Security Electronics & Networks Magazine

Page 1

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers APRIL 2019 ISSUE 408

INTEGRATING SUB SYSTEMS

PP 100001158

l l l l l l l l l

What to See at SecTech Roadshow 2019 Physical Security Considerations Special Feature: Low Cost CCTV Cameras News Report: Tyco Security Products Strategies to Strengthen Cyber Security The Interview Brenna Guiney, ISP Product Review: Vivotek MS9390-HV Monitoring: Challenges of Alarm Systems Bosch FLEXIDOME IP Starlight 8000i



editorial S EC U RI TY E L E CT RO N I C S & NETWO R KS A PR I L 20 19 I SSUE 4 08

By John Adams

SECTECH ROADSHOW 2019: IMAGINING THE FUTURE HEN you walk into SecTech W seeking a sense of the latest solutions, make sure you’re not just ticking the boxes of the present but building ideas for the future. Yes, the future seems vaguer as it becomes more digital but there are areas we can guarantee will overhang in years ahead and they’re not all products and solutions. Privacy and ethics in the digital space is going to one key area of consideration. San Francisco is currently considering a proposal to ban face recognition and to license CCTV on a per camera basis every 12 months. While global application of these precepts doesn’t bear thinking about, we can call up salient moments over the past 2-3 years and soberly consider that an accusation of unethical behaviour on cyber street impacts on business in the real world. 5G telecommunications. I tend to think the advent of 5G will be more evolution than revolution but even if it simply forces users out of their miserably over-subscribed cable internet services and onto the fibre NBN, 5G will impact on possibilities and consumer expectations. When you look at recent moves by Apple and others to drive into the content space, you can see market leaders are betting massive money on ongoing development of the infrastructure to support monster bandwidth. Another trend that’s creating chat among futurists is the growth of autonomous devices and digital twins – that latter is a virtual system that monitors the state of a device in real time. My instinct is that these developments should come under the banner of IoT, because what we’re talking about is leveraging the data gathering capability of sensors to recognise and/or predict behaviours, as well as to give situational awareness in real time. Autonomous devices include sensors, cameras, drones – anything that can be

Something SecTech visitors are bound to see plenty of is analytics – for security and automation people, analytics is best seen in an operational light.

automated to gather information. Something SecTech visitors are bound to see plenty of is analytics – for security and automation people, analytics is best seen in an operational light. A complexity with talk about AI, IVA, analytics, machine learning, VCA is exactly what the operational outcomes of such labels are going to be. For security suppliers it might seem to be about recognising threats as they happen, but for security managers it will be about how much time the system saves them when investigating incidents, as well enhancement of business efficiencies. Analytics needs to be application specific, but every business has multiple applications. Users also like smart, secure and timely notifications – but not too many of them. Notifications are a worthwhile hook to pursue at SecTech. They can deliver situational awareness as well as assisting security teams in the timely management of unfolding events across a site. No matter how mundane the failure of a camera, a smoke sensor, or a door sensor might seem to be, notification and response is vital. At sea and in the air – places where error leads to disaster – there’s a maxim recognising catastrophe lies at the end of a chain of small failures. Security operations is no different. When talking about smart systems, the ability to rapidly learn about an environment and respond to events is sure to seep into the electronic security industry over the next few years. In my opinion, this form of technology is likely to revolutionise the intrusion business. Sensorcameras will recognise threats, do LPR, face recognition, fire detection, detect errant vehicles or individuals, alert operators or security managers to vulnerabilities, manage recording, fire automated outputs where appropriate (close gates, raise

bollards) and do all this in a reliable way. Further development of GPUs and enhanced edge computing are likely to be required but the base technologies and operational hunger are there. It’s appropriate that cyber security is thought of by experts as a journey, not a destination, because none of us can pretend we’ve arrived there. Cyber security is an area integrators, consultants and end users need to partner on. From the point of view of SecTech, make sure the solutions you spend time with have cyber security covered – that applies to mobile apps, automation devices and wireless network devices, as much as it applies to cameras, NVRs, servers and network hardware. Along with all the cyber security acronyms, think about simple things like automated password management. Cloud and video surveillance as a service. These are other areas you should expect to see new solutions popping up. For installers and integrators, remote management is an attraction of systems that live on networks – you should pay attention to the efficiencies of your own businesses, too. Finally, integrated solutions. We’re reaching a point where even security and home automation solutions do alarms, access control, intercom, CCTV, automation of lights and air conditioning, fire, medical alerts, remote management and more. At the commercial level, simple security management and access control panels have profound automation capabilities, layers of programming support and entire suites dedicated to stepping installers through the integration process. These capabilities should be front of mind. If you’re serious about offering your customers clever and powerful security solutions, there’s never been a better time to take a hard look at what’s new at SecTech. n

se&n 03


SECURECALL SECURECALL1345 1345PORTAL PORTAL

The TheSecureCall SecureCallPortal Portalisisaapowerful powerfulmanagement managementtool toolfor forinbound inbound1345 1345alarm alarmcall calltraffic. traffic.ItItisispowered poweredby bySCSI SCSICloud Cloudtechnology technology and andreceives receivessignals signalsdirectly directlyfrom fromOptus OptusININNetwork NetworkEquipment. Equipment.The ThePortal Portalgives givesyou youpeace peaceofofmind mindknowing knowingyour yourdata dataisis extremely extremelysecure, secure,including includingtransparent transparentcall callvalidation validationwith withdata dataupdated updatedevery every55minutes. minutes. - -Transparent Transparent&&Detailed DetailedAlarm AlarmCall CallReporting. Reporting. - -Email EmailAlerts Alertsbased basedon onpredefined predefinedsettings. settings. - -Alarm AlarmCall Calltracing tracingincluding includingPrivate PrivateNumbers. Numbers.

COMPLETE COMPLETEREPORTING REPORTING

Painful Painfulhours hoursspent spentauditing auditingare areaathing thingofofthe thepast! past!Find Findthe the exact exactsignal signalyou youare arelooking lookingfor forininseconds, seconds,including including identifying identifyingprivate privatenumbers. numbers.

PROVEN PROVEN

Processing Processingininexcess excessofof10 10million millionalarm alarmcalls callsper permonth, month,the the SecureCall SecureCallPortal Portalisisaaproven provenservice serviceused usedby byleading leadingsecurity security companies companiesAustralia Australiawide. wide.

1345VIRTUAL VIRTUALREDUNDANCY REDUNDANCYSERVICE SERVICE 1345 1345 1345Redundancy Redundancyallows allowsControl ControlRooms Roomstotouse useour ourhardware hardwareand anddata datacentre centreasasaa redundancy redundancysolution solutionfor foroverflowing overflowingtraffic. traffic.

SECURECALLREDUNDANCY REDUNDANCYFEATURES FEATURES SECURECALL Calloverflow overflow- -for forbusy busytimes. times.   Call Callfailure failureprotection protection- -line linecut cut/ /failure failureatatthe the   Call Monitoring MonitoringCentre. Centre. Callno noanswering answering- -specific specificreceiver receiverfailure. failure.   Call Totaldisaster disasteralarm alarmtraffic trafficmanagement management- -ability abilitytoto   Total send sendyour youralarm alarmtraffic traffictotoanother anotherfacility. facility. Dualhosting hostingofofthe theservice serviceasasSCSI SCSI   Dual Data DataCentre Centreand andthe theOptus OptusExpan ExpanData DataCentre. Centre. Fullaudit audittrail trailisisavailable, available,and andindependently independently   Full verified verifiedthrough throughthe theSCSI SCSISecureCall SecureCallPortal. Portal.

ERER MM OO ELEL NN STST AA CU CUMMP P RR A A LL AA

PP SS TT NNRR EE CC EE IVIV EE RR PP HH OO NN OO UU SS CC TA TAEELL CC AU AU MM ININ SS TOTO SS GG II VV EE MM /B/BEE IRIR SYSY ATAT STST IOIO TT UU UU EM EMN N SS RR AA Y Y EE LLRR DD UU EE CC NN EE DD IVIV AA EE NN S S RR U U CC NN YYPP SS H H AA I I TT N N HH EEDD CC 44 GG EE VV DD OO UU LL AA LLLLVV EE ININ KK SS SS EE AA FF OO RR DD DD CC

1300 1300555 555570 570 sales@scsi.com.au sales@scsi.com.au www.scsi.com.au www.scsi.com.au


MANAGEMENT MANAGEMENTPORTAL PORTAL Seeall allLive Livestatus statusinformation. information.   See RemoteAccess. Access.   Remote Createadditional additionallogins logins&&choose choosethe theaccess accesslevel leveleg. eg.   Create Employee, Employee,Customer Customer RunReports Reports   Run SubmitFeature FeatureRequest Request   Submit RunReports Reports- -DTU DTUSerial SerialCommunication, Communication,Signal SignalStrength, Strength,   Run I/O I/OEvents, Events,DTU DTUCommand, Command,Panel PanelActivity ActivityTimer, Timer,Panel Panel Events Events- -IfIfthere thereare areany anymore moreyou youwould wouldlike liketotosee, see,please please submit submitaafeature featurerequest requestand andwe wecan cando doit.it.

RM RM GG SS SS LA LARIRNIN E AA LEPP EL EU TIO TOE E I R R U I I KK NN TRTR OO WW CC NN MM AA CECE BB

OPTUS OPTUS EVOLVE EVOLVE PRIVATE PRIVATE IPIP SERVICE SERVICE

OPTUS/TELSTRA OPTUS/TELSTRA WIRELESS WIRELESS PRIVATE PRIVATE IPIP SERVICE SERVICE (SCSI (SCSI APN) APN)

YY RR AA S IM IM S SS RR E E s s P P C C CC lelses AA iriere tW loele cetcW o e sns iriron DW DW SECURE SECURE DD C Co ss lelses iriereAA W W t t c c ayay irieretetw ew DD aa GG ss lelses iriereB B W W ctct ayay irieretetw ew DD aa GG

TELSTRA TELSTRA OPTUS OPTUS

CU CU STST DD MM SLSLOO /A/A ERER RO RO DD SS UU TETEL L DD TU TU RR 3G 3G /IP LILTIT/IP AA LA LAE E RM RM

INTERNET INTERNET GATEWAY GATEWAY

BugTracker Tracker   Bug Accesstotoall allSCSI SCSIPortals Portals   Access OverThe TheAir AirUpload/Download Upload/DownloadAvailable Availableusing usingthe the   Over DTU3G/IP DTU3G/IPLite. Lite.

TECH TECHAPP APP

END ENDUSER USERAPP APP

LiveDTU DTUstatus status   Live

Arm/Disarmyour yourpanel panel  Arm/Disarm

Abilitytotoconfigure configureDTU DTU   Ability options options

Seelive livestatus status  See

Runreports reports- -Signal SignalStrength, Strength,   Run Polling, Polling,Events Events

Runalarm alarmevent eventreports reportsfrom from  Run the theapp app

ControlI/O I/OPorts Portson onDTU DTU   Control

PinCode CodeAccess Access  Pin

PinCode CodeAccess Access   Pin Loginfor formultiple multipleaccounts accounts-   11Login Handy Handyfor fortechs techswho whoreport reporttoto more morethan than11CMS CMS

SCSI SCSIISISPROUD PROUDTO TOANNOUNCE ANNOUNCEOVER OVERTHE THEAIR AIRDOWNLOAD DOWNLOADSUPPORT SUPPORTUSING USINGTHE THEDIRECTWIRELESS DIRECTWIRELESSNETWORK. NETWORK. Panel PanelList: List: Concept Concept3/4000 3/4000Type Type2 2 DAS DASNX4 NX4 DAS DASNX8 NX8

DAS DASNX12 NX12 DASNX16 DASNX16 DAS DASR8R8 DASR128 DASR128

PARADOX PARADOXMG5050 MG5050 PARADOX PARADOXSP6000 SP6000 PARADOX PARADOXSP7000 SP7000 PARADOX PARADOXEVO192 EVO192

SOLUTION SOLUTION1616PLUS PLUS SOLUTION16I SOLUTION16I SOLUTION SOLUTION6464 SOLUTION SOLUTION144 144

SOLUTION SOLUTION6000 6000 SOLUTION SOLUTIONICP-CC488 ICP-CC488 SOLUTION SOLUTION862 862

TECOM TECOMCHALLENGER CHALLENGERV8V8 TECOM TECOMCHALLENGER CHALLENGERV10 V10

1300 1300555 555570 570 sales@scsi.com.au sales@scsi.com.au www.scsi.com.au www.scsi.com.au


l

FREE ENTRY

l

FREE LIGHT LUNCH

l

FREE HAPPY HOUR

BIG A CAMER T OU S H O OT

5th

R E T U R N S

M A Y

2 0 1 9

T O

Y O U R

C I T Y

F O R M O R E E N Q U I R I E S C O N TA C T M O N I Q U E @ B R I D G E P U B L I S H I N G . C O M . A U

JOINING US ON THE ROAD SO FAR


l

FREE PARKING

l

FREE SEMINAR

l

TONNES OF GIVEAWAYS

“THE MOST INFORMATIVE SHOW OF THE YEAR...” W W W . S E C T E C H R O A D S H O W . C O M . A U

REGISTRATION NOW OPEN IN EACH CITY


10

22

18

34: LOW COST CAMERAS

APR 19 18: WHAT TO SEE AT SECTECH 2019

Across many applications there are hundreds of thousands of low-cost CCTV cameras being installed. The question for end users and integrators, too, is whether or not this is a problem, or whether some affordable cameras are capable of meeting a testable minimum standard when it comes to operational requirements. 36: TYCO SECURITY PRODUCTS – GROWING ANZ PRESENCE

SecTech Roadshow tours 5 state capitals in May, giving security installers, end users and consultants an opportunity to see the latest and greatest electronic security solutions in their home town. In this feature we’ll take a quick look and some of the solutions you’ll see!

Tyco Security Products (TSP) is one of the largest electronic security companies in the world with profound capabilities in areas as diverse as home automation, video surveillance and enterprise integration.

22: PHYSICAL SECURITY CONSIDERATIONS

Creating a secure environment against the everpresent threat of cyber-attack requires more than good technology deployed in a secure way with regular updates. According to Andrew Scothern, chief software architect at Gallagher, people and culture also make up a large (and less predictable) part of your cyber defence.

Physical security devices including gates, fences, turnstiles and barrier systems play a vital role in providing extreme protection on high security sites from determined attacks. 26: INTEGRATING SUB SYSTEMS Central to core operational functionalities of many integrated solutions are sub systems, many of which were not designed with integration in mind. While there are challenges to successful integration, a technical team with integration capability is a huge asset.

42: STRENGTHEN CYBER SECURITY

44: THE INTERVIEW BRENNA GUINEY In The Interview this month we talk to security consultant, sociologist and social impact practitioner, Brenna Guiney, of Independent Security Professionals, about her security career, the ways people perceive, behave and respond


26

54

36

regulars

56

to security and technology strategies, and her thoughts on women in security. 48: VIVOTEK MS9390-HV Vivotek’s MS9390-HV is a panoramic network camera that incorporates a pair of wide angle lenses, electronic image stitching, and high resolution sensors to deliver an 8MP 180-degree scene. This is a compact, robust and capable cameras with an angle of view sufficiently enormous to cover our entire street scene from one end to the other.

APRIL 2019 ISSUE 408

INTEGRATING SUB SYSTEMS

PP 100001158

l l l l l l l l l

What to See at SecTech Roadshow 2019 Physical Security Considerations Special Feature: Low Cost CCTV Cameras News Report: Tyco Security Products Strategies to Strengthen Cyber Security The Interview Brenna Guiney, ISP Product Review: Vivotek MS9390-HV Monitoring: Challenges of Alarm Systems Bosch FLEXIDOME IP Starlight 8000i

52: MONITORING Alarm systems and their supporting monitoring paths are not perfect. Understanding the weaknesses of these technologies is vital when designing and implementing security solutions in a rapidly changing marketplace.

