice Guideline (GPG)13. This directive stipulates the need to maintain comprehensive log records of all failed network authentications for at least a month. To meet this requirement, the Council
30
www.risk-uk.com
PNL disclosure still applies to the latest Android 4.x versions and was acknowledged but not fixed since Android 2.x-3.x dating back to 2011. It is also prevalent when adding Wi-Fi networks manually in iOS 1.x-6.x and in BlackBerry 7.x, although in this platform it can be resolved from the advanced Wi-Fi settings, and in particular by enabling the SSID Broadcasted option. ‘In some cases, there are options that can be changed to avoid this issue but on most devices when a Wi-Fi network is added manually it presents the vulnerable behaviour and few users are aware of the security implications’, Siles claims. He believes that end users, corporate administrators and security professionals using or managing Android, iOS or BlackBerry mobile devices should become more aware of this behaviour and ensure that all the Wi-Fi networks available on the device PNL are treated as visible. He adds, ‘I need to stress that these types of client attacks are commonly left unchecked, and without consideration the modern smartphone could become the ultimate digital Trojan Horse, allowing attacks to breach ultra-secure locations. The threat grows as individuals start mixing personal and corporate activities, logons, confidential data and applications all on the same device.’ Siles also claims that the lack of attention to Wi-Fi security is not an oversight but intent by Google, Apple, and others to make device operation simpler for users. He says, ‘Unfortunately, a clever and targeted attack can use these simplifications as a staging post for a more damaging assault which traditional detection capabilities would be unlikely to spot.’ was logging 33 million events per day that it needed to store and analyse to produce regular reports. Idris Evans, the council’s IT Security Manager responsible for the 3,200-user network, claims the solution saves both time and money. Hardware storage costs are reduced as the system allows analysis of the log data stored online. The council’s previous solution only allowed 18 days’ worth of logs online, with the remainder stored offline. The IT department also required four hours to retrieve and analyse data each time they wanted to run a report. The new system delivers 2-3 years’ worth of online log storage capacity and takes minutes to analyse. The council is also planning to enable the local police force to use the solution for its own log monitoring purposes, but with completely segregated logs.
025_Layout 1 04/06/2013 14:58 Page 1
020__RiskUK_dec12 19/12/2012 22:25 Page 1
THREAT ASSESSMENT
REGULATORY COMPLIANCE
EMERGENCY PLANNING
OneFacility integrates people, process and technology, enabling organisations and the facilities they run to achieve regulatory compliance, mitigate risk and remain one step ahead. OneFacility consists of multiple applications including:
Threat Vulnerability Assessment Emergency Action Plans Incident Management Security Surveys 8VEMRMRK ERH 'IVXM½GEXMSR 1EWW 2SXM½GEXMSR Visitor Management Access Control Compliance and many more . . .
'EPP XS ½RH SYX QSVI 01684 850 977 onefacility@uk.g4s.com
www.1f.com
verticals jun13_riskuk_may13 04/06/2013 12:43 Page 1
Vertical Markets
Addressing specifics Whilst many general principles can applied across a wide range of businesses and organisations with regard to risk mitigation, the reality is that certain sectors face threats which are specific to their area or operations. Often, these can be so diverse that even the underpinning principles of risk management need to be adapted or rewritten. To address these needs, Risk UK will include focused editorial addressing the needs of many sectors with a requirement for a bespoke approach to addressing issues and threats. Here we take a look at some of the areas that will be covered. isk mitigation, crisis management and business continuity planning can never be applied in a formulaic way. Indeed, there is some truth that two sites involved in the same business sector, and with very similar operational models, can ultimately have very different requirements with relation to the management of risks and threats. Whilst some elements of risk management will be similar across a wide range of industries, there are certain sectors which have bespoke needs, because there are inherent risks in their roles. Often, such threats will be covered by sector-specific standards or regulations, and these can be unique to any given process, meaning that two organisations in the same sector may have significantly different needs. To better address these needs, Risk UK will be working with a wide range of experts to deliver sector-specific information on a variety of subjects, including health and safety, legislation, operating practices, fire prevention, disaster recovery, security and crisis management. Here Risk UK rounds-up a number of the business sectors that will be addressed in future issues.
R
33
www.risk-uk.com
verticals jun13_riskuk_may13 04/06/2013 12:44 Page 2
Vertical Markets
Construction
Airports, Ports and Borders Many of the threats against airports, ports and borders are high profile, and whilst easy to identify, are not easy to understand or mitigate. Issues are as diverse as terrorism, smuggling and duty evasion, unauthorised entry and exit, public safety, fraud, operational continuity, etc.. Such sites have to balance a preparation to deal with the unexpected with regard to incident handling, along with investigations, document checking, asset and personnel management, safety and security, all without having a negative impact on customer service and care. The resources available to airports, ports and border-based sites are diverse, and it would be very simple to take spending overbudget by trying to address a huge range of issues that simply cannot be legislated for. Instead, much of the skill associated with risk management at such sites is the ability to exploit a whole range of benefits that can be achieved with modern technology, and by linking these with carefully considered policies and procedures, to address a wider number of threats and risks whilst staying within prescribed budgets. By working with experts within the various risk management sectors specific to airports, ports and borders, Risk UK will consider the best ways to deliver operational continuity, safety and security whilst also ensuring that the high levels of vigilance required for such applications are maintained.
34
www.risk-uk.com
The construction sector faces what can be defined as traditional risks – health and safety for visitors and workers, noise and pollution issues, infrastructure disruption, supply chain continuity – as well as new challenges as crime against such sites rises. The traditional risks are inherent for any organisation undertaking construction projects and involving the movements of raw materials, plant and vehicles, staff working at heights, the use of hazardous and combustible materials, etc.. The construction sector is constantly under scrutiny with regards to operational procedures, health and safety, and increasingly for any disruption caused to local residents and businesses. The economic situation has also seen the construction sector targeted with regard to theft of raw materials, plant and other equipment. The remote nature of some sites, coupled with a lack of full utilities, means that they are often perceived as soft targets. Risk UK considers how this sector – which is pivotal to the UK’s economy – can better protect itself from the various threats.
Leisure and Sport The leisure and sport industries predominantly depend upon individuals spending money with them for entertainment and enjoyment. Therefore, any risks or threats can only detract from the overall experience from customers, which in turn can affect revenues. Whilst safety and security will be concerns for the customer base, those same customers will not expect – and often will not accept – any delays or inconvenience from the organisation in question to achieve their goals. Ensuring a balance between delivering public safety and security, and making certain that the business in question meets both its legal and moral obligations requires skill, but also necessitates support from the right procedures, policies, services and technologies. Whether a hotel, casino, stadium or restaurant, businesses need to protect themselves without allowing any negative impact on current or potential customers. Risk UK helps address such challenges.
025_Layout 1 04/06/2013 16:52 Page 1
He just installed the world’s leading primary intrusion detection software on 40 systems in 4 countries. In 1 hour.
ADPRO® IntrusionTrace™ Primary Intrusion Detection Software Remote configuration of advanced video content analysis for perimeter protection—anywhere, anytime. Setup
in 3 easy steps—done False alarms—eliminated Fewer operators, more sites monitored—efficient The industry’s most advanced outside motion detection technology— now i-LIDS-approved
See IntrusionTrace in action! IntrusionTrace.com
verticals jun13_riskuk_may13 04/06/2013 12:45 Page 4
Vertical Markets
Utilities
Retail The retail sector – high street stores, shopping centres and out-of-town retail parks – are currently under pressure from a wide variety of threats. Traditional retail outlets are seeing custom lost to on-line suppliers. Figures show that footfall in the retail sector was down earlier this year, due to the climatic conditions. Another issue is losses due to crime. Whether this be customer theft, staff theft, fraud, robbery, violence against staff or threats of violence, retailers are seeking solutions that can deliver protection and benefits. Video surveillance is the tool of choice for retailers, but multiple sites have previously meant duplication of equipment where traditional CCTV has been used. Thankfully, traditional CCTV isn’t the only option, and is rapidly being usurped by networked video surveillance. Many network video systems deliver better image quality than traditional CCTV, and can record and manage images on edge devices such as cameras and encoders. The cost-savings of networked video are significant, the flexibility allows the system to fit any user’s needs, and the additional benefits available via software-based analytics – footfall monitoring, queue management, streaming to handheld devices, heatmap generation for marketing – can deliver a true return on investment for retailers keen to achieve value for money!
36
www.risk-uk.com
Utility providers often face a need for multiple approaches to risk mitigation. Firstly, they will have offices and depots which require solutions to address health and safety, fire prevention, security, etc.. Whilst these sites fall within the provision of risk managers, for utility companies thay can be relatively straightforward. The next layer of risk mitigation must address satellite sites, such as generators, pumping stations, etc.. Often located in remote areas to allow distribution of services, these unmanned sites need to carefully managed. Concerns cover theft or vandalism, safety issues if members of the public gain access, and lone worker protection when staff visit them for maintenance visits. Indeed, for many utility providers a large percentage of their workforce is mobile, which introduces the need for a third layer of risk management. Mobile staff are entitled to the same level of care given to on-site staff, and given the nature of their work it should be argued that the workers require a greater level of protection. Finally, utilities providers need to increasingly consider the infrastructure they use. The increase in theft of metals, for example, has seen significant increases in cables, pipework and safety housings for inthe-field systems being stolen. As well as the losses, utility companies must also ensure that public safety is ensured at all times.
Healthcare The healthcare sector faces a changing risk landscape. As budgetary constraints bite, coupled with a rise in compensation culture, the onus for many trusts is on the mitigation of risks concerning infections, patient care and staff well-being. Sadly, healthcare institutions also suffer from threats typically associated with public areas which are open around the clock, and from which there are difficulties when it comes to excluding higher-risk visitors. The healthcare market is increasingly better served by those designing advanced solutions, but as with so many sectors requiring bespoke solutions, there is need for a fundamental balance between safety and care for those requiring the services on offer, and protection from the Trusts, their staff and assets from external threats and risks.
025_benchmark_jan12 07/12/2011 17:53 Page 1
Memories. iFly Singapore, the world’s largest indoor skydiving simulator,
uses Milestone XProtect® Enterprise surveillance software to monitor park grounds and give visitors a lasting memory. Flying at speeds of up to 186 miles per hour, the software records each skydiver’s Ųight and information using adio FreÇuency dentiŰcation ƺ F ƻ. fter their Ųight, a video souvenir helps visitors relive all of the adrenaline-fueled moments. Proving again that XProtect is more than security.
Milestone XProtect® is the world’s leading IP video surveillance management software and is relia¸le, future proof and easy to use. t supports the widest choice in cameras and seamlessly integrates with ¸usiness and security solutions such as F . Which means your possibilities are unlimited and you can keep your security options open. iscover more with Milestone and try our software for free atƓ www.milestonesys.com
verticals jun13_riskuk_may13 04/06/2013 12:46 Page 6
Vertical Markets
Data Centres In today’s IT-centric business world, the data centre has become at the heart of many organisation’s operations. However, for data centres to succeed, there needs to be an element of trust between it and the customer base. Credibility is all, and this means that such sites must be resilient, secure and robust. Fire is a significant risk at data centres. Often, the smallest of fires can damage IT equipment, even when still at the smouldering
stage. Given that many hard drives become unreliable and often fail in temperatures above 50 degrees C, detecting fire at the very earliest stage is critical. Where IT infrastructure exists for the purposes of handling third party data, any failures could have significant repercussions for all concerned. As such, those businesses operating in this sector must ensure systems are in place to negate risks that could lead to down time or, even worse, the loss of data.