What’s new from our manufacturers. 56: HELPDESK

BOSCH’S new FLEXIDOME IP starlight 8000i camera will soon be released in 1080p, 6MP or 4K versions with 60ips rates for fast moving scenes, H.265 compression and a design optimised for simplicity of installation and operation.

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

Latest business, product and technical news from Australia and around the world.

54: EDITOR’S CHOICE

54: BOSCH FLEXIDOME IP STARLIGHT 8000I CAMERA

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

10: NEWS

Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: tania@ taniasdesign.com.au

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.


NEWS IN BRIEF

Sydney Opera House Planning Integration of Physical Security Systems p.12 Smiths Detection Trials Computed Tomography p.14 Innotec Security Expands, Makes Move p.16

APRIL 2019

COMPILED BY JOHN ADAMS

SAN FRANCISCO MULLS BAN ON FACE RECOGNITION, ANNUAL APPROVAL FOR CCTV CAMERAS n SAN Francisco’s Stop Secret Surveillance Ordinance, introduced by Aaron Peskin, would ban city departments from using facialrecognition technology, require board approval for new surveillance devices, introduce the need to prove existing cameras were reducing crime annually and bar city security and law enforcement teams from using any data sourced from facial recognition gathered anywhere at all. Nearby Berkeley and Oakland have passed rules requiring public input and a privacy policy before officials implement new surveillance technology, but none have banned face

recognition technology. The ban, which applies to local government not private companies, could be in place this month. Government departments that want to purchase new surveillance equipment including CCTV and LPR solutions are required to submit a surveillance technology policy explaining what data will be gathered and how it will be stored, used and secured. And if the city wants to keep existing CTV cameras, it must submit evidence annually that the cameras reduced crime. The SSSO Vlado Damjanovski will mean electronic security technologies can be disabled pending the annual reviews.

The ban applies to viewing face recognition data – including that gathered by police departments elsewhere. According to Lee Hepner, a legislative aide who helped draft the bill, this is only the first of many steps changing how the city balances policy and technology. “We want there to be a justification for use of the technology in the location,” Hepner says. “If the ostensible benefits of any of these surveillance technologies is the prevention of crime, then it’s helpful for the board to be able to track that. Over time, is this technology having a positive impact?”

SENSATEK, VIVOTEK, UNIVIEW, HELIOS, OSA JOIN SECTECH ROADSHOW 2019! n SENSATEK, VIVOTEK, Uniview, Helios and OSA have joined SecTech Roadshow 2019 and will bring a wide range of their latest solutions around Australia this May. Meanwhile, BGW Technologies has booked extra space dedicated to showing off its intrusion and connected home technologies at SecTech. There are now only two 3x3 metre spaces remaining for the Roadshow! Current SecTech 2019 roadies include Dahua Technologies, Hills, Interlogix, Avigilon, Fermax

10 se&n

Australia, SCSI, Video Security Products, Pelco, Video Alarm Technologies, Mobotix, Alarmcorp, Salto, BGW Technologies, ICT, Q Security Systems, dormakaba, 2N, Videotec, LSC Security Supplies, Helios, Optical Solutions Australia, SensaTek/ Vivotek and Uniview. SecTech Roadshow is a touring tradeshow that takes the top distributors and manufacturers around 5 Australian state capitals over 2 weeks every May and draws 2000-2500 high-quality attendees. Unlike one-out roadshows,

SECTECH ROADSHOW IS THE PERFECT OPPORTUNITY FOR INSTALLERS AND END USERS TO GET HIGH QUALITY FACE TIME WITH LEADING SUPPLIERS AND MANUFACTURERS AND THEIR SOLUTIONS IN A VIBRANT HALF-DAY. every SecTech exhibitor benefits from the combined drawing power of the group. The compact size and local venues make SecTech Roadshow the perfect opportunity for installers and end users to get high quality face time with leading suppliers and manufacturers and their solutions in a vibrant halfday. SecTech Roadshow gets going in Melbourne on May 2, then travels to Sydney on May 7, Brisbane on May 9, Adelaide on May 14 and Perth on May 16. There are sponsor opportunities available. Contact Monique Keatinge on 02 9280 4425.

DTI TO SECURE 900 WA BUSES WITH MOBILE CCTV n VOLGREN Australia has been awarded a contract from Public Transport Authority of Western Australia (PTA) for the supply of 900 new buses for the Western Australian market to be delivered over 10 years. Perth-based security integrator DTI will supply and install its advanced CCTV recording system to Volgren for the PTA buses. DTI has a long association with Volgren for the supply

of equipment to public buses in Western Australia and said it welcomes the opportunity to continue this relationship. DTI will supply and install IP cameras and digital recording equipment on these buses which will be built at Volgren’s manufacturing facility in Malaga, Western Australia. Deliveries are expected to commence in Q4 2019 and will be delivered over a 10year period.


security security

The Complete Security Solution The Complete Security Solution Expand your offerings to cover intrusion from DSC, video from exacq and access from Expand yourcontrol offerings to kantech cover in one singlefrom solution. intrusion DSC, video from exacq and access control from kantech in one single solution.

INTRUSION VIDEO INTRUSION VIDEO

ACCESS ACCESS

For a total solution from a single trusted source Visit: tycosecurityproducts.com Call: +61 0499688921 +61 499 688 921 For a total solution from a single trusted source Email: bts-emea-tycosales@jci.com bill.sakellariou@jci.com Visit: tycosecurityproducts.com Call: +61 0499688921 +61 499 688 921 Email: bill.sakellariou@jci.com bts-emea-tycosales@jci.com Š 2019 Johnson Controls. All rights reserved.

Š 2019 Johnson Controls. All rights reserved.

The all-in-one integrated solution provides the best of video surveillance, intrusion detection and access control all from one single, trusted partner. You can deliver a full solution to your customersintegrated with ease solution and business owners and security The all-in-one provides the best of video personnel canintrusion managedetection all aspects of access on-premises surveillance, and controlphysical all from security from a single interface kantech one single, trusted partner. You -can deliveroraexacq. full solution to your customers with ease and business owners and security personnel can manage all aspects of on-premises physical security from a single interface - kantech or exacq.


NEWS APRIL 2019

DEPARTMENT OF HOME AFFAIRS RELEASES SAFER COMMUNITIES FUNDING ROUND 4 n AUSTRALIA’S Department of Home Affairs released Safer Communities Fund Round 4 last month, with applications for grants required before April 4 for projects completed by

March 31, 2021. The Safer Communities Fund Round 4 provides schools and pre-schools, community organisations and local councils with grants of between $A50,000 and $1.5 million

for security infrastructure and engagement activities to protect children in the community who are at risk of attack, harassment or violence stemming from racial or religious intolerance.

SYDNEY OPERA HOUSE PLANNING INTEGRATION OF PHYSICAL SECURITY SYSTEMS n Sydney Opera House Trust (SOHT) is planning to upgrade its electronic security with an emphasis on integrating multiple systems to enhance operational efficiencies. The SOHT team asked for market input during its deliberations last month. According to SOHT, the team recently reviewed its security systems and capabilities, and is commencing a project to implement significant

12 se&n

upgrades to its systems and capabilities. This includes a project to transform isolated security systems into a network of interoperable systems to enhance situational awareness and improve operating efficiencies of SOHT’s Emergency Planning & Response (Security) team. Sydney Opera House has a complex electronic security solution, which includes access control

and intrusion detection, as well as video surveillance. Any security upgrades at the iconic site will reflect the recommendations of the ANZCTC Strategy for Protecting Crowded Places from Terrorism. More than 8 million visitors flock to the site every year. The market sounding closed on April 1, 2019. Contact Amin Saskai on 61 2 92507717 or email asaskai@ sydneyoperahouse.com for more information.

Project activities can include infrastructure activities such as installing fixed or mobile CCTV cameras, security lighting, fencing, bollards, security and alarm systems, public address systems, intercoms and access control systems, as well as employing or hiring security guards, licensed by the relevant state or territory agency, for schools and preschools. Meanwhile, engagement activities can include: • Social cohesion projects that reduce the chance of children being attacked or harassed due to racial or religious intolerance • Community and youth engagement forums targeted at people at risk of offending to reduce security risks stemming from racial or religious

intolerance • Training for staff at organisations who work with children with the aim of reducing racial or religious intolerance • Other preventative activities that can demonstrate a reduction in the chance of children being attacked or harassed due to racial or religious intolerance.

THE SAFER COMMUNITIES FUND ROUND 4 PROVIDES SCHOOLS AND PRESCHOOLS, COMMUNITY ORGANISATIONS AND LOCAL COUNCILS WITH GRANTS OF BETWEEN $A50,000 AND $1.5 MILLION FOR SECURITY INFRASTRUCTURE...

PM ANNOUNCES $A55 MILLION IN SECURITY UPGRADES TO MOSQUES, TEMPLES, CHURCHES n AUSTRALIAN Prime Minister Scott Morrison has announced $A55 million in security upgrades for mosques and other places of worship and denounced “mindless tribalism” in society that “fosters hate, blame and contempt”. Speaking at the Australia-Israel Chamber of Commerce in Melbourne, Morrison said the terrorist attack in New Zealand has accelerated a plan to expand the Government’s Safer Communities Fund, to include religious schools, places of worship and religious assembly.

Australia’s safer community fund makes grants available from $50,000 to $1.5 million to implement security and safety enhancements including CCTV, lighting, fencing, bollards, alarms, security systems and public address systems. Morrison said the new funding would give priority to places of worship. “I wish we didn’t need this,” Morrison said. “I believe in religious freedom, and it has to start with the right to worship and meet safely without fear of violence.”


Sometimes bigger is better.

The New T4000X is a standalone unit - no panel required. Simply connect and control through SkyCommand interface.

Plug and Play

4G Modem

Dual Sim

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

Siren / Strobe

T: 1300 319 499

8 Inputs & Outputs

W: csd.com.au


NEWS APRIL 2019

SMITHS DETECTION TRIALS COMPUTED TOMOGRAPHY AT GOLD COAST AIRPORT n SMITHS Detection has partnered with Gold Coast Airport, part of Queensland Airports Limited, to trial Smiths Detection’s latest CT technology screening systems for passenger carry-on baggage at Gold Coast Airport. The 6-week trial - which ended on March 1 - was implemented ahead of new security regulations expected to take effect in Australia in coming years. The equipment was designed to enhance airport security by improving the efficiency of the screening process and detection ability. As part of the trial, Smiths Detection introduced an advanced integrated checkpoint solution that will deliver more stringent security, while improving passenger experience. The key focus was on the ECAC EDS CB

C3 approved HI-SCAN 6040 CTiX cabin baggage screening system using CT technology to produce 3D images, which allows security officers to inspect cabin baggage effectively without the need for passengers to remove items such as laptops, gels or liquids. This is supported by iLane.evo, an automatic tray-handing system and Checkpoint Evo Plus, a checkpoint management software that effectively facilitates remote screening of the scanned images. Since the implementation in January, Gold Coast Airport management Vlado Damjanovski and staff have seen a significant enhancement in facilitation at the security screening checkpoint, whilst the security outcomes have also been enhanced. Gold Coast Airport chief operating

officer Marion Charlton said she was pleased with the trial results which had received positive feedback from both passengers and security staff. “The new screening process was a real success with passengers. With the new technology, they didn’t have to remove laptops or liquids and gels from their carry-on luggage,” she said. “The security outcome was positive, with the CT equipment providing improved threat detection, without the need to impose on passenger privacy to search through personal belongings, while also resulting in a better overall experience for customers.” Gold Coast Airport is the 6th busiest airport in Australia, welcoming 6.6 million visitors in the 2018 financial year.

INGRAM MICRO APPOINTS JAMES LAYTON BUSINESS MANAGER - NETWORKING & SECURITY n INGRAM Micro has appointed James Layton as business manager – networking & security. It’s a solid move by Ingram Micro – the role is tailor-made for Layton’s strengths. “As the world’s largest technology distributor, Ingram Micro is a household name in the information technology industry, but it’s only been in recent years that the company has established a presence in the security market

James Layton

14 se&n

thanks to partnerships with such companies as Axis Communications, Dahua Technology, and IndigoVision,” Layton said. “Along with conventional physical security products, I’ve also taken on a product portfolio which includes networking products. Many of these products are complimentary to the security side of the business and help address the growing concerns within the market of the need for cyber security, and

secure communication. Ingram Micro carries a suite of global technology leaders including Fortinet, Rajant, Allied Telesis, and Cambium Networks.” According to Layton, Ingram Micro’s strengths have traditionally been in volume business sales, but he said this was an exciting opportunity to lead a transformation in the market towards seeing Ingram as an end-to-end solution provider for the security industry. “My background prior to joining the security industry in 2000 was entirely IT, so I’ve been able to bring my 2 skill disciplines together in this role,” Layton said. “Through our enterprise businesses with Dell, HP, and IBM, we have some of the leading solution architects in the country, and I’m looking forward to leveraging these resources to help Ingram Micro grow into the security market in Australia.” New and old contacts can reach Layton at James. Layton@ingrammicro.com

Mark Junge

GALLAGHER APPOINTS NEW GLOBAL GENERAL MANAGER - SECURITY n FOLLOWING the announcement of current CEO Sir William Gallagher’s plan to retire to an executive director role within 2-3 years, the Gallagher business has made further appointments as part of the leadership succession plan. With current global general manager for the security business, Kahl Betham, moving to deputy CEO for the Gallagher Group, his replacement has now been announced. Taking over the role of global general manager for the security division will be Mark Junge. Junge has been with

Gallagher for over 13 years, holding various roles within the business, most recently chief operating officer - security. He has been a part of the Security Division’s executive leadership team for 6 years. “Gallagher’s security business has achieved massive success within the last 4 years” said global general manager, Kahl Betham. “We are fortunate to have a very strong executive leadership team, and Mark has the ideal skillset to take over the role of Global GM and continue our journey of success.”


LEAN ON US

as Australia’s leading distributor of FLIR Thermal Systems

ON-BOARD ANALYTICS FOR HIGH-PERFORMANCE INTRUSION DETECTION

FLIR Elara FC-Series ID Best-in-class thermal cameras with on-board analytics for high-performance intrusion detection.

SECURITY FOOTAGE TAKEN FROM SEKTOR SYDNEY OFFICE:

V

The Elara FC-Series ID combines best-in-class thermal image details and highperformance edge analytics in a single device that delivers optimal intrusion detection in challenging imaging environments. Elara FC-Series ID cameras feature on-board video analytics optimised for FLIR’s thermal video. Easy to set up and capable of classifying human or vehicular intrusions, Elara FC-Series ID cameras provide reliable detection with low false alarm rates, all without human intervention.

H

• Superior image quality in low-contrast conditions: 640 x 512 or 320 x 240 pixels • NETD Sensitivity of >35mK for F# 1.0 optics • FLIR’s custom AGCs provide unmatched image contrast • Easy set-up of custom trip lines and regions of interest

CONTACT US

1300 273 586 security@sektor.com.au www.sektor.com.au

With the FC-Series ID camera, you can set custom trip lines and regions of interest that will only set off alarms for vehicular (top) or human (bottom) intruders.


O

NEWS APRIL 2019

THREAT PROTECT AUSTRALIA TO BUY ONWATCH FOR $A35 MILLION n Threat Protect Australia has negotiated $A49 million in funding, $35 million of which will be used to acquire security alarm monitoring business, Onwatch. The acquisition is part of Threat Protect’s growth strategy. In 2018, it acquired a Western Australia-based monitoring business, as well as a major South Australian business.

Onwatch was founded in 2005, has monitoring stations in NSW and Victoria and supports 29,000 lines, 18,000 being direct clients and 11,000 being bureau clients. Threat Protect managing director Demetrios Pynes said Onwatch was an important addition of scope to its business. “This business will enable us to capitalise on

our previous expansion into the east coast and by expanding into Victoria we further diversify our connection base and stable of resellers,” he said. Threat Protect expects the diversification benefits will flow through to the bottom line, adding in excess of $12 million in annual recurring revenue. Annual monitoring revenue will be boosted to $24 million.