Public Space and City Centres
Education
One of the biggest challenges for those involved in risk mitigation and disaster recovery is the protection of public spaces and city centres. Over the years, various approaches have been employed by councils, law enforcement agencies and private initiatives in order to try and enhance public safety, security and risk mitigation. Protecting such areas can often be seen as a thankless task. The often unlimited access, varied infrastructure and sheer mass of people makes risk mitigation an on-going concern. As solutions are designed and implemented to address one issue, so another raises its head, and all too often the first question asked is why the investments previously made – albeit to address separate issues – failed to prevent or detect another incident of event. Risk mitigation for such applications must – by its very nature – accept that some incidents will occur, and rather than trying to prevent them, should focus on how they can be resolved and continuity preserved as swiftly and painlessly as possible. The sheer range of threats that must be considered makes planning and implementing solutions a challenge in itself, and recent high profile incidents have illustrated that attempts at predicting potential threats simply will never cover all eventualities.
The educational sector provides a wide variety of services to a transient population, and that in itself presents challenges, especially when the management of the users and services is subject to ever decreasing budgets. However, educational organisations can enjoy benefits offered by new technologies, and one significant area is with regard to multi-use credentials. Modern intelligent cards mean that staff and students can use one smartcard for access control (at the educational site and associated residential and leisure facilities), library and IT services, access to learning materials, cashless vending, administration, and even health and safety-related processes. This enhances security, safety and the overall user experience.
38
www.risk-uk.com
Project2_Layout 1 04/06/2013 13:23 Page 1
Discreet and affordable PTZ surveillance for better business?
That’s easy.
.QQMKPI VQ KORTQXG UGEWTKV[ KP [QWT UVQTG! *QY CDQWV DWUKPGUU QRGTCVKQPU CPF RTQDžV CDKNKV[! 9J[ PQV EJQQUG C XKFGQ UWTXGKNNCPEG UQNWVKQP VJCV ECP FQ DQVJ!
9KVJ XGTUCVKNG RCP VKNV \QQO HWPEVKQPCNKV[ UOCNN UK\G CPF UKORNG KPUVCNNCVKQP #:+5 / 5GTKGU OCMGU KV GCU[ VQ MGGR C FKUETGGV G[G QP GXGT[VJKPI JCRRGPKPI KP [QWT UVQTG
+VŠU RQUUKDNG YKVJ VJG *&68 SWCNKV[ XKFGQ TGCN VKOG CNCTOU CPF QVJGT UOCTV HGCVWTGU KP #ZKUŠ / NKPG RCP VKNV \QQO ECOGTCU %QODCV UJQRNKHVKPI RTGXGPV GORV[ UVQTG UJGNXGU CPF OQPKVQT EJGEMQWV NKPGU Ş LWUV VQ PCOG C HGY
5OCNN ECOGTC $KI UQNWVKQP 'CU[ EJQKEG Get the Axis picture. Stay one step ahead. 8KUKV YYY CZKU EQO RV\
#:+5 / 26< &QOG 0GVYQTM %COGTC 5GTKGU ŧ 7R VQ *&68 R XKFGQ SWCNKV[ ŧ 2CP VKNV \QQO KP CP WNVTC FKUETGGV FGUKIP ŧ 2QYGT QXGT 'VJGTPGV ŧ $WKNV KP OKETQRJQPG ŧ +2 TCVGF RTQVGEVKQP ŧ /KETQ5& 5&*% ECTF UNQV
verticals jun13_riskuk_may13 04/06/2013 12:47 Page 8
Vertical Markets
Transportation
Petrochemical Petrochemical processing sites are hazardous environments, and as such present a number of threats to staff, visitors and the environment. The plants are subject to a wide range of legislation and regulation, have carefully defined safety standards and working practices, and must meet a vast number of criteria to be permitted to operate. Whilst this may seem – at face value – to create a framework which allows a simpler approach to risk mitigation, this is not the case. The reality remains that one small mistake or failure could result in catastrophic results. Equipment does fail, systems do malfunction, and errors are made. Often, the human element in such sites is more fragile than the associated technologies and devices employed. The petrochemical industry also represents a viable target for terror attacks. Any successful attempt will be high profile, and often dramatic. The subsequent impact could also be magnified due to the very nature of the site. Often regarded as critical infrastructure, the disruption caused could spread well beyond the site and its immediate location. Also, as energy generation, pollution and other green issues top the agenda for many, so petrochemical establishments must also be prepared to deal with protests or other actions by those seeking alternative processing. The petrochemical industry faces a range of security and safety risks, but mitigation remains a critical necessity!
40
www.risk-uk.com
Inter- and intra-city transportation links are an essential part of social infrastructure, and can be essential to continuity and prosperity for any region. Any incident that disrupts core transportation links can affect a large number of businesses and organisations, and has a negative impact on both the local and national economy. The transportation sector includes both fixed sites such as depots, stations, garages, etc., along with mobile assets such as train carriages and vehicles. However, one area that has been significantly targeted, to great expense for transportation companies, is infrastructure. Network Rail reported that the cost of cable thefts last year came to over £12 million. These thefts resulted in thousands of hours of delays, and also endangered staff and passengers. To be effective, public transportation must be reliable, safe and accessible. Staff must be able to carry out duties without fear of attacks, and the functionality of the transport system must be safeguarded. Without proper risk mitigation, declining standards of transport can also lead to a range of other social problems, and these inevitably impact upon businesses and organisations when transport links fail to deliver.
Food Processing The food processing industry is reliant upon supply chain management, and this includes ensuring that every stage of manufacturing is carefully and accurately managed. Whether dealing with the delivery and storage of raw materials, the manufacturing processes or distribution of finished goods, it is essential that any threats – whether they be quality issues, hygiene, refrigeration, correct handling to preventing tampering – are addressed before contamination can occur. Such threats – which can have a detrimental impact on the reputation of a company – must be faced alongside a host of public safety and health concerns associated with food production.
Project1_Layout 1 09/04/2013 10:53 Page 1
risk web__RiskUK_dec12 31/01/2013 14:47 Page 2
In an increasingly volatile world, Risk UK is essential reading for risk management, loss prevention and business continuity professionals Increasingly, businesses and organisations need to operate in a risk-conscious world. The external threats to business are manifold and diverse. Issues range from security of people and property, loss prevention, health and safety, cyber threats, environmental issues and human resources management, through to terrorism, extortion and arson. Threats develop rapidly, and must be faced. Whilst the risks faced are complex, so too are the potential solutions. These need very careful consideration if the benefits on offer are to be fully realised. Risk UK delivers essential updates, advice and guidance to ensure that modern businesses are able to take proactive steps towards mitigating risk.
Risk UK offers a full web site and regular electronic newsletter, alongside its print publication, to help those who are active in risk management to better address external threats.
@riskukmagazine
www.risk-uk.com
Project1_Layout 1 02/10/2012 15:07 Page 1
Security solutions for today’s challenging times
Consultancy Operational Consultancy Manned Guarding Training Information and Intelligence Communications Support Technical Systems Equipment
Global economic pressures are forcing organisations to review expenditure across the board. But the security issues remain the same. So do you cut your security? Pilgrims offer a complete and complementary range of security, communications and support services, backed by an unmatched commitment to the highest level of quality, efficiency and client care, to reduce cost not cover. Our expertise and global experience allows us to deliver robust, practical solutions, for today’s challenging financial climate.
For more than 10 years Pilgrims has been supporting clients across the globe, protecting and enabling their businesses to continue in spite of the threats from terrorism, serious organised crime and natural disasters. Our personnel are handpicked for their experience, skills, training and personality to match the requirements of our clients. This combined with our continual exposure to the world’s hot spots and difficult regions make Pilgrims an ideal choice for advice and support. Pilgrims provides a global service with local knowledge through our employment of local personnel, quality control, continual training, and our relationships with specialist and local partners.
By talking to us, we can help you find the right solution. Call Pilgrims on: +44 (0)1483 228 786 www.pilgrimsgroup.com
p44_riskuk_Dec12 04/06/2013 13:19 Page 1
Next Issue
Luminite wireless PIR detectors LGIPMT434
Next Issue...
Exceptional detection ranges and simple set-up make Genesis the perfect CCTV activation system Now with IP connectivity for even easier integration. Plug and play with DM, IMMIX, HeiTel, Panasonic, Vista and many more. Luminite detectors provide the versatility of wireless whilst meeting and surpassing the requirements of the BS8418 standard. x
Social Media
NEW from Luminite
For the marketing-savvy, social media represents a simple and fast way to reach a wide range of people with a message. For many businesses and organisations, it delivers not only a way to ensure that they have a presence where their customers are, but that they share that space with the customers themselves. When considered in such a way, the technology delivers a number of benefits for all concerned. However, social media also carries with it a high level of risk, and many high profile situations have seen major brands suffer reputational damage and customer- or investor-backlash as a result of the mismanagement of the vehicle. Risk UK considers how businesses must plan for the more negative aspects of an always-on digital presence!
Genesis2, a stylish new PIR detector designed to complement modern architecture and buildings. High performance black optical mirrors with adaptive focal length zoom optics ensure superior white light rejection and accurate detection of human bodies regardless of distance.
Data Protection IR and White light range of LED lamps, designed for CCTV monitored systems to produce clear night vision with low power consumption.
Designed and Manufactured in the UK
Mention data protection, and many immediately think about firewalls, encryption and malware protection. Even if the focus falls on the requirements of the Data Protection Act, emphasis is often placed upon the processes and procedures of how data is handled and used. One aspect of the DPA legislation which is often less well debated is the need for data in any form â&#x20AC;&#x201C; electronic files, images, paper documents and even informal notes â&#x20AC;&#x201C; to be protected from unauthorised access or theft.
Retail Risk Mitigation Risk UK considers the options open to those businesses in the retail sector who are looking to address risk mitigation concerns with value-added solutions, whilst also ensuring that budgets are adhered to.
Call us today on 020 8368 7887 or visit our website www.luminite.co.uk for more information
44
www.risk-uk.com
Project2__RiskUK_Jul12 04/07/2012 15:20 Page 1
I\PS[ PU
YLZPZ[HUJL
)\PS[ PU ISHZ[ HUK PTWHJ[ YLZPZ[HUJL >OLU H ISVJR^VYR ^HSS PZ VUS` ISHZ[ YLZPZ[HU[ \W [V R5 T JVTWHUPLZ SPRL ,+- ,ULYN` YLS` VU 7YVTH[ +<9(:;,,3 WHULSZ [V WYV[LJ[ HNHPUZ[ ISHZ[ HUK PTWHJ[ \W [V R5 T 7YVTH[ +<9(:;,,3 YLK\JLZ [OL YPZRZ [V WV^LY Z[H[PVUZ [YHUZMVYTLYZ W\ISPJ I\PSKPUNZ HUK V[OLY ]P[HS PUZ[HSSH[PVUZ 7YVTH[ +<9(:;,,3 UV[ VUS` Z[HUKZ Z[YVUN HNHPUZ[ ISHZ[ HUK PTWHJ[ I\[ PZ M\SS` [LZ[LK HUK JLY[PÄLK [V ): HUK JHU NP]L \W [V MV\Y OV\YZ VM ÄYL YLZPZ[HUJL
7YVTH[ +<9(:;,,3 PZ [OL 653@ ÄYL ISHZ[ Z`Z[LT Z\WWVY[LK I`! =HS\L LUNPULLYLK ILZWVRL ZVS\[PVUZ YK WHY[` JLY[PÄJH[LK SPJLUZLK PUZ[HSSLYZ *LY[PÄJH[L VM *VUMVYTP[` VU LHJO PUZ[HSSH[PVU 9VI\Z[ ^VYSK^PKL JLY[PÄJH[PVU ^P[O V]LY JVU[PU\HSS` \WKH[LK HZZLZZTLU[Z
-VY TVYL PUMVYTH[PVU JHSS V\Y ;LJOUPJHS :LY]PJLZ [LHT VU VY LTHPS PUMV'WYVTH[ K\YHZ[LLS JV \R
^^^ WYVTH[ K\YHZ[LLS JV \R ;OL HJ[P]L UHTL PU WHZZP]L WYV[LJ[PVU
FINAL bm web house_001_Benchmark_jul11 08/08/2011 16:20 Page 1
www.benchmarkmagazine.com
BENCHMARK
Benchmark â&#x20AC;&#x201C; dedicated to independent tests, assessments and reviews of security products and solutions
The Benchmark website is a PRODUCT TESTS All tests are fully independent, and manufacturers supplement to the monthly have no involvement in the process. Additionally, Benchmark makes no charge, financially or of any magazine, and includes a variety other kind, for inclusion in tests. All products are selected by an independent team. In short, itâ&#x20AC;&#x2122;s the of tests and assessments of the only way you can ascertain the truth about product latest products, as well as guides performance! to product selection, technology Tests are carried out by an independent team of experts, telling you the truth about the performance challenges and information about of a wide range of security equipment, warts and all. influential technologies in the CHECK PREVIOUS ISSUES Benchmark back issues are available on-line, in a security sector. All content fully interactive format, and can be accessed free of is taken from the published charge. If Benchmark has tested the product, then you can establish the level of performance expected editions of Benchmark, so you in the field! will not find drafts by GUIDES AND CHALLENGES The Benchmark website includes product guides, manufacturers marketing their highlighting products that have been tested, or that wares or marketing hype that is have been recommended by security installers, system integrators, specifiers and security regurgitated via so many other consultants. There are also Technology Challenges, debunking the hype by reporting real-world channels. The content is written experiences of the various technologies. in plain English, free from technobabble, and reflects STAY UP TO DATE genuine experiences with the Benchmark is always testing and assessing products and technologies. Keep up to date equipment, whether that be with the latest reports by following Benchmark on Twitter. good, bad or indifferent. The www.twitter.com/benchmarkmag website is free to view.