THIS BUSINESS WILL ENABLE US TO CAPITALISE ON OUR PREVIOUS EXPANSION INTO THE EAST COAST AND BY EXPANDING INTO VICTORIA WE FURTHER DIVERSIFY OUR CONNECTION BASE AND STABLE OF RESELLERS.

GENETEC HITS TOP 5 FOR AUTOMATIC NUMBER PLATE RECOGNITION TECHNOLOGY nGENETEC has become one of the world’s leading and fastest growing providers of Automatic Number Plate Recognition (ANPR) technology, according to a recentlyreleased report by IHS Markit. According to the report ANPR and Detector Sensors Report – 2018, Genetec is a top 5 global provider of ANPR technology for

16 se&n

surveillance applications (which includes ANPR for access control, travel time information, parking time management, tolling and law enforcement), climbing from 10th place in 2016 to 4th place in this $US453 million market. In the Americas region—a market estimated to be worth $196.4 million in 2018 for all ANPR solutions—Genetec has

jumped to second place with a 9.1 per cent market share (moving from 7th place in 2016). This includes both sales of enforcement ANPR technology (for red light, speed and bus lane enforcement applications) and ANPR technology for surveillance. Genetec also gained the most share of the market for ANPR surveillance equipment in the Americas, climbing to second position with an 11.5 per cent market share of this $154.3 million industry. “Over the last few years, Genetec has put a lot of effort into growing its global ANPR business through substantial R&D investment and in increased commercial focus,” said Stephan Kaiser, general manager, AutoVu at Genetec. “This has resulted in our Security Center AutoVu system becoming one of the most advanced ANPR solutions on the market.”

STAR CASINO TO ADD FACE RECOGNITION IN $A10 MILLION SECURITY UPGRADE

n STAR CASINO in Sydney will add face recognition technology as part of a $A10 million electronic security upgrade. Face recognition will be applied to cameras in high risk areas and will be matched to a database of known offenders. Star has around 4000 CCTV cameras installed in and around the casino – primarily in gaming areas. Vlado Damjanovski “It will also be incorporated into our customer service where we can recognise customers and welcome them back

personally, telling them their favourite drink is waiting at the bar,” the Star’s surveillance chief, Catherine Clark, said. Along with facial recognition technology, the Star is also getting new door alarms, ID scanners, infra-red night vision cameras and motion sensors. “Surveillance here is a 24-hour, 7-day a week operation,” Clark said. “On a Saturday night we have 150 people working in our surveillance and security teams.”

INNOTEC SECURITY EXPANDS, MAKES MOVE

n INTEGRATION company Innotec Security is experiencing accelerated growth and is moving to a new office in Tullamarine to accommodate Factory Acceptance Testing (FAT), dedicated service and showroom areas for client presentations and meetings with consultants, end users. According to Innotec’s Rob Rosa, the company has also expanded its volume of work for utility companies on renewable energy sites, including wind and solar power. “Other key clients include General Metropolitan Cemetery Trust (GMCT), SP

Ausnet, City of Boroondara, City of Port Phillip, GPT Group, Thales and Freemasons Victoria,” Rosa said. “We are launching a new website with a client portal in the next 6 weeks. Clients will have a username and password and will be able to access service and maintenance progress of their sites/ projects, invoices, initiate service calls and other functionality.” Innotec, which recently attained ISO 9001 and ISO 45001 accreditation, will be located at 7-9 Melrose Court, Tullamarine from March 22, 2019.

THIS B TO CA EXPAN AND B FURTH BASE



● Special report

Sectech 2019

WHAT TO SEE AT SECTECH 2019 SecTech Roadshow tours 5 state capitals in May, giving security installers, end users and consultants an opportunity to see the latest and greatest electronic security solutions in their home town. In this feature we’ll take a quick look at some of the solutions you’ll see! ECTECH Roadshow is an excellent forum for touching and tasting cutting edge security solutions and this year is no exception. SecTech 2019 roadies include Helios, Optical Systems Australia, SensaTek/Vivotek, Uniview, Dahua Technologies, Hills, Interlogix, Avigilon, Fermax Australia, SCSI, Video Security Products, Pelco, Video Alarm Technologies, Mobotix, Alarmcorp, Salto, BGW Technologies, ICT, Q Security Systems, dormakaba, 2N, Videotec and LSC Security Supplies. At SecTech, Pelco will be showing off the Spectra Professional 4K PTZ camera. It’s an 8MP 20x PTZ camera with 15-degree above-the-horizon lookup capability that allows coverage of large areas with covert capture of detail in poorly-lit situations thanks to built-in IR illumination. Spectra Pro 4K has H.265 and Pelco Smart Compression technology to save on bandwidth and storage requirements – it’s so new we’ve never seen it! Video Alarm Technologies (VAT) will show its latest wireless video verified intrusion devices, advanced software based perimeter analytics, facial recognition software, IP Cameras, NVRs, a scalable video surveillance solution to handle

S

18 se&n

thousands of recorders and video channels which is well suited for banking, retail and government applications, and a wireless mesh technology product offering flexible and expandable network solutions for bandwidth-demanding applications, industrial and mission-critical infrastructure. FERMAX is bringing the DUOX solution to SecTech this year – it’s a non-polarity 2-wire digital intercom system that’s easy to install and has serious functionality. Features include use of CAT-5, Figure-8 or even alarm cable, use of any cable topology (star, daisychain, etc), same config for audio and video, no distributors of switches in main riser, immune to noise, OSD menu programming, default picture camera memory and more. Alarmcorp is bringing the latest products from Vanderbilt and SeeTec GmbH Cayuga with BVI (Business Video Intelligence) – it’s a range that knocked our socks off at Security 2018 and we expect it will get a lot of attention at SecTech as well. Vanderbilt SPC is an intrusion detection system that offers versatile and comprehensive alarm management functionality. There are cloud services, end-user apps, and a dedicated software suite. Along with SPC, the Vanderbilt GM Series Seismics (SCEC Approved SL4) and magic detectors will be on show. Something else to see on the Alarmcorp stand is SeeTec Cayuga Video Management System (VMS) with Business Video Intelligence (BVI). This modular system concept facilitates a wide range of applications beyond the traditional security sector. SeeTec’s solutions use digital image data enriched by video analytics and combine it with process data and by linking these previously unconnected areas allow end users to gain valuable information. This was another solution we saw at Security 2018. It was powerful and sweetly designed with loads of hooks for integrators and end users alike. ICT is one of the most innovative electronic security manufacturers around and at this year’s SecTech roadshow the team will be showing of the company’s latest mobile solution, designed to complement existing access control systems by providing secure access and control via smartphones. A particularly neat feature of the range is tSec readers, which come equipped with Bluetooth and NFC capability, enabling doors to be unlocked using a smartphone. The Protege Mobile app allows you to monitor and control a system remotely from anywhere. Users can check status, arm or disarm, control lights, locks, signage manage heating and view cameras. At SecTech, Videotec will show CCTV solutions for harsh and hazardous environments, including explosion proof cameras, marine-grade, long – range and thermal systems. The systems feature strong low light performance, ONVIF S&Q support and compatibility with major video management systems.


BY J O H N A D A M S

BGWT’s new gear includes Kocom KCVS701IP and KC-S81M – 7-inch colour hands-free IP video intercoms. These allow users to call and communicate with visitors, receive instant notifications to smartphones (iOS and Android, powered by Kocom Smarthome) through WiFi or Ethernet, video and audio monitoring of door camera, and operating conditions displayed with icons (OSD) and door open. BGWT will also be showing the latest Panasonic 4K fixed cameras, which can handle challenging and dynamic environments and feature Intelligent Auto (iA) to monitor scene dynamics and motion to adjust key camera settings automatically in realtime reducing motion blur. There’s also H.265 smart coding to reduce bandwidth and storage demands, and full data encryption streaming that’s compliant to FIPS 140-2 Level 1. Interlogix is partnering with Hills to bring a range of residential and commercial products to SecTech, including its UltraSync hub-based cloud security and home automation solution. UltraSync offers hands-free voice control, second-generation, highdefinition cameras, an LTE cellular module and a doorbell camera. It can also be controlled via an optional 7-inch touch screen or a voice-guided menu on the self-contained hub. Neat, too, UltraSync hub is available with an optional LTE cellular module, which can serve as a backup for homeowners using IP technology or as an alternative to Wi-Fi. Mobotix has been working hard on open solutions and at SecTech 2019 visitors will get a look at the MOVE range of ONVIF-compliant IP66/IK10 cameras featuring a wide range of video management software and NVR devices including PTZ control, audio, multicasting and relay outputs, making it easy to integrate them into unique hybrid solutions. As you’d expect from Mobotix, these weatherproof, day/night cameras are well optioned with built-in

micro SD card slots and the latest standard functions of centralized video systems, including integrated infrared lighting, automatic day/night switching with a mechanical IR blocking filter, wide dynamic range and high-speed PTZ. Models include bullet, vandalproof bullet and fixed dome, and 2-speed domes – we’ve never seen this range in the flesh and we’re especially interested in the speed domes. Vivotek and SensaTek will be showing off the latest Sensatek CCTV cameras, including the very capable MS-9390-HV, which uses a pair of cameras with wide angle lenses and electronic image stitching to deliver an 8MP 180-degree angle of view. Vivotek says the MS9390-HV offers a superior vertical field of view when compared with multisensory panoramic cameras that employ 4 sensor configurations. We tested the MS9390-HV in the April issue and it’s an extremely capable video surveillance solution that’s well worth a closer examination at SecTech Roadshow. This year we have 2N joining us – part of Axis Communications, 2N is the world’s largest manufacturer of IP intercoms and a significant innovator in the field of IP access control systems, IP audio and IP elevator communicators. The 2N range really is superb and it covers plenty of ground, from robust external to sleek internal applications. Thanks to its IP heart, 2N is intuitive to power, programme and manage – not to be missed!

se&n 19


● Special report

Sectech 2019

Dahua Technology needs no introduction – it’s one of the top 3 video surveillance innovators globally and its solutions are getting more and more lateral – pushing into video-centric smart IoT solutions and services. Dahua is keeping its new gear for SecTech 2019 under wraps but given the breadth of what we saw last year at Security 2018, visitors to SecTech are going to go away with plenty to think about after visiting the Dahua display. Dorma Kaba makes access control solutions that combine great design with serious functionality and the company will bring its latest products on tour in May. Dorma Kaba is at the cutting edge of wirelessenabled access control hardware that delivers users and integrators enhanced functionalities and improved efficiency. Helios Monitoring will show its security solutions platform that tracks all key CCTV information and incorporates sophisticated alerting and reporting of local and enterprise applications. This solution provides the tools to address critical issues all via a web portal and the software was designed in partnership with security experts to ensure it covers the most frequent issues experienced in the security industry. At SecTech LSC will show the latest products from HID Global, Dahua Technology and AMC Alarms. Visitors to the LSC stand will also get first look at some exciting new products that have been developed by LSC in conjunction with key brand partners. LSC distributes some of the strongest solutions available across access control, alarm systems and CCTV, with a focus on practical security management. Over the last few years, QSS has quietly polished and expanded its range, making it one of the most complete on the market. At Sectech Roadshow, QSS will be showing FLIR, NUUO, Uniview, Sunell, 2GIG, NESS, Guardall, Dell, Juniper, NVT, DLink, Veracity, Ubiquiti, Delta and Alarm.com – it’s a serious product spread. SALTO Systems will bring SHIP to SecTech. Based on SALTO Virtual Network and data on card, SHIP is a proprietary communications protocol that allows third party access control providers to manage and control SALTO offline and wireless locking devices by way of their own software GUI. Through that software GUI, SHIP allows you to manage SALTO users, doors, time zones, calendars and more, display audit trails for SALTO wireless locks and battery statuses, and remotely open SALTO wireless locks. This is one of the solutions we’ll be getting acquainted with during the roadshow – make sure you check it out, too. SCSI will be showcasing its latest developments at SecTech 2019, including DirectWireless - an alarm communications technology that includes new bureau/integrator solutions, as well as Almond 3S – which we rated as one of the best hub-based smart home and security solutions on the market. You’ll also see Direct Connect, which is the latest in LTE fixed IP SIM VPN solutions and low-data M2M SIM’s for any application. Finally, SCSI will

20 se&n

SECTECH ROADSHOW IS AN EXCELLENT FORUM FOR TOUCHING AND TASTING CUTTING EDGE SECURITY SOLUTIONS AND THIS YEAR IS NO EXCEPTION.

also show its new Smart Duress - the latest custom smart wearable tech for corporate and lone worker deployments – plenty to see at the SCSI stand! Uniview will bring a cross section of its IP video surveillance product range on tour, including IP cameras, NVR, VMS, encoders/decoders, storage solutions, and client software and apps. Uniview is a big manufacturer and its solutions covering diverse market verticals, including retail, building, industry, education, commercial, and city surveillance. One of the electronic security industry’s most respected boutique distributors, Video Security Products will show a cross selection of the latest releases from its big range, which includes Risco, Hikvision, Sony, Milestone, Raytec, NUUO, btcino, AgentVi, Verint and plenty more. VSP always digs deep for SecTech and there are likely to be one or two surprises on the stand that will get plenty of attention. Also joining SecTech this year is OSA, Australia’s largest independently-owned networking distributor. OSA carries a huge range of IP CCTV solutions and will bring a cross section of its range on tour. SecTech Roadshow is a touring tradeshow that takes top distributors and manufacturers around 5 Australian state capitals over 2 weeks every May. The compact size and local venues make SecTech Roadshow the perfect opportunity for installers and end users to get high quality face time with leading suppliers and manufacturers and their solutions in a vibrant half-day. SecTech Roadshow gets going in Melbourne on May 2, then travels to Sydney on May 7, Brisbane on May 9, Adelaide on May 14 and Perth on May 16 – hop onto SEN website and click the top banner or paste https://regonsite.eventsair.com/ sectech-2019/reg/Site/Register and register for your city today! n


COMING SOON

The next generation in smart panels For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE


● Special feature

Physical security

BY J O H N A D A M S

PHYSICAL SECURITY CONSIDERATIONS

Physical security devices including gates, fences, turnstiles and barrier systems play a vital role in providing extreme protection on high security sites from determined attacks.

HYSICAL security is the application of barriers that deny or slow down intrusion into a protected site. Such barriers may take the form of walls, gates, doors, trenches, grills, bars, gatehouses or natural barriers like banks, streams or elevated garden beds. Clever use of physical security significantly increases a site’s overall protection. Importantly, barriers don’t just form a physical defence that increases the delay between an attempted intrusion and a breach. They also represent a psychological deterrent to potential intruders.