www.benchmarkmagazine.com
may dir_000_RiskUK_aug12 01/05/2013 10:51 Page 1
Best Value Security Products from Insight Security www.insight-direct.co.uk Tel: +44 (0)1273 475500 ...and lots more Computer Security
Anti-Climb Paints & Barriers
Metal Detectors (inc. Walkthru)
Security, Search & Safety Mirrors
ACCESS CONTROL
Security Screws & Fastenings
Key Control Products
Empty Property & Lone Worker Alarms
Traffic Flow & Management
see our website
ACCESS CONTROL & DOOR HARDWARE
ALPRO ARCHITECTURAL HARDWARE ACCESS CONTROL
ACT Unit c1 South city Business centre Tallaght D.24 Ireland www.accesscontrol.ie tel: 00 353 1 466 2570 UK Lo Call Number: 0845 300 5204
Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks, Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101 E: info@alpro.co.uk Web: www.alpro.co.uk
ACCESS CONTROL, CCTV & INTRUSION DETECTION SPECIALISTS
SIEMENS SECURITY PRODUCTS
ACCESS CONTROL
APT SECURITY SYSTEMS The Power House, Chantry Place, Headstone Lane, Harrow, HA3 6NY Tel: 020 8421 2411 Email: info@aptcontrols.co.uk www.aptcontrols-group.co.uk B a r r i e r s , B l o c k e r s , B o l l a r d s , PA S 6 8
Suite 7, Castlegate Business Park Caldicot, South Wales NP26 5AD UK Main: +44 (0) 1291 437920 Fax: +44 (0) 1291 437943 email: securityproducts.sbt.uk@siemens.com web: www.siemens.co.uk/securityproducts
ACCESS CONTROL – SPECIALIST PRODUCT DISTRIBUTOR
MIRAS SECURITY SOLUTIONS LTD
ACCESS CONTROL
KERI SYSTEMS UK LTD Tel: + 44 (0) 1763 273 243 Fax: + 44 (0) 1763 274 106 Email: sales@kerisystems.co.uk www.kerisystems.co.uk
Speed Gates, Loop Detectors, LED Traffic Lights, Bi-Fold Gates, LED Traffic Signs, Turnstiles, Access Control, Bollards, Biometrics, Pay-on-Foot Solutions, Turnstile Hire, AVI Vehicle Tagging. Tel: 01633 420439 Mob: 07870 504 288 E: info@mirassecurity.co.uk W: www.mirassecurity.co.uk securitysolutions solutions security
miras
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES ACCESS CONTROL
HOLLAND TRAFFIC CONTROL LTD.
COVA SECURITY GATES LTD
Speed Gates, Fast Acting Vehicle Gates, Bollards, Blockers P.O. Box 1945, Newport, NP19 1AT Tel: 0845 8622 080 Fax: 0845 8622 090 Mobile: 07969 650 394 Email: sales@htc-speedgates.co.uk Web: www.htc-speedgates.co.uk
Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68
Tel: 01293 553888 Fax: 01293 611007 Email: sales@covasecuritygates.com Web: www.covasecuritygates.com
ACCESS CONTROL ACCESS CONTROL MANUFACTURER
NORTECH CONTROL SYSTEMS LTD. Nortech House, William Brown Close Llantarnam Park, Cwmbran NP44 3AB Tel: 01633 485533 Email: sales@nortechcontrol.com www.nortechcontrol.com
ACCESS CONTROL - BARRIERS, BOLLARDS & ROADBLOCKERS
HEALD LTD HVM High Security Solutions "Raptor" "Viper" "Matador", Shallow & Surface Mount Solutions, Perimeter Security Solutions, Roadblockers, Automatic & Manual Bollards, Security Barriers, Traffic Flow Management, Access Control Systems
Tel: 01964 535858 Email: sales@heald.uk.com Web: www.heald.uk.com
SECURE ACCESS TECHNOLOGY LIMITED Authorised Dealer Tel: 0845 1 300 855 Fax: 0845 1 300 866 Email: info@secure-access.co.uk Website: www.secure-access.co.uk
AUTOMATIC VEHICLE IDENTIFICATION
NEDAP AVI PO Box 103, 7140 AC Groenlo, The Netherlands Tel: +31 544 471 666 Fax: +31 544 464 255 E-mail: info-avi@nedap.com www.nedapavi.com
ACCESS CONTROL – BARRIERS GATES & ROAD BLOCKERS
ACCESS CONTROL – BARRIERS, GATES, CCTV
FRONTIER PITTS
ABSOLUTE ACCESS
Crompton House, Crompton Way, Manor Royal Industrial Estate, Crawley, West Sussex RH10 9QZ Tel: 01293 548301 Fax: 01293 560650 Email: sales@frontierpitts.com Web: www.frontierpitts.com
Aberford Road, Leeds, LS15 4EF Tel: 01132 813511 E: richard.samwell@absoluteaccess.co.uk www.absoluteaccess.co.uk Access Control, Automatic Gates, Barriers, Blockers, CCTV
ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES
ACCESS CONTROL – MANUFACTURER
UKB INTERNATIONAL LTD
ROSSLARE SECURITY PRODUCTS
Planet Place, Newcastle upon Tyne Tyne and Wear NE12 6RD Tel: 0845 643 2122 Email: sales@ukbinternational.com Web: www.ukbinternational.com
Rosslare Security Products manufactures the Security Industry’s largest and most versatile range of Proximity and Smart Card readers.