P

22 se&n

In the most basic definition, a classic onion skin barrier defence might incorporate a perimeter fence, a building with barred windows and locked doors, a room with a locked door and a locked safe in a corner of that room. Each of these layers will take some getting through and an effectively defended site will incorporate electronic security support of these barriers to ensure there’s response to the intrusion long before the safe is broken into. One of the most important aspects of external physical perimeters is an effective gate and/or manned gatehouse. On low security sites gates


Wisenet thermal cameras Wisenet thermal cameras object and background to make the unseen details visible without additional lighting. In addition, they object and background to make the unseen details visible without additional lighting. In addition, they

Black hot Black hot

White hot White hot

www.eos.com.au www.eos.com.au

W: www.eos.com.au E: sales@eos.com.au www.eos.com.au P:W:(02) 9749 5888 E: sales@eos.com.au P: (02) 9749 5888

Sepia Sepia

Rainbow Rainbow

Red Red

Custom Custom

Iron Iron


● Special feature

Physical security

VERY HIGH SECURITY SITES WILL NEED 2 SETS OF GATES WITH A DMZ BETWEEN THEM – A MAN TRAP FOR VEHICLES JUST LIKE THE ENTRY WAY OF A HIGH SECURITY MONITORING STATION. might be basic framed and hinged chain mesh, rising barriers and huge sliding steel barriers are needed on high security sites. Security managers need to bear in mind that a complete perimeter is entirely devalued if the fences fail to meet the specifications of the gates. This element of physical security is a serious challenge, particularly on big sites. Matching fence security levels to those of the best gates means building earth banks or ditches that vehicles are unable to negotiate. You can’t simply install chain link on boundaries and a massive gate at your single entrance and feel your physical security requirements are completely covered. Despite the fact we’re talking about high security physical barriers here, it’s important to point out that physical barriers must be supported by electronic systems that allow an appropriate and early response to an escalating event. There’s no point building a strong wall and failing to detect an intrusion until the defences are breached. And there’s something else to consider. Growth in global terrorism and the fact Australia is now a target of that terrorism means some applications demand the physical onion skin be seriously tough. This means providing gates, walls and structural defences that cannot be breached by any ground-based means short of assault by heavy military vehicles. While many higher security sites use a double layer of chain link with sabre tape crowns, this is not enough to guarantee protection against a determined attacker in a vehicle. For intruders on foot, powered fence solutions offer a proactive solution. These powered fences have electrical properties that allow them to give intruders a sharp shock that’s entirely harmless. Intrusion events are reported to a central location, or passed to an alarm panel for communication with a monitoring station. They comprise a series of pulsed and earthed wires interspersed with standard galvanised wire. But while they are ideal defence against humans on foot even the best fences need strong support on high security sites. High security fences should be no further from the ground than 2 inches and they should have a height of at least 2m and a post gap of no more than 2m. Concrete sills or metal spikes should be used to anchor fence mid-sections to the earth. The only way to effectively protect free standing fences from determined assault by vehicles is with banks or ditches. The key element of bank or ditch design is the ‘wavelength’ of the structure. Gentle slopes may defeat attacks by large, long wheelbase

24 se&n

vehicles but they will simply provide a launching pad for short wheelbase 4WDs. Not only do the banks or ditches need to be 1-1.5 metres, they need to be steep – that means slope angles of 60 degrees or higher and the smaller the bank, or the shallower the ditch, the closer to 90 degrees this angle needs to be. Another effective defence against vehicles is the installation of concrete blocks, but depending on the perimeter length, these are far more expensive than earth works. They’ll also give your site all the aesthetic appeal of the Maginot Line. In the past, high security sites had high, solid walls built of concrete or masonry. Huge sandstone or concrete and masonry ramparts are extremely effective barriers against vehicle attacks but they have problems you don’t get with fences. The biggest problem is poor surveillance characteristics and inability to support some fence mounted sensing technologies. Supporting solid walls with CCTV will allow a security team to see what’s going on just outside a facility. Just remember that it’s important your solid walls are constructed with plenty of pillar support, additional support at corners and adequate drainage. If you get your perimeter defences right, it’s the access points that will pose the greatest risk to a site’s integrity. Just how far you push physical security is going to depend on budget and the genuine risk factors your site faces. Very high security sites will need 2 sets of gates with a DMZ between them – a man trap for vehicles just like the entry way of a high security monitoring station. Such a design allows gatehouse security teams to assess risks and undergo search or authentication procedures while ensuring the site’s integrity is not compromised. If you can’t afford this, the gate house should be located outside the high security gate and a rising barrier used to provide a perceived defended zone. Under no circumstances should unidentified or unauthorized vehicles be allowed through the high security gate until they have been cleared by security staff. On high risk sites with single gates, drivers should be asked to leave their vehicles while waiting in the queue for entry to the site. Speed of gate operation will be the key here – you don’t want a gate that takes a long time to open and close, affording attackers plenty of time to tailgate legitimate traffic or to swerve into your facility unannounced and bypass the gatehouse altogether. Applying tyre shredders to adjacent lanes can assist. Along with vehicle security you will need to think about foot traffic. Smart design will keep the staff carpark and the visitors’ carpark separate and it will keep both carparks outside the security perimeter. This means all staff will be required to pass through a security turnstile on foot while entering the facility and they’ll be checked long before they reach the foyer area. Some locations won’t be laid out in a way that allows security managers to deliver this sort of design, but it works well where the space exists around a facility to support it. n


H.265 HYBRID NVR

Up to 4K, All Channels 5MP Highest Definition The first hybrid NVR that supports up to 8MP for all protocols. Support 5MP for all the channels input and storage.

Lite Mode Without Black Edges The only hybrid to support encoding for all camera types in lite Mode without black edges.

Fullest Compatibility The first fully compatible hybrid NVR, including different resolutions and different protocols.

Central Management Cameras in Hybrid can be added to NVR and set motion detection.


â—? Special report

Sub systems

INTEGRATING SUB SYSTEMS Central to core operational functionalities of many integrated solutions are sub systems, many of which were not designed with integration in mind. While there are challenges to successful integration, a technical team with integration capability is a huge asset.

26 se&n

NTEGRATED security solutions used to be the province of a small number of organisations large enough to maintain engineering teams capable of not only designing bespoke security and automation solutions but creating high and low level interfaces between them, and user interfaces to manage them. The need for custom design corralled the wider market from the benefits of integration – it was simply too expensive to contemplate. Today things are different. The composite solutions that evolved over many decades to offer alarms and access control now also support video surveillance and automation and the best of them do so in a seamless way while offering end users excellent user workstation and mobile interfaces. From the point of view of installers and end users, this change is a brilliant one. However, there are still

I


BY J O H N A D A M S

pitfalls and there’s plenty of planning required to ensure the finished solution meets the requirements of a user. According to Danny Berkovic of Fredon Security, the most common integrations are typically between security sub-systems - SMS to CCTV, access control to intercom, and CCTV to perimeter fences or similar. “Elevators, fire systems, lighting control and staff directories (HR databases, active directory, etc.) are examples of sub-systems from other industries that are frequently integrated with security system,” Berkovic says. “The difficulty of establishing an integration between 2 systems depends on a multitude of factors, including communication pathways and desired functionality. By far the biggest challenge is integrating systems that have not previously been integrated. “Sometimes this

may involve looking at various protocols that both systems can use and determining the best way to achieve the desired functionality,” he explains. “In other cases, third-party software may need to be developed specifically for the project. In the access control world this process is being simplified with the adoption of standards such as BACNet, Modbus and OPC which simplify the integration to products which utilise those standards for communication. “A significant consideration must be given to the cyber-security elements relating to integrations. Integrations may require open network access, and this could create system vulnerabilities. Consideration should also be given to the nature of the data being exchanged between systems and if this should be encrypted.” For the uninitiated, just getting a handle on what’s required to integrate a sub system to a security solution can be challenging but according to Berkovic, the key thing is to focus on the operational outcome. “The most important step in any integration is determining the desired functionality,” he says. “For example, when integrating CCTV is the requirement to trigger a basic function like alarm recording or a detailed integration whereby live and recorded feeds are associated to access control doors? This needs to be clearly documented – typically in uses cases and workflows.

THE DIFFICULTY OF ESTABLISHING AN INTEGRATION BETWEEN 2 SYSTEMS DEPENDS ON A MULTITUDE OF FACTORS, INCLUDING COMMUNICATION PATHWAYS AND DESIRED FUNCTIONALITY.

se&n 27


● Special report

Sub systems

“The next step is to determine how the integration will be achieved. The easiest and most cost-effective way to trigger alarm recording may be a low-level interface between the alarm system and CCTV hardware but this is very limited and quite inflexible when implemented. A more advanced integration would likely require a high-level interface which relies on licencing (potentially on both systems to be integrated) and a network connection between. Of course, if this high-level integration doesn’t already exist, it will need to be developed by software vendors or a third party – an alternative is to utilise a common protocol if the systems have been designed to support such communication. “Once the integration has been established and the configuration has been completed, it is crucial to test the functionality against the desired outcome that was identified in the first step,” Berkovic explains. “These results, as well as the method of integration, should be well documented to allow for future maintenance and upgrades. “The other consideration of significance is the maintainability of the integration – and this will be significantly impacted by the design. Using a standards-based protocol will help the integration carry forward between versions. Poorly designed custom integrations may work well in the short term but as soon as the software version changes - on any of the integrated systems – it could render the functionality inoperable. This could require reintegration and testing.” There’s a lot at stake for installers wishing to establish a reputation as integration specialists – it allows service providers to stand out from the pack, to trade on reputation, to transcend price (to some

28 se&n

extent) and to create solutions that offer customers functionalities and efficiencies that are hard to resist. “With security integration, skilful is the key term,” Berkovic says. “Companies are differentiated by more than just the ability to deliver an integration – this skill extends to the ability to design, implement, maintain and enhance an integration over time. “To do so properly requires a discipline that is not common among electronic security integrators – and that is a good understanding of software design, development and testing methodologies. Essentially these integrations are a piece of software tying together mission critical systems and should be treated as such. Quality integrators can also increase end user efficiency. “There is no doubt that integrations can enhance operational efficiencies, which in turn can reduce operating costs,” Berkovic says. “However, complex integrations can be expensive to licence, implement and maintain. Integrations that increase the efficiency of seldom performed tasks may not always be economically viable.” For capable installers, integration is now easier than it used to be. Once upon a time, everything needed to be customised but many systems, even quite small systems, are optioned to allow integration out of the box. “In recent years, integrations have become easier for a variety of reasons,” Berkovic agrees. “The migration of security and other systems to IP-based communication makes connecting these systems easier. The adoption of cross-industry standards like BACnet and SNMP also increases the ease of establishing integrations that weren’t previously possible. There are many out-of-the-box integrations between common security sub-systems. However, this becomes less common when integrating with systems from other industries or niche products.” Berkovic says Fredon Security has been involved in many large and challenging integrations over the years. “These are made complex in 2 ways – they are solutions that integrate many systems and subsystems or they are solutions that have deep and complex integrations between sub-systems,” he says. “We have been fortunate enough to be involved with both types of complexities across various projects – and occasionally both on the same project. “One example is a project which required an access control platform to be integrated with 4 other technologies. These included a biometric identification system, a visitor management system, a CCTV system and an intercom system. Each of the 4 technologies had existing interfaces, however, the integrations had not been kept up to date by the vendors and were all certified to work with specific, outdated versions of the access control software. There wasn’t a single version of the software that was certified by all 4 vendors. “One of the first steps was to set up a test


DOMESTIC SYSTEMS SEEM TO HAVE A LOT MORE CONNECTED TO SECURITY SYSTEMS SUCH AS LIGHTING, AC, INTERCOM, GARDEN SPRINKLERS, CCTV, ACCESS CONTROL AND THEY HAVE A WIDE MARKET OF PRODUCTS TO CHOOSE FROM... environment for a multitude of software versions from each vendor, in order to identify a version that was compatible with all 4 systems. Once staged, the systems were deployed on site to meet the project time line. We then had to work with the manufacturers in getting the integrations up to date with the purpose of upgrading the software already deployed to the latest stable release. A lesson from this is to always check which specific versions an interface has been developed to.” Electronic security integrator Stuart Mathews says sub systems are typically integrated with electronic security solutions and in his experience are split into 2 sections - domestic and commercial. “Domestic solutions seem to have a lot more connected to security systems such as lighting, AC, intercom, garden sprinklers, cctv, access control and they have a wide selection of products to choose from,” Mathews explains. “Commercial systems mainly have lighting control, either in a high-level control or low-level control, and some are linked to the building BMS system if installed to control lights and AC systems.” According to Mathews, the most extensive and challenging integration he’s been involved with was Devonport City Council Living City project which was written up in last month’s SEN magazine. This

application involved the integration of security, lifts, intercoms, CCTV and room booking systems across multiple buildings on a large site. “Some of the challenges of integrating systems are firstly what type of systems that need to be connected and secondly what type of protocols are used,” Mathews says. “These include TCIP ASCII, RS-232, TCIP Modbus, RS-485 Modbus, ZigBee, Wi-Fi, Dali and BACnet. With any of these systems used you need to look at location of the equipment used. This needs to be mapped out to get the best performance if certain types of network protocols are used. Another challenge is to get the different types of protocols to talk to one another and you may have to use converters to make this happen. “Let’s consider linking a security system to a lighting system for a domestic house as an example,” Mathews explains. “Firstly, I would talk to the client and come up with a list on how and what they want to control – examples include that when the system is armed all the lights are turned off, or when the system is turned off a lighting scene is turned on, or if a card is presented at the main door at night the lights in the foyer are turned on for 5 mins, or if the alarm goes off all the lights are turned on. “Once this is established, you need to choose the security system that best fits the client’s requirements thanks to its functional potential - let’s say it’s an Inner Range Inception Panel with 1 access control door. The lighting system installed is Clipsal C-Bus – the next move is to choose the way the systems talk to each other and in this case, I would use TCIP ASCII so the C-Bus lighting system will need a TCIP to C-Bus interface to work. Next, I would need to talk to the C-Bus installer and get the lighting groups that

se&n 29


● Special report

Sub systems

I need to control. Finally, I would programme up the security system to talk to C-Bus and then test the installed system.” Mathews agrees that skilful integration capability allows security installers to stand out from the pack. “This said, having a security installer with the skills to make the install work reliably is a must – there is a lot of training required to learn about other systems and integration,” he says. “Doing the training will make the job go smoothly and the system reliable. You also need to back up when things don’t work. This will give the customer more confidence in the person doing the job.” Is integration easier than it used to be when everything needed to be customised – and is integration out of the box possible? “Integration can be easy when you use proprietary equipment, but this can come at a large cost and you will be limited to what you can link to,” Mathews explains. “Most of the time you need to use equipment from different suppliers and make them work together. This is where the skill of the installer can come in to play knowing what works with what. Today, there are a lot of new products on the market which use their own apps and are cheap and easy to install. “The thing making integration hard is trying to talk to other systems. Sometimes you need to install a 3rd party system to link the 2 together. Security manufacturers of small systems are slow at making these systems talk to other automation systems, in my opinion, but the more advanced security systems are better at this.” Efficiency is a key area for end users and it’s an excellent selling point for installers, according to Mathews. “Integration is a key part in any install where end users want to reduce energy costs,” he explains. “Having a system that detects people in the building and controls lighting and air conditioning in that area and then shuts them down when the security system is armed can save significant amounts of money over time – this applies to smaller sites as well as to larger ones.” According to Pelco’s Branon Painter the integrated security market is changing. “Security used to be a separate entity from building operations, time has seen the integration of building management systems such as HVAC, Elevator control, Parking systems, fire and visitor management and other elements into a single management console,” Painter explains. “Now we are evolving into converged single operating environments where the entire building system can be run from a single piece of software.” Painter argues that systems should be tied together in a way that improves automation and operational efficiency, however, he says that too often Pelco sees operating procedures that are designed around the limitations of how systems can talk to each other. “For example, if the video system could show a

30 se&n

door, but the access control system could not control a door, the operating process might be developed to use a video system to manage unattended door control, which might not be the best use of the system,” he explains. “Modern software capabilities of all systems allow for a great deal of customization in how systems are unified into a single operating system.” Painter explains that the first step in any integration is to articulate and capture the desired outcome. “The capabilities of the different systems provide a great deal of options for how things could work together, but the building owner has unique needs and does not need every capability,” he says. “Once the scope of the project has been set, the capabilities of the systems can be reviewed, and the work can begin. Sometimes operating procedures may have to be modified to meet the limitations of a sub system, but so long as the work begins with the desired outcome research, the result will be acceptable. “The days when an operator had to use 5 or more systems to manage a facility are really behind us. That change has allowed a better management


Hikvision Oceania Tel: +61 2 8599 4233 Email:salesau@hikvision.com

https://csd.com.au/

www.nesscorporation.com

www.videosecurityproducts.com.au

https://www.hikvision.com/au-en/


● Special report

Sub systems ORGANISATIONS SUCH AS ONVIF AND OSSA, IN WHICH PELCO IS A FOUNDING MEMBER AND KEY CONTRIBUTER, ARE CRITICAL IN MOVING THE INDUSTRY TOWARDS A PLACE WHERE INTEGRATION COULD BE TRULY OUT OF THE BOX.