Bletchley Park, Milton Keynes, MK3 6EB Tel: 01908-363467 Email: sales.uk@rosslaresecurity.com www.rosslaresecurity.com ISO 9001 and ISO 14001 Certification
www.insight-direct.co.uk Tel: +44 (0)1273 475500
may dir_000_RiskUK_aug12 01/05/2013 10:51 Page 2
BUSINESS CONTINUITY BUSINESS CONTINUITY SOFTWARE & CONSULTANCY
CONTINUITY2 E232 Edinburgh House Righead Gate Glasgow G74 1LS Tel: +44 (0) 845 09 444 02 Fax : +44 (0) 845 09 444 03 info@continuity2.com
CCTV / ACCESS CONTROL
GENIE CCTV LTD CCTV HOUSE, CITY PARK, WATCHMEAD, WELWYN GARDEN CITY, HERTFORDSHIRE, AL7 1LT TEL: 01707 330541, FAX: 01707 330543 EMAIL: sales@geniecctv.com www.geniecctv.com / www.genieaccess.com
CCTV/IP SOLUTIONS
DALLMEIER UK LTD BUSINESS CONTINUITY MANAGEMENT
CONTINUITY FORUM Creating Continuity ....... Building Resilience A not-for-profit organisation providing help and support Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845 Email: membership@continuityforum.org Web: www.continuityforum.org
3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH Tel: +44 (0) 117 303 9 303 Fax: +44 (0) 117 303 9 302 Email: dallmeieruk@dallmeier.com
CCTV AND IP SECURITY SOLUTIONS
JVC PROFESSIONAL EUROPE LTD. 12 Priestley Way London NW2 7BA T: +44 (0)20 8208 6205 www.jvcpro.co.uk
PHYSICAL IT SECURITY
RITTAL LTD Tel: 020 8344 4716 Email: information@rittal.co.uk www.rittal.co.uk
CCTV LENSES
PENTAX RICOH IMAGING UK LTD.
BUSINESS SALES BUSINESS SALES Caroline Exley FCA 01925 756970 info@abalymm.com www.abalymm.com
ABA Lymm
• • • •
Business acquisitions Disposals Valuations & advice Confidential
Specialist in buying and selling security businesses
CCTV MANUFACTURERS OF A COMPLETE RANGE OF INNOVATIVE INFRA RED AND WHITE LIGHT LED LIGHTING PRODUCTS FOR PROFESSIONAL APPLICATIONS INCLUDING CCTV SCENE ILLUMINATION, ARCHITECTURAL UP-LIGHTING AND COVERT SECURITY.
ADVANCED LED TECHNOLOGY LTD
Security Systems Division, Heron Drive, Langley, Slough SL3 8PN UK Office: +44-(0)1753-21 10 71 Sales: +44-(0)7973-154 430 Fax: +44-(0)1753-21 10 90 Email: ssd@pentax.co.uk Web: www.pentax-security.com
CCTV & IP SECURITY SOLUTIONS
PANASONIC SYSTEM NETWORKS EUROPE Panasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP Tel: 0844 8443888 Fax: 01344 853221 Email: system.solutions@eu.panasonic.com Web: www.panasonic.co.uk/cctv
COMMUNICATIONS & TRANSMISSION EQUIPMENT
KBC NETWORKS LTD.
Sales: +44 (0) 1706 363 998 Technical: +44 (0) 191 270 5148 Email: info@advanced-led-technology.com www.advanced-led-technology.com
Barham Court, Teston, Maidstone, Kent ME18 5BZ www.kbcnetworks.com Phone: 01622 618787 Fax: 020 7100 8147 Email: emeasales@kbcnetworks.com
CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS
DIGITAL IP CAMERAS
ALTRON COMMUNICATIONS EQUIPMENT LTD
SESYS LTD
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ Tel: +44 (0) 1269 831431 Email: comms@altron.co.uk Web: www.altron.co.uk
Supplying digital IP camera for rapid deployment, remote site monitoring, fixed and short term installations. High resolution images available over mobile and wireless networks to any standard web browser.
1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333 Email: info@sesys.co.uk www.sesys.co.uk
CCTV
END TO END CCTV SOLUTIONS/RECORDERS, CAMERAS, NETWORK PRODUCTS
G-TEC
DEDICATED MICROS
Gtec House, 35-37 Whitton Dene Hounslow, Middlesex TW3 2JN Tel: 0208 898 9500 www.gtecsecurity.co.uk sales@gtecsecurity.co.uk
1200 Daresbury Park, Daresbury, Warrington, WA4 4HS, UK Tel: +44 (0) 845 600 9500 Fax: +44 (0) 845 600 9504 Email: customerservices@dmicros.com www.dmicros.com
CCTV
INFRA-RED AND WHITE-LIGHT CCTV LIGHTING AND ANPR
PECAN
RAYTEC
Stortech Elec, Unit 2 spire green Centre Pinnacles West, Harlow, Essex CM19 5TS Tel 01279 419913 Fx 01279 419925 www.pecancctv.co.uk email sales@stortech.co.uk
Unit 3 Wansbeck Business Park, Rotary Parkway, Ashington, Northumberland. NE638QW Tel: 01670 520 055 Email: sales@rayteccctv.com Web: www.rayteccctv.com
www.insight-direct.co.uk Tel: +44 (0)1273 475500
may dir_000_RiskUK_aug12 04/06/2013 16:20 Page 3
CCTV SPECIALISTS
PLETTAC SECURITY LTD Unit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XH Tel: 0844 800 1725 Fax: 01788 544 549 Email: info@plettac.co.uk www.plettac.co.uk
WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS, PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.
MAYFLEX Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ
Tel: 0800 881 5199 Email: securitysales@mayflex.com Web: www.mayflex.com
CCTV & IP SOLUTIONS, POS & CASH REGISTER INTERFACE, EPOS FRAUD DETECTION
AMERICAN VIDEO EQUIPMENT Endeavour House, Coopers End Road, Stansted, Essex CM24 1SJ Tel : +44 (0)845 600 9323 Fax : +44 (0)845 600 9363 E-mail: avesales@ave-uk.com
CONTROL ROOM & MONITORING SERVICES EUROPE’S MOST SUCCESSFUL DISTRIBUTOR OF CCTV, IP VIDEO, ACCESS CONTROL AND INTRUDER DETECTION SOLUTIONS ADVANCED MONITORING SERVICES
NORBAIN SD LTD
EUROTECH MONITORING SERVICES LTD.
210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP Tel: 0118 912 5000 Fax: 0118 912 5001 www.norbain.com Email: info@norbain.com
Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring • Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm Response Tel: 0208 889 0475 Fax: 0208 889 6679 E-MAIL eurotech@eurotechmonitoring.com Web: www.eurotechmonitoring.com
EMERGENCY PLANNING SYSTEMS DISTRIBUTORS THREAT ASSESSMENT, REGULATORY COMPLIANCE, EMERGENCY PLANNING
G4S TECHNOLOGY – ONEFACILITY Integrating people, process and technology to enable organisations and the facilities they run to achieve regulatory compliance, mitigate risk and remain one step ahead.
01684 850977 onefacility@uk.g4s.com www.1f.com
EMPLOYMENT
EMPLOYEE SCREENING SERVICES
THE SECURITY WATCHDOG
ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PRODUCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.
Cross and Pillory House, Cross and Pillory Lane, Alton, Hampshire, GU34 1HL, United Kingdom www.securitywatchdog.org.uk Telephone: 01420593830
ADI GLOBAL DISTRIBUTION Chatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RN Tel: 0161 767 2900 Fax: 0161 767 2909 Email: info@adiglobal.com
TRADE ONLY CCTV MANUFACTURER AND DISTRIBUTOR
COP SECURITY
EMPLOYEE SCREENING SERVICES
EUROCOM C.I.LTD Dorset House, Regent Park, Leatherhead, Surrey, KT22 7PL Tel: 0845 880 5888 Fax:020 8643 8384 Email: info@eurocomci.co.uk Web: www.eurocomci.co.uk
Leading European Supplier of CCTV equipment, all backed up by our industry leading service and support package. COP Security, Delph New Road, Dobcross, OL3 5BG Tel: +44 (0) 1457 874 999 Fax: +44 (0) 1457 829 201 sales@cop-eu.com www.cop-eu.com
FIRE
DISTRIBUTOR
PASSIVE FIRE PROTECTION SYSTEMS
FASTFLEX
PROMAT
2A Woodham Lane, New Haw, Addlestone, Surrey, KT15 3NA Contact: Chris Hobbs on 0845 276 1111 sales@fastflex.co.uk www.fastflex.co.uk
Promat is a market leader in passive fire protection fire protection, offering many of the leading brands in fire protection including Promat SUPALUX®, Promat MASTERBOARD®, Promat DURASTEEL®, Cafco FENDOLITE® MII and the Promat PROMASEAL® range of fire stopping products.
Tel: 01344 381300 Email: marketinguk@promat.co.uk
www.insight-direct.co.uk Tel: +44 (0)1273 475500
may dir_000_RiskUK_aug12 01/05/2013 10:52 Page 4
IDENTIFICATION
PERIMETER PROTECTION
GPS PERIMETER SYSTEMS LTD 14 Low Farm Place, Moulton Park Northampton, NN3 6HY UK Tel: +44(0)1604 648344 Fax: +44(0)1604 646097 E-mail: info@gpsperimeter.co.uk Web site: www.gpsperimeter.co.uk
POWER STANDBY POWER SPECIALISTS; UPS, GENERATORS, SERVICE & MAINTENANCE
COMPLETE SOLUTIONS FOR IDENTIFICATION
DATABAC GROUP LIMITED 1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HH Tel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 1026 enquiries@databac.com
INDUSTRY ORGANISATIONS TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY
BRITISH SECURITY INDUSTRY ASSOCIATION Tel: 0845 389 3889 Email: info@bsia.co.uk Website: www.bsia.co.uk
DALE POWER SOLUTIONS LTD Salter Road, Eastfield Industrial Estate, Scarborough, North Yorkshire YO11 3DU United Kingdom Phone: +44 1723 583511 Fax: +44 1723 581231 www.dalepowersolutions.com
POWER SUPPLIES – DC SWITCH MODE AND AC
DYCON LTD Cwm Cynon Business Park, Mountain Ash, CF45 4ER Tel: 01443 471 060 Fax: 01443 479 374 Email: marketing@dyconsecurity.com www.dyconsecurity.com The Power to Control; the Power to Communicate
STANDBY POWER
UPS SYSTEMS PLC THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY
SSAIB The Smoke Houses Cliffords Fort, North Shields, Tyne & Wear Tel: 0191 2963242 Web: www.ssaib.org
INTEGRATED SECURITY SOLUTIONS SECURITY PRODUCTS AND INTEGRATED SOLUTIONS
HONEYWELL SECURITY GROUP Honeywell Security Group provides innovative intrusion detection, video surveillance and access control products and solutions that monitor and protect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology with traditional analogue components enabling users to better control operational costs and maximise existing investments in security and surveillance equipment. Honeywell – your partner of choice in security. Tel: +44 (0) 844 8000 235 E-mail: securitysales@honeywell.com Web: www.honeywell.com/security/uk