experience with all systems able to be controlled in one user interface. This first step has an obvious pay back for an operator who no longer needs to load-and-context switch between different sub systems. I think it gets interesting when we start to add more automation and intelligence – operations and incident responses could be more automated, bringing further efficiency gains. “Importantly, a lot more initiatives have been driving standardization of communication protocols, which make sharing of data between systems a lot easier. Organisations such as ONVIF and OSSA, in which Pelco is a founding member and key contributer, are critical in moving the industry towards a place where integration could be truly out of the box. Until we get there, there are always a few knobs to turn and buttons to press.” Painter agrees skilful integration capability is an asset to installers. “The modern world has really elevated our expectations of how different systems can work together,” he explains. “The fact we can all easily screen share from our phones to our TV may seem normal today, but the fact that those different systems are able to communicate so seamlessly really is indicative of the way we expect our independent devices and systems to interact. An installer who can make this a reality at the commercial sub system level will clearly meet the much higher expectations end users have about integration.” While Painter has worked on many complex integrations, he says integrators should not

32 se&n

underestimate the human challenges. “I’ve worked on numerous large city surveillance projects which involved multiple local and national police entities, as well as private business owners operating independent systems and trying to figure out ways to pull security and other operational data together,” Painter explains. “The complexities of the integration requirements were outweighed by the complexities of the multilateral agreements that had to be forged to allow data sharing in a legal, fair and consistent manner with multiple competing agencies involved.” At Tyco Security Products Basil Delimitros says that in the experience of the TSP team, everyone wants to integrate with video for event verification purposes. “Typically, intrusion and access control are the most popular technologies to integrate with video, however, there have been requests to integrate building management systems, encompassing fire systems and smart lighting as part of a security monitoring system,” he explains. “In my experience, the challenges for typical sub-system integrations are mostly around version compatibilities. “Most high level integrations (HLI’s) are written to bind 2 complimentary technologies for a single outcome,” he says. Often these technologies are provided by different manufacturers who are leaders in their respective categories and the biggest challenge is change and version management - the assurance that as the systems are upgraded to take advantage of new features available, the HLI must still operate seamlessly through an upgrade cycle of any or all platform upgrades. “Integrators also need to undertake careful planning and factory acceptance testing before onsite deployment to ensure all ‘real-life’ experiences are working as required.” According to Delimitros, operational efficiency is a key aspect of decisions around integrations. “The purpose of integration is to allow system intelligence to provide the operator with actionable events or give them the ability to search video or events based on user-defined criteria,” he says. “For example, an integrated video and access control system will allow an operator to search for an access card user within an organization with tagged video for verification processes. This is a gain in productivity as a single interface is required to search across 2 systems. At the same time, video content analytics can shorten the time taken to search for a person, object or event based on criteria entered by the operator.” n


Come see us at

- MELBOURNE - SYDNEY - BRISBANE - ADELAIDE - PERTH - in May 2019 -

Complexity simplified ...

SensaTek continues to innovate with our new partner IPConfigure. Their award winning Video Management System - Orchid, offers a simplified and reliable VMS for small and large installations alike. Orchid boasts a simple, sophisticated interface that offers a rich and engaging user experience. To test drive their offering contact us to arrange a trial.

We focus on your priorities. 1300 560 026 | sales@sensatek.com.au | www.sensatek.com.au


● Special report

Low cost cameras

LOW COST CAMERAS

Across many applications there are hundreds of thousands of low-cost CCTV cameras being installed. The question for end users and integrators, too, is whether or not this is a problem, or whether some affordable cameras are capable of meeting a testable minimum standard when it comes to operational requirements. 34 se&n

HERE’S no doubt that many low end cameras are low end performers. They exhibit inconsistent performance, they have plastic lenses with curious optical characteristics, their poorly-designed CMOS sensors show blooming, depend on amplification to enhance ordinary low light performance and cut corners with compression to tidy up. But not every affordable surveillance camera is the same and there are plenty of options in the mid-range that will satisfy properly informed end users. “My view is that almost any camera will work internally with the availability of consistent artificial lighting to cover small areas - for offices, some retail and in corridors, you can’t go very wrong with them,” says Luke Percy-Dove. “Outside of that, it’s very easy to get camera selection wrong and too many in the video surveillance industry continue to do. I don’t believe the end-user wants low-end cameras – most end users will pay a fair price for CCTV if they are properly advised on the differences.

T


BY J O H N A D A M S

“At the affordable end of the market, domes are the most common choice because they are incredibly versatile. A 3-4MP dome with good WDR capabilities and a 4-12mm lens you could use almost anywhere. Plus, they are robust and less susceptible to tampering.” CCTV design consultant, Scott Myles, says he finds customers understand the need for security advice “that converts to viable, real-world fit for purpose and future proof solutions - we generally do not work in the lower end of the market, however, from a domestic or light commercial perspective where systems are not mission critical, the lower end of the market offers solutions. “As technology develops, we are seeing a shift from the typical single sensor camera application to the multi-sensor – both individual and stitched panoramic views, that provide users with enhanced situational awareness,” Myles says. “As camera technology develops, we look forward to the opportunities and benefits that this will bring to our industry and our customers.” If installers are looking for a standard low-cost camera with a fixed lens, what’s the most balanced solution when it comes to focal length and resolution with 1/3-inch sensors? Would you agree 6mm at 1080p with a maximum admissible depth of field up to about 10 metres? “This is an interesting question and from our experience the answer is more aligned to the application instead of a hard and fast rule around the image sensor and lens type,” Myles explains. “As we all know DoF changes with the light conditions and is dependent on the quality of the lens. As such we generally look at the application and the target area and take into consideration many factors such as object, target size, environmental conditions and motion, and work from there.” Over at CCTV Consultants, Doug Grant argues the obvious problem with low end camera sales is that lower margins on sales have led to a supply industry with far fewer support staff on the ground. “Business models have changed to manage the lower profits and lower volumes,” Grant explains. “We are in the middle of a change that may end in a monopoly for a very few. At issue is that the cameras at this lower end may not reach certain operational requirements required 5 years ago, but they are being accepted by end users as an acceptable image device for a video surveillance solution.” According to Grant, the first dome camera was made by Elbex of Japan in the early 1990’s and the most common cameras now installed in the low end of the CCTV market are Chinese-made dome cameras - he points out that many other brands are having their cameras manufactured in China in order to compete. However, Grant is quick to point out that the major Chinese manufacturers make high end CCTV cameras that are the equal of or higher quality than their competitors, but this has not altered the fact price has superseded operational requirements in too many solutions. “We are all to blame for it as everybody wants to

WE ARE ALL TO BLAME FOR IT AS EVERYBODY WANTS TO SELL MORE CAMERAS BY OFFERING THE CHEAPEST PRODUCT, RATHER THAN EDUCATING THE CUSTOMERS TO MAKE WISER CHOICES.

sell more cameras by offering the cheapest product, rather than educating customers to make wiser choices,” he explains. “Sadly, this is an outcome of a lack of professionalism. In my opinion, the quality of CCTV systems is only debated when something bad happens. Until then, it is only a race for selling more, no matter what quality. “Regardless of the quality, of some benchmark cameras in any manufacturer’s lineup, there are still some inferior items there. I’ve done many detailed evaluations for some consulting projects in the past year or two, and I know this is true and installers and end users should be aware of it. Each camera model, no matter what make it is, should be independently evaluated by a knowledgeable technical person. Vlado Damjanovski of ViDiLabs says installers looking to use low cost cameras with fixed lenses in typical applications to take advantage of the area of sharpest focus could use a quality 1/3-inch HD sensor with a lens focal length of 6mm but he says they’ll still need to be mindful of their application. “This combination would give a hyperfocal point of around 2m in front of the camera (this is your actual focussed plane), but the image will appear sharp from 1m in front of the camera to infinity – that’s what gives you depth-of-field,” Damjanovski says. “Using a camera like this in a suitable application would mean you would not need to re-focus the camera if the object moves from 1m up to infinity. “Having said that my ViDiLabs calculator tells me that with the 1/3-inch HD lens and 6mm fitted, your ability to identify faces according to our standards (350pix/m) will only be up to 7m. Faces that are further then 7m will appear smaller (they’ll have less pixel density) and will get harder to identify. This will be especially noticeable when it gets darker, as the resolution reduces with increased noise. Given this, I would argue that depending on the camera quality and noise compression, the calculated 7metres will become less when it gets darker. “Installers will have an image which is supposed to have quite a good DoF, but when noise kicks performance will fall away. I would argue that bigger pixels would be much better choice, even if I don’t have such a DoF. The DoF does depend on the pixel size. With bigger pixels, the DoF for the same f-stop is shallower. So, we do get a bit of benefit using smaller pixels which produce bigger DoF, but the picture gets noisier.” Damjanovski says iris setting is another consideration – the aperture that produces the sharpest image is not the largest aperture but is always several stops down. “The sweet spot in optics refers to the iris setting which produces the sharpest overall image,” he explains. “The iris sweet spot does not provide the highest depth of field (DoF), but it provides for sharpest optical image at the focal plane for the given lens. Typically, the iris sweet spot is in the middle of the lens F-stop abilities, and this is used by the socalled P-iris technology. The camera electronics attempt to keep the iris in the sweet spot as much as possible for the given light levels.” n se&n 35


● News report

TSP

TYCO SECURITY PRODUCTS – GROWING ANZ PRESENCE Tyco Security Products (TSP) is one of the largest electronic security companies in the world with profound capabilities in areas as diverse as home automation, video surveillance and enterprise integration. FTER multiple new hires, Bill Sakellariou, VP sales ANZ, says he’s satisfied the expanded TSP team is now properly resourced to take the company’s product range to the Australian and New Zealand market. Meeting the team in Melbourne recently, it was hard not to agree with him. Spending time with a team in the formative stages of gelling is always informative. Alongside the good humour and ribbing you always get from former competitors and old acquaintances, there’s a lot of respect for the company’s product range around the table. There’s also plenty of respect between new and old team members. Each of these guys has been around a long time and is in the prime of their careers. Just as important, they bring subtly different skillsets to the table. Listening to the talk I can’t help feeling that TSP is an interesting study. Under the TSP umbrella are multiple old and famous global brands including exacqVision, Kantech, DSC, CEM, Software House and American Dynamics - whose functionalities have been polished by the relentless lapidary of operational demand over decades. In Australia, the company’s brands are known but despite their longevity and lateral capability, they’re not recognised as the powerhouse global solutions that they are. The customer base reflects that truth. TSP has more instantly recognisable enterprise-level customers globally than any local competitor. What’s interesting about the task the TSP team faces is that much of the ground work has already been done. Despite operating under the radar with limited material support, TSP solutions are installed in telcos, logistics companies, defence and

A

36 se&n

government, healthcare facilities and educational institutions across Australia. Tyco products have been installed in Australia for much longer than people realise, and the product spread is massive. Just as an example, TSP has 14 airports running CEM access control solutions across the Pacific and Telstra has been a C-Cure client since the 1990s.

THE TSP TEAM TSP’s newly expanded team includes Nic DeAngelis, Michael Bragg, Jason Barcock, Basil Delimitros, Darren Edmondson, Chris Whiting and Scott Whitehead. There are plenty of familiar faces here and there’s serious seniority, too. This is an experienced team that has proved itself in the long game – there’s not going to be any time-consuming cutting of teeth – the TSP crew is already running hard at clear goals. Nic De Angelis launched his career in the electronic security industry as control room operator. He has worked for ADT, worked in distribution in 2000 starting with Security Merchants and remained there for 10 years doing everything from national


BY J O H N A D A M S

Jason Barcock (left), Scott Whitehead, Michael Bragg, Bill Sakellariou, Nic DeAngelis, Darren Edmondson, Chris Whiting and Basil Delimitros

warehousing, international purchasing, internal sales, then advanced to state manager. “I left Security Merchants in 2010 and did 2 years as state manager for a local installation company doing nurse call, radio paging and security,” De Angelis explains. “I was convinced to return to ASSA ABLOY and spent 3 years in the specification team – then about 3 years ago, I was attracted by Tyco’s product spread and joined up – a merger made Tyco TSP.” Michael Bragg joined the security industry in 2000 – he started his career with Sensormatic selling retail EAS systems, then after ADT’s acquisition ran his own business selling early Intellex solutions in the hospitality market. Next, he went to UK and worked for a security company partnering with police, experienced significant commercial success winning a massive CCTV solution in the food production industry. Bragg then returned to Australia, worked for a Nurse Call Company for 4 years, then Bosch security for 4 years, then with a well-respected distributor. “I wanted to return to manufacturing, and this is

WE SECURE COMPANIES LIKE FACEBOOK, GOOGLE AND THE U.S. PENTAGON AND WE HAVE HUGE CUSTOMER LOCALLY – IT’S TIME TO TALK ABOUT THAT.

an interesting challenge – TSP has market-leading products that are globally recognised but Australia is unaware of them,” Bragg says. “We need to let Australian market know our capabilities – we secure companies like Facebook, Google and the U.S. Pentagon and we have huge customer base locally – it’s time to talk about that.” Jason Barcock is an application and pre-sales engineer with 20 years of experience. Like the others he’s worked his way up, first as an apprentice sparky, He then went to the UK for gap year and stayed for 13 years, learned the C-Cure enterprise access control solutions and returned to Australia and worked for an integrator selling Tyco products, including C-Cure. “I then joined Tyco Security Products, went to another integrator and then returned to Tyco 5 years ago,” Barcock says. Meanwhile, Basil Delimitros has 28 years electronic security industry experience, Delimitros worked his way up through the ranks and found himself at Hills after the acquisition of LAN-1. The roles he’s had over the years include sales se&n 37


● News report

TSP

and product/vendor management. According to Delimitros he was looking for a new opportunity. “That’s what TSP brings – the ability to sell everything from CCTV to access control, alarm systems and everything in between,” he says. “There’s also the chance to build something big from the ground up. It’s exciting times.” Darren Edmondson started out working for Signature which was bought out by ADT, and he put in 14 years’ service there. Next, he worked for PaulTec Security in operations, worked with Anytime Fitness Australia and Asia, then moved to Hills in the enterprise space as an account manager and after success there, decided to work for a manufacturer. “While I wanted to work for a large manufacturer, I did not really understand the scale - I did not know much about TSP’s products until I arrived here. I never realised how big TSP was,” Edmondson says. Scott Whitehead has been in the industry for 25 years. He started out with Ademco, then went to Rexel and Panasonic. “I also put in stints with a couple of integrators, joined Tyco 9 years ago – firstly in sales and business development and basically every other hat as there were only 2 of us,” Whitehead says. “Then around 4.5 years ago, I moved across to the APAC trainer role – we have some really great products here and it’s excellent to have a strong team to sell and support them.” Next is Chris Whiting, who has been GM of Hills in NZ for the last few years. Prior to this he was GM of sales with Armourguard and he has plenty of experience in manned services, cash in transit and patrols. He’s worked for Tyco, run ADT’s residential small business team and importantly, he’s also worked for an integrator. Whiting’s is an important appointment. You can’t do business in New Zealand without boots on the ground. Whiting is passionate about the security business and approaches it from an operational perspective.