Woodgate, Bartley Wood Business Park Hook, Hampshire RG27 9XA Tel: 01256 386700 sales@upssystems.co.uk www.upssystems.co.uk
UPS - UNINTERRUPTIBLE POWER SUPPLIES
ADEPT POWER SOLUTIONS LTD Unit 1 Viscount Court, South Way, Walworth Business Park Andover, Hants SP10 5NW Tel: 01264 351415 Fax: 01264 351217 Web: www.adeptpower.co.uk E-mail: sales@adeptpower.co.uk
UPS – UNINTERUPTIBLE POWER SUPPLY
RIELLO UPS LTD Unit 50, Clywedog Road North, Wrexham LL13 9XN Tel: 0800 269394 Fax: 01978 729 290 Email: sales@riello-ups.co.uk Web: www.riello-ups.co.uk
UPS - UNINTERRUPTIBLE POWER SUPPLIES
UNINTERRUPTIBLE POWER SUPPLIES LTD Bacchus House, Calleva Park , Aldermaston, Berkshire RG7 8EN Telephone: 0118 981 5151 Fax: 0118 981 5152 e-mail: sales@upspower.co.uk www.upspower.co.uk
INTEGRATED SECURITY SOLUTIONS
SECURITY
INNER RANGE EUROPE LTD Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG74GB, United Kingdom Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001 Email: ireurope@innerrange.co.uk www.innerrange.com
PERIMETER PROTECTION
CASH MANAGEMENT SOLUTIONS
LOOMIS UK LIMITED 1 Alder Court, Rennie Hogg Road, Nottingham, NG2 1RX T - 0845 309 6419 E - info@uk.loomis.com W - www.loomis.co.uk
INFRARED DETECTION
CASH & VALUABLES IN TRANSIT
GJD MANUFACTURING LTD
CONTRACT SECURITY SERVICES LTD
Unit 2 Birch Industrial Estate, Whittle Lane, Heywood, Lancashire, OL10 2SX Tel: + 44 (0) 1706 363998 Fax: + 44 (0) 1706 363991 Email: info@gjd.co.uk www.gjd.co.uk
Challenger House, 125 Gunnersbury Lane, London W3 8LH Tel: 020 8752 0160 Fax: 020 8992 9536 E: info@contractsecurity.co.uk E: sales@contractsecurity.co.uk Web: www.contractsecurity.co.uk
www.insight-direct.co.uk Tel: +44 (0)1273 475500
may dir_000_RiskUK_aug12 01/05/2013 10:52 Page 5
CCTV
ONLINE SECURITY SUPERMARKET
INSIGHT SECURITY
EBUYELECTRICAL.COM
Unit 2, Cliffe Industrial Estate Lewes, East Sussex BN8 6JL Tel: 01273 475500 Email:info@insight-security.com www.insight-security.com
Lincoln House, Malcolm Street Derby DE23 8LT Tel: 0871 208 1187 www.ebuyelectrical.com
FENCING SPECIALISTS
J B CORRIE & CO LTD Frenchmans Road Petersfield, Hampshire GU32 3AP Tel: 01730 237100 Fax: 01730 264915 email: fencing@jbcorrie.co.uk
INTRUDER ALARMS – DUAL SIGNALLING
WEBWAYONE LTD 11 Kingfisher Court, Hambridge Road, Newbury Berkshire, RG14 5SJ Tel: 01635 231500 Email: sales@webwayone.co.uk www.webwayone.co.uk www.twitter.com/webwayoneltd www.linkedin.com/company/webwayone
INTRUSION DETECTION AND PERIMETER PROTECTION
OPTEX (EUROPE) LTD Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311 Email: sales@optex-europe.com www.optex-europe.com
LIFE SAFETY EQUIPMENT
C-TEC Challenge Way, Martland Park, Wigan WN5 OLD United Kingdom Tel: +44 (0) 1942 322744 Fax: +44 (0) 1942 829867 Website: http://www.c-tec.co.uk
INTERCOM SOLUTIONS – SECURITY & COMMUNICATION
COMMEND UK LTD Commend House, Unit 20, M11 Business Link, Parsonage Lane, Stansted, Essex CM24 8GF Tel: 01279 872 020 Fax: 01279 814 735 E-mail: sales@commend.co.uk Web: www.commend.co.uk
INTRUDER AND FIRE PRODUCTS
CQR SECURITY
PERIMETER SECURITY
TAKEX EUROPE LTD
Aviary Court, Wade Road, Basingstoke Hampshire RG24 8PE Tel: +44 (0) 1256 475555 Fax: +44 (0) 1256 466268 Email: sales@takexeurope.com Web: www.takexeurope.com
125 Pasture road, Moreton, Wirral UK CH46 4 TH Tel: 0151 606 1000 Fax: 0151 606 1122 Email: andyw@cqr.co.uk www.cqr.co.uk
SECURITY EQUIPMENT
PYRONIX LIMITED Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronix www.linkedin.com/company/pyronix www.twitter.com/pyronix
SECURITY SYSTEMS INTRUDER ALARMS – DUAL SIGNALLING
CSL DUALCOM LTD Salamander Quay West, Park Lane Harefield , Middlesex UB9 6NZ T: +44 (0)1895 474 474 F: +44 (0)1895 474 440 www.csldual.com
BOSCH SECURITY SYSTEMS LTD PO Box 750, Uxbridge, Middlesex UB9 5ZJ Tel: 01895 878088 Fax: 01895 878089 E-mail: uk.securitysystems@bosch.com Web: www.boschsecurity.co.uk
INTRUDER ALARMS AND INTEGRATED SOLUTIONS
SECURITY EQUIPMENT
RISCO GROUP
CASTLE
Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton, Manchester, M24 2SS Tel: 0161 655 5500 Fax: 0161 655 5501 Email: sales@riscogroup.co.uk Web: www.riscogroup.co.uk
Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042 www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity
www.twitter.com/castlesecurity
www.insight-direct.co.uk Tel: +44 (0)1273 475500
Project2_Layout 1 04/06/2013 13:22 Page 1