TSP ROUND TABLE Chatting to the team around the table I get a strong sense of their commitment to brands they recognise as being market leaders at the global level, not only locally. “One of our access control solutions – a small one – is on par with local systems that are considered large,” says De Angelis. “And we have 3 access control solutions. It’s the same with intrusion and the same with CCTV. We have multiple major product lines, and each has thousands of parts – there’s just an enormous amount of data to be absorbed and retransmitted to people over and over. In the past we’ve not had the resources, but things are changing. The way you build a brand is one person at a time – you do it 1000 times. We need to undertake this process across all of our products – it’s a massive task. “The scope of the business is so much greater than the market realises. People don’t realise that we probably have more DSC panels installed in Australia every month than any other manufacturer

38 se&n

TO GET 3 TECHNOLOGIES AND PULL OUT A REPORT FROM ALL OF THEM INTO A SINGLE USER INTERFACE THAT’S INTUITIVE AND USER FRIENDLY – IT’S WHAT THE MARKET IS LOOKING FOR.

of alarm systems. It is a significantly large number of DSC panels every month – no one knows it because those panels are not branded DSC. We dominate in many parts of the market and we have for a long time. We have quietly built this business and not talked about it – it’s a sleeping giant.” “The other thing is that we as an organisation set some high bars for C-Cure partners – we require really high levels of competency. When an SI is doing work for one of the big multinationals we look after the feedback we would get is what value is the distributor bringing – they are simply taking a margin for moving a box that we may as well buy directly from the source. It’s difficult to make the case to the high-end integrators that a distribution model works best for them – we need a mixed model, because we have a mixed client base. Meanwhile, Delimitros says the team is sympathetic to the challenges of distribution. “We’ve all worked in distribution and we know the pressures SIs can place on distributors,” he explains. “We are going to use all our combined knowledge to give the best experience to our partners – be they consultant, distributor, systems integrator, end user. When you look at the size and scope of TSP’s products – and I’ve competed against these products in the past – it’s impossible to ignore the size and power of these solutions – they are second to none. In terms of the size of our organisation compared to the competitors, we far outstrip them.” For Edmondson, service and support will be key as the business goes into a growth phase. “I think when it comes to servicing customers now with the team that we’ve got – we can handle that more effectively and efficiently,” Edmondson says. “It’s key in this industry and I think we can now provide that thanks to this combination of the existing team and the new team. Our service and our response times – that’s going to be something distributors and integrators are going to notice immediately.”

TSP’S 3-YEAR PLAN Sakellariou’s brief is simple enough – to change the way TSP is perceived locally and to push the business forward by promoting the company’s solutions and offering elevated levels of support. But saying a thing in words and delivering it in a competitive market are not the same. “A small, dedicated team has been flying the flag and step one of our plan has been to bolster the existing team – to add resources capable of delivering real support,” he says. “To that end, I’ve bought serious people on board and I’m confident that they will get the job done. “We now have national representation – in the past staff have been trying to support multiple complex solutions in the product line at a national level and it hasn’t been effective. A small team has been based in NSW and Victoria and while they’ve tried to cover other states, you need local representation – you just can’t get around that. You need to be able to train


Smart Simple Secure

Learn more at SecTech. UltraSync, the latest innovation in security automation and protection from Interlogix. Built on cloud-based technology, the UltraSync system allows you to remotely monitor, manage and automate building or home security systems, lights, thermostats and locks, from your smartphone or tablet.

UTC Fire & Security Australia Pty Ltd trading as Interlogix. Š 2019 All rights reserved.

Register today at sectechroadshow.com.au


● News report

TSP

security integrators working with complex products and to be available to support them through the planning and installation process. That’s where we are getting to - we want to get the message out there to the grassroots – this is who we are, and these are our products, this is your new level of support. “Thanks to the expanded team, we now have the flexibility for either team member to go into another state as required for as long as required - we can better support our distributors and we can support major security integrators directly with training and technical expertise,” Sakellariou says. Education is a core aspect of the growth trajectory for TSP. “As part of the ground work we’ve undertaken, we have training there if we need it and our partners are more engaged because they can see there is more activity from our side as well,” he says. According to Delimitros, TSP’s strategic acquisitions significantly enhance the capability and the narrative of the TSP solutions. “For the new team members coming to the company I think it’s great that we have new things to talk about to people with whom we have trusted relationships – that’s exciting,” he explains. “The market is changing – there are new pieces of functionality that users want. From a CCTV perspective, high level integrations are something that has been desired for a long time but today we are not talking about HLIs. We are talking about pre-integrated solutions – managing compatibility between different technologies – it’s one of the advantages of owning the vertical.

40 se&n

The TSP team.

“At TSP, we not only integrate with third parties, we integrate brilliantly with our own solutions – we don’t have issues with integrating access control and CCTV – we don’t have failures because of something mundane like a firmware upgrade. Our integrations work. To get 3 technologies and pull out a report from them into a single user interface that’s intuitive and user friendly – it’s what the market is looking for.” De Angelis agrees. “Useability is the key,” he explains. “Past a certain point of complexity, you run the risk that the system is too complex to use – we recognised globally this was coming decades ago and started a programme to resolve the issues. Once you’ve linked multiple systems together what you get is a vast complicated system and you’ve got to trim it down because if an end user can’t operate that system, they won’t value it. Then there’s the fact if you upgrade one system, you must upgrade the other. Your libraries must link correctly. “There are other technologies, too. The power in your hand – connected home – subscription-based alarm services – solutions like Qolsys IQ 2 panel – that’s one of ours. People love that control, but don’t want to pay for more than they need. Think about the old model of 10 years ago – an alarm panel paying one dollar a day for monitoring. What do you get? The monitoring station can’t send a guard if they can’t see an intruder. But now you can get an alert on your phone – you can turn on a light, see who is there, speak to the person, grant them access, request assistance from police – you have power in your hand – at TSP, that’s what we deliver.” n


Š 2018 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.

Š 2018 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.

Start seeingthe the bigger Start seeing biggerpicture. picture. Get a more complete understanding of your organization with Genetec Security Center. It unifies our three core systems of video surveillance, access control, and automatic number plate recognition in more complete understanding of youryour organization with Security Center. It unifies a single comprehensive platform. Simplify operations and getGenetec a clearer view with Security Center.

Get a our three core systems of video surveillance, access control, and automatic number plate recognition in a single comprehensive platform. Simplify your operations and get a clearer view with Security Center. Find out about Security Center from our trusted partner at hills.com.au

For more information on these and other best-in-class solutions Security Center from our trusted partner at hills.com.au from Hills call us on 1300 HILLS1 (445Find 571)out or about visit hills.com.au

facebook.com/HillsLtd/ CONNECT

E N T E RTA I N

SECURE


● Special report

Cyber security

STRENGTHEN CYBER SECURITY CREATING a secure environment against the ever-present threat of cyber-attack requires more than good technology deployed in a secure way with regular updates. According to Andrew Scothern, chief software architect at Gallagher, people and culture also make up a large (and less predictable) part of your cyber defence. ROM a cyber risk point of view, once your technology is fairly locked down, people become the easiest way in. All the end-toend encryption, upgrades and patches in the world won’t protect your business from social engineering attacks, errors by employees who don’t understand the risks or, in the absolute worst case, malicious internal threat actors intentionally disrupting your systems. The human element can create vulnerabilities in some of the most secure environments. But where there’s risk, there’s opportunity. People and culture can also be a great asset when it comes to your cyber-security. You must educate your people about cyber threats. In the same way health and safety practices are now recognised as everyone’s responsibility, cyber security requires a whole of business approach. Make policies and training part of your cyber security planning, ensuring best practice information is available widely and enacted as part of company culture. That doesn’t mean everyone has to fully understand all the details, but they do need to have the tools and basic knowledge to help keep your system secure. This can be as simple as regularly alerting people to current threats, ensuring password best practice rules are embedded in business practices, or understanding why it’s important not to give out contact details to cold callers. Identify champions across your business who can keep cyber security visible and meaningful to employees, supporting people to help protect their workplace from cyber threats. With the backing

F

Andrew Scothern, chief software architect, Gallagher.

of policy, education and culture, people will feel empowered to make a difference, which means cyber security becomes embedded as a ‘business as usual’ approach. You must also manage user privileges. Cyberattacks don’t discriminate between the receptionist at the front desk and the manager in the office, particularly when it comes to social engineering attacks that manipulate people into revealing confidential information. The level of risk you expose yourself to can depend on what access to information individuals have, based on their user privileges. It’s human nature to want to help, and social engineering attacks exploit this compulsion. To counter this, tight control of permissions ensures information is not freely available to employees who don’t need it, reducing the risk of the wrong people getting hold of crucial data. Put simply, tailor permissions to the individual – only give universal access to those who absolutely need it. Finally, if someone is leaving the organisation, especially if it’s under a cloud, make sure you promptly remove their permissions and access to data. And look after your people. A company culture of reciprocal loyalty and trust can protect you as much as any business process or user permission management. The spectre of internal threat actors – those who might intentionally cause damage or allow access to your system – is not one I prefer to focus on because it isn’t a common situation for most companies. Absolutely take precautions with education, permissions and access, but looking at and treating your employees as a threat actively works against a positive company culture. Focusing instead on support, education and positive team building can be infinitely more valuable when it comes to motivating people to take cyber security and protection seriously. In other words, look after your people and they’ll be more likely to look after you. The simplest way to get started when addressing people and culture in cyber security is to ask one question: Who in our business cares about this? If the answer is ‘Just me and the IT guys,’ then it’s time to get moving and make cyber security a priority for all your people, from the guard at the gate to the CEO’s office. n Andrew Scothern has over 20 years’ experience in product development encompassing software development, software architecture, R&D management and IT advisory roles. He loves to work where people, process and technology intersect, finding new and innovative ways to solve complex problems. Andrew is also a founding member of the industry advisory group (IAG) behind the STRATUS research project, focused on improving cyber security and control of data to the end user.

42 se&n


COLOGNE CATHEDRAL SQUARE


● Regulars

The Interview

Brenna Guiney, ISP In SEN’s Interview this month we speak with security consultant, sociologist and social impact practitioner, Brenna Guiney, of Independent Security Professionals, about her security career, the different ways people perceive, behave and respond to security and technology strategies, and her thoughts on women in security.

JA: When did you join the security industry? BG: I was lucky to grow up in the security industry. My family owned a security integration company throughout my childhood, which was acquired by TAC (now Schneider) in 2007, and it’s where I had my first job. But even before I started my first job there, rather than normal family conversations, our dinner table conversations were about CCTV and access control, so it was a part of my life and rhetoric at a very early age. Being able to see, touch and use these systems at such a young age made them feel like second nature to me once I started thinking about them in more detail. So, by the time I started working in the industry, I had developed a good foundation of technical knowledge, as well as knowledge of how jobs are priced, tendered and run. Doing take-offs and estimate sheets at 15 years old really ingrained it in my brain before I had even considered a career in the industry. While I found it far more interesting to work in my family’s company at 15 than the local supermarket like my friends were, it was not until university that I realised I wanted to forge a career in the security industry. Throughout my degree in sociology, I specialised in security, surveillance and counterterrorism, and it was through undertaking empirical research projects and in-depth theoretical studies that I realised I wanted to undertake a career

44 se&n

path that allowed me to delve into both technical and social problems. Security consulting allowed me to do just that. JA: At what point did you realise the security industry could offer you a challenging and rewarding career? BG: By the time I was nearing the end of my university degree, I was already targeting a career in the security industry. However, the moment I realised it could fulfil my desire for both a challenging and rewarding career was in my first position out of university as a project administrator. I was immediately thrown in the deep end, which I loved, and it was the mixture of the project deadlines, client liaison, complex technical issues and administration and regulation requirements that I found so rewarding. I had exposure to the government and policy sphere prior to this position and it was the contrast between the laborious nature of policy development to the fast-paced delivery of multiple projects and engagement with a varied client base in consultancy that won me over. JA: Brenna, you’re a security expert and a sociologist – how valuable is it to understand society and social problems when planning security solutions and procedures? BG: I wouldn’t quite call myself an expert, it’s said that it takes 30,000 hours and I’m still too young for that! But a

security consultant and sociologist, yes. This combination allows me to uncover exactly how important it is to understand society and social problems when planning security solutions and procedures. In sociology, it is understood that crime is an inherent part of society and that all societies have a ‘natural’ level of crime. It is then modulated by various social processes and forces, such as policies, policing, security mechanisms, and so on. But this notion suggests that no matter how many security interventions are undertaken, crime will never be reduced to zero. Therefore, it is critical to understand the typology of a society to determine what its natural crime level is, what its modulated level is and why, and then how different security interventions may act on this level. However, in our industry, we’re not always just trying to act on crime, but also deviance. We may be wanting to modulate how people move through a space, linger where we don’t want them to, draw their attention away from certain spaces, attract or deter certain individuals from engaging with a space, and so on. The most valuable information to determining how to achieve these goals is what comprises the society in which the unwanted behaviours take place. Society is only created when there are norms between individuals, and profiling allows you to determine what mechanisms are required to act on these norms. JA: There’s a reactive element to technology – do you agree that more human understanding could enhance the way security technology is applied, making it more effective and more efficient? BG: Absolutely, reactive implementations are typically less effective and costly, mostly because the incident or lack of efficiency has already happened, and the infrastructure is typically not in place. While it can never be determined with absolute certainty, social research allows for many potential outcomes or impacts to be determined before they occur.


BRENNA GUINEY WITH JOHN ADAMS

THE PHYSICAL BARRIERS IMPACT ON AN INDIVIDUAL’S LIBERTY OF MOVEMENT EQUALLY WHETHER THEY ARE A THREAT OR NOT. THE RESULT OF THIS IS THAT PUBLIC SPACE REMAINS ACCESSIBLE, BUT BECOMES FILTERED.

Brenna Guiney, Independant Security Professionals.

This allows for technology and security to be implemented proactively, which is typically a more effective approach. For example, there are situations where proactively, certain unwanted behaviours can be influenced and supressed from occurring in the first place through passive means. Conversely, after unwanted behaviour has been allowed to occur, overt means may be required to control it or shift it away from the area in question. Overt means are typically more expensive, laborious, and perceived negatively in terms of perceptions of social control, fear and anxiety. So yes, there can be ongoing

negative impacts from operating in a reactive state. JA: Is it fair to say that while the security industry has a reasonable sense of technology and is across many aspects of crime prevention there’s a shortage of understanding of human behaviour and its relationship with positive/negative social change? BG: Absolutely, I think that is a fair statement based on my experience in the industry. One of the main things I see from security interventions (that’s clearly not considered in the design), is that the overdesign of systems using

overt security mechanisms can result in a decrease in an individual’s perceptions of safety and security. Peoples’ fear and anxiety increases as the result of a security intervention, which is obviously not the goal of security design. This is primarily because there is a disconnect between the way we in the security industry define ‘security’, which is how safe an asset is from a threat, and how the general public define ‘security’, which is how safe and free from fear they are. Once this disconnect is acknowledged, the negative social impacts of our security interventions can be resolved.

se&n 45


● Regulars

The Interview

JA: In your opinion, what’s the most important aspect of security system design? And what do most systems get wrong? BG: From a system design point of view, it would be the consideration of the user and their predisposed attitudes towards technology. Systems are typically designed with a one size fits all approach, but this forgets to acknowledge the fact that no 2 individuals are the same. Yes, there are norms in society, but even still, there are vast differences between demographic, social and cultural groups. For example, the over-65 demographic is the least digitally-included age group, which can result in more negative attitudes towards usage and acceptance of new technologies, particularly due to previous experiences with technology and lack of perquisite skills. Conversely, those that speak a language other than English have a higher digital inclusion rate than the average Australian, which is the result of the ease with which technology can be translated into various languages, and the fact that digital interfaces typically

46 se&n

remain common across cultural bounds. Just these 2 small examples indicate the need to understand the end user of technology before determining how a system should be designed or delivered. This includes direct engagement with the end user at various stages of the design process, and while yes, it may be more time consuming and initially more costly, there is greater return in the mitigation of various issues that may result from poor system design and implementation on an ongoing basis. JA: Do you think there’s also a human element to the security operations side that can be altered to dramatically improve performance? BG: Definitely - take security control rooms. As is widely acknowledged, there is a capacity to the extent of human attention and therefore control room operators can only take on so much information. However, studies have also shown that to relieve the stress and boredom some experience, control room operators develop narratives about those who they watch, while some even try to communicate through camera

movement with their subjects. While this is a somewhat expected outcome, studies have also shown that the detached nature of many control room operators from the physicality of what is occurring on their screens has also resulted in growing ambivalence towards incidents and their subjects. Obviously, this can have a significant impact on performance in security operations, particularly if incidents are not responded to efficiently or with the level of importance required. Although these specific studies only sought to identify the issues in some control room situations and not solutions, they indicate the need to acknowledge the impact of the work on the worker and develop strategies to relieve the pressures that cause behavioural changes wherein productivity is reduced overtime. JA: Could you sketch out the social impact of a particular security solution in a given situation? Was this impact entirely expected or did it come as a surprise? BG: Let’s take for example hostile


BRENNA GUINEY WITH JOHN ADAMS

vehicle mitigation (HVM). There is a general acknowledgement of how the pervasiveness of security technologies in society has resulted in people perceiving a reduction of their civil liberties, but there has been little discussion outside specific academic journals about the impact that physical security mechanisms like HVM can have on individual freedom. As a security consultant, I absolutely agree with the protection of public spaces with HVM to meet increased threats of vehicle attacks over the past few years. But I’ve also observed that many HVM installations are reactive and rushed, resulting in intrusive barriers in spaces that are meant to appear inviting and sociable. By implementing security measures in this way, these obtrusive barriers conflict with the intended sense of space and the socialisation that is meant to occur within it. Typically, security systems undertake some sort of social sorting that decides who is restricted and who is not, whether this is through CCTV systems with movement analytics, or through access control systems that have a predefined hierarchy of access. However, the socio-spatial impacts of hostile vehicle mitigation in places of mass gathering are non-discerning and cast a wide net of scrutiny. The physical barriers impact on an individual’s liberty of movement equally whether they are a threat or not. The result of this is that public space remains accessible, but becomes filtered. From these socio-spatial impacts come socio-cultural impacts, where individuals begin to engage differently with social spaces. As Salman Rushdie said, “there is no such thing as perfect security, only varying levels of insecurity”. As such, the result of the overt or incorrect implementation of HVM is that unfortunately, the more secure we make a place, the more insecure people can feel with increased perceptions of vulnerability and threat. Now, isn’t it the ultimate achievement of terrorism if the very mechanisms we use to secure ourselves result in the achievement of their aim; to restrict or abolish Western freedoms? We restrict our own movement and the ability to freely access a space in the attempt to protect ourselves from a security threat, but in the end, result in lessening personal security in the sense of being free from fear and anxiety. This

is the social challenge that we must be cognisant of when implementing security solutions. JA: What advice would you give women considering a career in security or who are hoping to advance their careers? What should they focus on? BG: I would say that building a network of professionals who inspire you is key to understanding everything that the industry has to offer. For me, meeting and engaging with a network of varied professionals opened my eyes to the vast range of careers that fall under the security industry banner, and to the fact that there is the potential to forge your own path even if it does not already exist. Meeting strong and successful women, many who owned and operated their own companies, was a great inspiration for me, so I suggest that any women considering a career in security surround themselves with positive and supportive networks. JA: What has your most challenging project been so far – what did it teach you? BG: It was more a time period than one project, as the most challenging moment was when I was working on 2 PPP’s for correctional centres - one which was based overseas - as well as completing the design of a correctional centre expansion and commencing the construction phase of another. Understandably, it was an immense challenge to balance the competing objectives of all these projects. I know that anyone who has worked on a PPP can appreciate the all-consuming nature of them and the desire to develop the best design - it can take over your nights and weekends for months. So, balancing this with my 2 existing projects was difficult, especially because I had worked on those 2 other projects for about 18 months each and the success of them was very dear to me. While it was a tough few months, it was probably also the most formative period of my career. It taught me to properly prioritise and delegate, it developed my leadership skills, it pushed me technically and personally and I think I became a far stronger consultant for that. I also think those few months were indicative of what it’s really like being a security consultant and learning to ride the wave before things calm down in the ebb and flow of project-based work. These are skills that I now find invaluable being director

of Independent Security Professionals and being able to balance leading the business, delivering for our clients and maintaining a work life balance. JA: What do you love most about your role – what gives you the most professional satisfaction? BG: I love driving the direction of the company and targeting projects which I both find interesting and challenging, and working with clients that I align with professionally. One of our main tenets is to work with our clients in partnership, which has been an immensely valuable approach to the success of many of our projects. It has allowed us to elevate security out of the services and into the strategy of our clients’ businesses to deliver policy direction for their operations. JA: Do you have any advice for young people started out in the industry? BG: As the ASIS International NSW Chapter Young Professionals Liaison I’m quite passionate about bringing young people into the industry. I recently spoke at an industry engagement event at the University of Newcastle and found the interest from students to be enormous. However, before I spoke to these students, who were from the faculty of criminology, they had not really heard of security industry career paths. So my advice isn’t really to young people, but to those established in the industry, and it is to hire graduates, create internships, remunerate young people based on output and performance rather than age, and welcome those from various academic backgrounds because diversity of opinion and knowledge is how the industry will continue to thrive. For young people, my advice would be to have persistence and to chase down the career you want, no matter how many closed doors you experience. Also, seek out a mentor. So many established security professionals are open and willing to share their knowledge, which can be invaluable for young people starting out in the industry. I also think many young people can get discouraged if they do not achieve the position they want or expect straight away. Remember that your career is decades, not years or months long, and there are many paths to achieve your desired outcome. n

se&n 47


● Product review

Vivotek

VIVOTEK MS9390-HV PANORAMIC Vivotek’s MS9390-HV is a panoramic network camera that incorporates a pair of wide angle lenses, electronic image stitching, and high resolution sensors to deliver an 8MP 180-degree scene. This is a compact, robust and capable camera with an angle of view that covers our entire street scene from one end to the other.

E’LL be looking at hemispherics and wide angle multi-head cameras at SecTech Camera Shootout in May so it was with no small interest that I unpacked Vivotek’s MS9390-HV panoramic network camera and set it up over the street outside the office. In terms of feature set, there’s plenty going on here. Readers should note that Vivotek combines the specifications of the camera system. The separate camera heads are not treated individually in the specification, nor managed individually in the browser, but we are talking about 2 camera systems with 2 lenses – the stitching takes

W

48 se&n

place behind them. Reading the overall specification, it’s clear the MS9390 has a wholesome design – the pre-stitched camera systems are not being asked to achieve the impossible. Image sensors are 1/2.7-inch progressive scan CMOS with a combined maximum resolution of 4512 x 1728 pixels – that gives just under 8MP across both camera sensors. The focal length of each lens is 2.8mm, which is a nice length for a wide-angle CCTV camera – have a fast aperture of F1.2, a horizontal field of view of 180 degrees and a vertical field of view of 50 degrees. That vertical field of view is higher than usual and translates to more useful performance in the real world – more of the monitor is displaying the image making less of a letterbox presentation. The camera delivers 30ips, has a minimum scene illumination of 0.05 Lux @ F1.2 in colour and 0.01 Lux @ F1.2 in monochrome – obviously, it’s 0 lux with IR activated. The camera has 120dB of WDR from Vivotek’s WDR Pro technology and there’s day/night functionality, tilt range of 20 degrees, 12x digital zoom with a 4x plug-in, and 20 metres of Smart IR range. That modest IR range is interesting in that it speaks of designer installation expectations. It’s also a testament to Vivotek’s honesty in terms of useful camera performance. Compression options are H.265, H.264 and MJPEG


BY J O H N A D A M S

and the camera will deliver 4 streams simultaneously. There’s adjustable resolution, quality and bitrate, and configurable video cropping for bandwidth saving, as well as Smart Stream III. Image settings allow time stamp, text overlay, flip and mirror, scheduled profile settings and there’s adjustable brightness, contrast, saturation, sharpness, white balance, exposure control, gain, backlight compensation and privacy masks. Network capability includes support for 10 clients, there’s support for every protocol you could want, there’s Trend Micro IoT security support for the period of warranty, and the camera is ONVIF compliant. There’s video motion detection with 5 windows, alarm triggers are motion detection, manual trigger, periodical trigger, system boot, recording notification, camera tampering detection, audio detection and MicroSD card life expectancy. There’s event notification and file uploads using HTTP, SMTP, FTP, NAS server and MicroSD card. On the physical side, the camera is IP66 and IK10rated, it’s compact at 165 x 119 x 100mm with sunshield, eats PoE Class 4 with a maximum consumption of 15.2W. The camera is relatively heavily built for its size, weighing in at a touch over 1.2kg – you expect that with an IK10 camera. On the audio side there’s a 1-way microphone and compression options are G.711 and G.726. Audio range is said to be 5 metres but typical for Vivotek, that’s understating the possibilities. I’m listening to conversations at 10 metres and I can hear traffic further out. It’s hearing the traffic that I prefer – it alerts me to look up during the night test. Operating temperature is reasonable at -20 to 50C and there’s a solid warranty of 36 months. Something to note is that when I’m fiddling with the camera at the beginning of the test I walk close to a keypad on a wall to see how close the focus goes – the camera then seems to white out on the monitor and only later when looking at the specs I notice that the electronic image stitching is designed to work between 3 and 20 metres. According to Vivotek, seamless stitching is improbable below 3 metres – I find I can get closer than 3 metres – but not closer than 1 metre. In the hand, this seems a compact and robust camera that is well made and the design is an interesting one, without being too obtrusive, given the enormous coverage it delivers. While I’m out front of the office taking photos of the MS9390, a couple of pedestrians express their admiration for its looks.

TEST DRIVING THE MS9390-HV When I sit down in front of the monitor during commissioning, I’ve got the camera sitting in the office looking from back to front and I’m pleasantly surprised by the performance. It’s way too much camera for my internal application, which is only 4 metres wide. But coverage is absolute. There would be many internal applications – shopping centres, hospitals, universities and airports – where a combination of monster angle of view and solid resolution would really come to the fore.

Wide view in poor daylight.

And here’s the zoom.

Wide day view.

A closer zoom.

Once I’ve got the camera set up out front overlooking the street, I can see there’s distinct barrel distortion in the wide image – the street falls away to left and right. It’s a gloomy afternoon – around 1500 lux in bright moments at street level. Colour rendition in these conditions is even, sharpness is strong, and I’m pleased with contrast and tone. I can see some chromatic aberrations on the sunny side of the scene – they seem to be latitudinal and longitudinal, but I don’t find them until I use digital zoom. The image grows brighter as the light fades and stays tight without much noise or overt pulsing. The afternoon goes into evening and the MS9390 stays in colour until full dark without switching over to night mode, even though the camera is set to auto. At

se&n 49


● Product review

Vivotek

Wide in colour.

moving traffic that suggests shutter speed is slow-ish. I spend time drilling into the scene using digital zoom – it’s faster hopping with clicks than trying to pull the image around. As you’d expect with such a big angle of view there’s a limit to how far digital zoom gets you – at 4MP it’s a lot further than at 1080p. I find I can set the camera up to snare faces and plates out towards 16 metres and when you consider that this applies to the left and right of the scene, as well as across the street, this is very good performance indeed.

CONCLUSION

Wide in monochrome

this point, the image shows noise and there’s no face recognition, though situational awareness is strong. As is often the case, there’s more detail in the live stream than I get from snapshots. I can see the different performance of the sensors – the stitching line is visible but it’s not intrusive – it seems to be a subtle variation in colour temperature between the 2 sensors. This camera when set to default is prone to mild blooming. Motion blur is quite well controlled and low light performance in the static parts of the scene is solid, too. Overall, the performance of this camera tends to the upper end of what’s possible out here. In my application, the IR is reflected from branches in front of the office – no doubt this is causing the smart IR to moderate power. The image has virtually no noise. I can still see the delineation between the 2 camera sensors – the one on the right is brighter. Later when I turn IR off, I think the left side is brighter – just a touch. As usual in my tests in this street scene at between 4 and 10 lux, I prefer monochrome performance over IR. With the IR reflections removed I have a balanced image thanks to the ambient light on the street. There’s less blur but I still have the blooming – the slow shutter speed and the sensor design are playing a part in this. Contrast is good and there’s a lot of tonal detail in this night time scene. Amplification noise is non-existent to my eye. In the morning with the sun to the left of the scene at more than 70,000 lux and delivering strong side and backlight, I notice veiling flare in the part of the image exposed to direct sunlight. Colour rendition is very strong – reds and blues are nicely done. It’s early enough in the morning that there’s considerable variation in light levels between light and dark sides of the street and the MS9390 is doing well managing that dichotomy. I don’t have over exposure and I don’t have deep shade – there’s a little blurring of fast-

50 se&n

I was impressed with this camera’s performance – its ability to limit motion blur, the quality of colour rendition in very grey conditions and the strong resolution – 4MP per side. All this contributed to my positive response. But the grand master of this camera is the gigantic angle of view combined with resolution high enough that you can mouse wheel in and out. This combination makes for very pleasing performance. My initial feelings during setup were that SEN’s application would be too limiting. However, I found the MS9390-HV close to perfect for the job – it handled the entire view from one end of the street to the other, leaving nothing out. This camera is a solid performer – it’s robust and flexible and offers much better close work than you’d expect from a camera with such a wide view. Vivotek is an old hand at IP CCTV and the company’s cameras do the basics well - this MS9390HV is no exception. Camera performance and interface are highly polished. For applications requiring 180-degree coverage from a single camera point, the Vivotek MS9390-HV panoramic is a solution that’s hard to go past. n

FEATURES OF THE VIVOTEK MS9390-HV CAMERA INCLUDE: ● 8MP resolution ● H.265 compression ● 180-degree angle of view ● 30fps @ 4512 x 1728 pixels ● Smart Stream III, WDR Pro, SNV ● 20 metre IR Range ● Rated to IP66 and IK10 ● Trend Micro IoT security.


CREATING THE FUTURE OF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.

• No “Per Seat” Licensing In System Pricing

DSX Access Systems, Inc.

• LAN/WAN Compatible

• Alarm Text Message/ E-Mail Notification

• Smart Card and Biometric Integration

• Hot Swap Redundant Communication Server

• Unlimited Access Levels Per Cardholder

• High Level Elevator Control Interface

• Integrated Photo ID Badging • Backup SQL Server

• Backwards Compatible Architecture

www.dsxinc.com

• Integrated Wireless Locksets

DSX CORPORATE HEADQUARTERS | 10731 Rockwall Road | Dallas, TX USA 75238 | 214.553.6140 | sales@dsxinc.com SEADAN SECURITY & ELECTRONICS | Unit 7, 170 Forster Road | Mt Waverley, VIC, 3149 | (03) 9263-0111 | seadanvic@seadan.com.au | www.seadan.com.au

Quality. Reliability. Integrity. The Security Professionals’ First Choice.


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Challenges of Alarm Systems Alarm systems and their supporting monitoring paths are not perfect. Understanding the weaknesses of these technologies is vital when designing and implementing security solutions in a rapidly changing marketplace. VERY security solution should be designed to deliver specific outcomes – in some ways the simpler these outcomes, the more likely it is the solution will meet performance expectations. For instance, some installers make enormous effort when it comes to stringing dozens of PIRs throughout a site yet dedicate very little time to ensuring the fastest possible response to an alarm event. Or a system might be thoroughly provisioned for management by remote mobile device, but the sensor choice makes it highly prone to false alarm events. False alarms are the key issue with many alarm systems - false alarms can quickly erode user trust to the point the system is ignored or no longer used at all. False alarms are typically the result of poor initial sensor choice for a given environment or poor system design, which sees sensors installed in locations for which they were not intended. The flaws in choice may not only be sensor quality but sensor type. A curious response to false alarms has been to remove external and internal sirens in many system designs. Another cause of false alarms is user behaviour. Unless users receive

E

52 se&n

instruction on procedures surrounding the system, thoughtlessness is certain to generate floods of false alarms at peak times that create serious issues for monitoring stations trying to sort out intrusion from confusion. A different type of user behaviour – set and forget – can also lead to false alarms through lack of system maintenance, particularly in evolving environments. This impacts on a system from end to end. Feeding into overall issues can be cost sensitivity and this is likely to impact on installers as much as on users. On the installer side, systems are chosen for low cost to preserve margins. There’s nothing surprising about this. The trouble is that

low cost systems incorporate short cuts in quality, functionality, support and future R&D. At the same time, end users are juggling a limited budget and a decision to expand the access control solution or CCTV system is likely to impact on the alarm system. Importantly, while some users are governed entirely by price, a majority can be sold a performance advantage if one can be shown to exist. Something else worth pointing out is that many fine alarm systems and peripherals are expensive and for many users it may be hard to see where the value lies. An SME covering relatively compact internal and external spaces with a useful range of sensors can spend $A3000-


Proudly brought to you by

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

MORE THAN EVER, MODERN ALARM INSTALLATIONS RAISE QUESTIONS OVER WHETHER WIRELESS OR HARDWIRED SOLUTIONS ARE BETTER.

4000 for a top end wireless alarm system installed. That’s a lot of money, given falls in price across the wider electronics market and this sort of pricing opens the minds of users to low end equipment and even DIY. Cost is more of an issue if the installer fails to express the positive outcomes the security system will deliver. A quality security and automation system is capable of reporting an alarm event, verifying an alarm event using integrated CCTV, communicating an alarm event to professional monitoring services over redundant paths, notifying management of alarm and administrative events, allowing remote management, creating

reports, monitoring and reporting on associated power usage, giving lone workers the means to call for immediate assistance, protecting against outbreaks of fire, detecting flooding events, detecting loss of power to vital equipment and much more. But if the user does not understand all this, the system may have no greater perceived value than Bunnings DIY. Alarm system narrative is vitally important and must be supported by functionality. More than ever, modern alarm installations raise questions over whether wireless or hardwired solutions are better. Wireless costs more to buy and to maintain in the long term because the

need to replace batteries makes it higher touch. The bigger the system, the more devices, the more impact on the overall equation this underlying fundamental will have. Wireless may also be vulnerable to interference from evolving environmental RFI sources. At the same time, pulling wire into complex sites can be time consuming, which can be expensive. Wire needs to be routed cleanly – not every application is suited to surface mount conduit. Making hardwired systems work in such environments is likely to demand more exacting overall system designs – higher quality sensors that offer longer range might be used. The system might be pushed to the outside of the building to create a layer of detection that is easier to cover while guaranteeing any approach on foot will be detected. Before we move away from hardwired and wireless, it’s worth touching on issues of proprietary devices. Will the system hardware be proprietary, or will it include multiple Z-Wave or Zig-Bee devices, often OEMed from manufacturers unknown? This is particularly tricky area. Shaking out a system’s full functionality may demand use of devices the security of whose design cannot be ascertained. The answer is likely to tend towards proprietary, or a select range of devices from quality providers. Decisions will also need to be made about proprietary and non-proprietary communication protocols and this applies to signalling within the system, signalling between the controller and local network devices, and signalling between the controller or local network devices and the monitoring station. Installers and end users want systems that are protected from external intrusion and that word ‘systems’ must include any network devices included in the sensor-receiver pathway. Something else that should come into play is the cyber security capability of any user management app, as well as protocols that govern the personal smart devices attached to it. Given that many security and home automation systems include a web interface, these considerations impact on any computer used to access the security system – installer as well as end user. n

se&n 53


● Regulars

Products

Editor’s choice GALLAGHER COMMAND CENTRE DELIVERS NOTIFICATIONS ● BROADCAST Notifications received via the Gallagher Mobile

Connect App provide a trusted source of legitimate information among increasing amounts of text message (SMS) and email spam. As a secure communication channel, the app also protects against the threat of hoax or malicious text messages designed to disrupt operations or, in a worst-case scenario, harm people. Dynamic recipient lists can be configured in Command Centre using existing cardholder data to create a broadcast notification group based on specified criteria at the time of sending. Different notifications can be sent to those that meet the criteria, for example people who have had access to a hazardous area in the last 24 hours. Dynamic cardholder recipient criteria can also be set according to access group membership, cardholder competencies, cards about to expire, or cardholders only in specific zones. Distributor: Gallagher Contact: +61 2 9412 4477

What’s new in the industry.

CSM DISTRIBUTES HONEYWELL’S NETAXS-123 ● CSM introduces Honeywell’s NetAXS-123 enabling you to securely manage your system anywhere there’s an Internet connection. The user-friendly design makes it simple to install and easy to operate. The system easily adapts to existing IT infrastructure and methods so as your needs grow, NetAXS grows with you. Simple and enhanced access control with NetAXS allows you to easily add doors with 1 or 2 door add-on boards with the flexibility of managing the system in 3 different host modes. You can manage NetAXS-123 using the embedded browser, MAXPRO Cloud’s secure cloud infrastructure, or WIN-PAK’s integrated security suite. Features include embedded, cloud and software hosted capability from one panel that integrates with WIN-PAK and MAXPRO Cloud. Add additional doors, video, intrusion, and mobile application support as your business needs expand without replacing panels. There’s also encrypted communication between panel and host and no dedicated PC costs with embedded web clients. Distributor: Consolidated Security Merchants Contact: 1300663904

BOSCH FLEXIDOME IP STARLIGHT 8000I CAMERA ● BOSCH’S new FLEXIDOME IP starlight 8000i camera will soon be released in 1080p, 6MP or 4K versions with 60ips rates for fast moving scenes, H.265 compression and a design optimised for simplicity of installation and operation. Using Bosch’s Project Assistant app, the pan, tilt, roll and zoom (PTRZ) function can set the required field of view without an installer having to touch the camera or lens. This remote commissioning and configuration can be adapted at any stage beyond the initial set-up, making it quick and convenient to adjust the field of view should initial planning requirements change. The FLEXIDOME IP starlight 8000i range features IP66 rating for water and dust resistance, IK10+ for vandal resistance, has anticorrosion coating and solid operating temperature range of -50 to +60C. The cameras have Bosch’s Intelligent Video Analytics and Bosch Intelligent Dynamic Noise Reduction and intelligent streaming combined with H.265 video compression. Distributor: Bosch Security Systems P: 1300 026 724 (13000 BOSCH)

54 se&n

PELCO 4K PAN, TILT, ZOOM ● PELCO by Schneider Electric has announced the immediate availability of the new Spectra Professional 4K cameras to their portfolio of high resolution (4K) fixed and PTZ cameras. The Spectra Professional 4K camera technology enhances the ability to recognize and identify objects at greater distances. It also provides infra-red illumination up to 150 meters, streams video in H.265, H.264 or MJPEG formats, and can see 15 degrees above the horizon. With up to 4K resolution at 30ips, the Spectra Professional 4K can cover a large area with clarity of detail to record information such as license plates numbers or faces of people. Integrated IR provides IR capabilities like Esprit Enhanced IR models. H.265 video encoding and Pelco Smart Compression reduce the storage required while preserving image quality. With excellent PTZ responsiveness and features such as patterns and frame scan, Spectra Professional 4K enables close manual tracking of people or vehicles as well as ability to cover spaces in an automated fashion. Distributor: BGW Technologies Contact: +61 2 9674 4255


INNER RANGE INTEGRITI 18.2 FEATURES LIVE MUSTER VIEW l INNER Range’s Integriti 18.2 offers powerful features designed

to deliver security managers and security teams greater situational awareness – a particularly useful feature being Live Muster View. Live Muster View allows operators to create a view of specific areas displaying current users in real time within muster areas, as well as indicating which users are absent. This capability allows instant assessment of staff in danger during an emergency, as well as highlighting those staff who are safe – it’s a solid addition to the operational functionalities of the Integriti Gatekeeper management system. A central aspect of this functionality is the amount of time saved because operators are not hunting missing staff in an emergency but can focus on following procedures to ensure the security operation does not fall prey to chaos.

AETEK EPOT l A NEW series of Aetek EPoT long range extenders can overcome the general 100 metre distance limitation when running UTP/STP cable. The EPoT extenders can expand the transmission distance up to 1200m with a data rate of 100Mbps and a 9.7W PoE budget at the transmitter end. Both indoor and outdoor options are available. The outdoor version is protected by a IP67 weatherproof and an IK10 vandal resistant casing, as well as a built in PoE surge protection of 6KV. This PoE budget varies depending on power input and distance. The EPoT must be sold in pairs, so the RX must be installed at the local site and the TX unit has to be installed at one end of the PoE IP device. For more information, please contact your local CSD branch. Distributor: Central Security Distribution Contact: 1300 319 499

Distributor: Inner Range – Central Security Distribution Contact: Inner Range +61 3 9780 4300 CSD 1300 319 499

MOBOTIX AND KONICA MINOLTA CAMERA PLATFORM

VANDERBILT RELEASES POE ULTRA IP DOOR CONTROLLER

l MOBOTIX and Konica Minolta are jointly developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies. The new MOBOTIX camera platform is based on the distributed intelligence in the Mobotix camera system, which is crucial for artificial intelligence, as well as communication between devices in smart networks. Potential solutions include the reliable detection of threats through the combination of different sensor technologies, as well as the independent initiation of counter measures. State-of-the-art analysis methods located in the camera help users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods, such as the recognition of human behaviour, moods or voices. A plug-in concept is being further developed that goes beyond what is available on competing products. The first cameras based on the new platform will be launched in the first quarter of 2019/20.

l The ACTpro 1500 PoE Ultra controller supports power requirements for local door accessories and components such as card readers, door locks and request to exit buttons. The ACTpro 1500 is a single door IP Controller and includes a dual-port Ethernet switch. It supports 60,000 users and includes a rich set of advanced features, including voltage monitoring and break glass monitoring. These controllers are ideal for a single door system or systems that need to grow up to 4000 doors. PoE Ultra hardware in the controllers ensures support for all power requirements, including local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs), saving the system user time and money, according to the company. Powered over Ethernet, it can also result it in less cabling and more convenience for installers as well. Distributor: Alarmcorp Contact 1300 894 088

Distributor: Mobotix Contact: +61 2 8507 2000

se&n 55


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: Would you recommend using any of the new wireless security and automation solutions in commercial or industrial applications? Typically, such sites go hard wired but there are additional functionalities with some of these systems that are very appealing. What’s your take on it? A: For commercial or industrial applications you’ll need to make sure you have enough range to cover the distance from sensor to controller. You’ll also need to make sure there’s no interference that could cause false alarms. Building construction may be a problem. In some applications heat will be an issue – most volumetric sensors in these kits are single or dual pyro PIRs which work well enough in the environments for which they were intended – indoors with few windows. Reed and vibration sensors may resolve issues in some applications. Cameras in security and automation solutions are ordinary when compared to the lower end of professional product lines, so you’ll need to watch things like WDR and low light performance, as well as distortions, blooming, ghosting and shallow depth of field. Probably the trickiest thing with video will be getting it to stream at a bandwidth high enough to be useable in larger applications though for compact spaces it won’t be a problem, especially if people in the scene

56 se&n

Our panel of experts answers your questions.

are stationary some of the time. The app interface will need to be thoughtfully considered – it needs to be intuitive and the software developers need to be staying on top of cyber security issues. Low cost home automation solutions will have questionable levels of cyber security. Sensor battery life is going to be another issue – it varies widely from amazing to little more than 12 months. You need more time from batteries, especially if there are many sensors installed in out of the way spots. In many cases, these solutions will depend on elements of the site’s network – especially routers – to communicate. In order to meet standards, you should use a solution with an integrated router and battery backup, or use a dedicated router and ensure issues are reported in real time. Q: We have had drone intrusions across our site. Is it legal to disable a drone? Can security or police take control of a drone, land it and confiscate it? A: It’s illegal to interfere with an operating drone and it’s illegal to own drone countermeasures except in special circumstances – this rule applies in

countries like the U.S. and UK, too. Further, no one can sue for breach of privacy unless the drone operator works for an organisation with an annual revenue of $A3 million. There’s considerable pressure from police and from security experts in government and the private sector around drone countermeasures. Security and police are worried about drones used to for spying, or to aid criminals or terrorists. Last year, WA Police requested new legislation to give police the power to seize control of drones in the air or stop them taking flight. In its submission, WA Police acting deputy commissioner specialist services, Paul Zanetti, said existing laws prevented law enforcement from interfering with a drone in flight, despite technologies being available to safely disable the devices. He called for legislative reform, as the importation of signal and drone jammers into Australia was banned unless exempt. There are rules of operation around drones – no flying at night, a 120 metre ceiling, no flying within 30 metres of people, maintenance of line of sight at all times, no flights in an area affecting public safety or where emergency operations are underway without prior approval, no flying


over people – that means beaches, parks, events, sports grounds, public spaces. There’s also no dangerous flying in relation to aircraft, people or property, and personal privacy must be respected – so no recording or photography without consent. Whether or not such rules could be leveraged to restrict overflights of your site will a matter of close consideration. Q: Would you advocate for the continued use of keypads in access control or has their time passed? A: Keypads still have something to offer – especially in domestic and small commercial applications. Keypads are cheap, simple to install, need little maintenance and are available in a range of designs, from a lightweight, inexpensive unit designed to handle internal access duties, to a stainless, backlit keypad that’s weather and vandal resistant – perfect for gate and carpark access. The best external keypads won’t cost much more than $100 and will last forever. You’ll never need to get cards printed - there are no ongoing costs at all. There are some downsides to keypads. If the same PIN is in use by all staff for 5 years, the keys on the pad will wear unevenly in a way that makes it possible for a potential intruder to discover which keys are being used most commonly. The answer is to regularly change the code – once every few months is a realistic time span. This fact should be impressed on end users vigorously by installation and commissioning teams. Perhaps the central problem with keypads is the fact that PIN numbers are much easier to pass on than cards. One person could inform dozens of people of a PIN number, or a PIN can be lost or stolen without anyone knowing, whereas a card can only be used by one individual at a time. This makes it more important to ensure that PIN numbers are changed regularly.

PERHAPS THE CENTRAL PROBLEM WITH KEYPADS IS THE FACT THAT PIN NUMBERS ARE MUCH EASIER TO PASS ON THAN CARDS.

Q: What’s the fatest way to test an NO/ NC sensor circuit? A: A multimeter will do it but it’s also possible to build a tester to check the status of NO and NC sensor circuits that will be faster than an ohmmeter. Components are basic, including a piezoelectric buzzer, a transistor, 2 resistors, 2 switches, a red and a black clip-on, a 9V DC dry cell battery, a circuit board and basic project box. When the clip-ons of a tester like this are attached to each side of a sensor’s output circuit you can use the function switch to select either normally closed or

normally open. When the sensor triggers, the piezoelectric buzzer will activate advising the sensor’s status – open or closed. The second switch allows the connection and disconnection of the battery from the test circuit. Q: Is it advisable that low voltage security installers carrying a Hall Effect Meter at all times? A: Yes, you could make a strong case in favour of this. Clamp-on (Hall Effect) meters measure currents up to 1000 amps (a standard DMM only goes up to 10 amps). While they are not as flexible as a DMM, clamp-on units will also measure voltage and while they’ll do it with a little less accuracy than a direct circuit connection, they’re a lot safer to use. These devices are ideal if you’re testing a conductor with current flowing in one direction - you can place the tester perpendicular to a magnetic field and a voltage can be measured at right angles to the current path. The beauty of a clamp-on meter is that it allows you to establish AC power delivery in nearby AC cables so you can be alert to EMI radiation. It also allows you to check for live wires in your work space and make informed decisions about possible faults on system-connected AC circuits without needing an electrician to open an AC cable jacket or break AC connections. A clamp meter can also tell you if an AC power outlet is live. n

se&n 57


Security Managers ◆ Integrators ◆ IT Managers ◆ Installers APRIL 2019 ISSUE 408

events ISC West

INTEGRATING SUB SYSTEMS

l l l l l l l l l

What to See at SecTech Roadshow 2019 Physical Security Considerations Special Feature: Low Cost CCTV Cameras News Report: Tyco Security Products Strategies to Strengthen Cyber Security The Interview Brenna Guiney, ISP Product Review: Vivotek MS9390-HV Monitoring: Challenges of Alarm Systems Bosch FLEXIDOME IP Starlight 8000i

PP 100001158

Dates: April 9-11, 2019 Venue: Sands Expo, Las Vegas, NV, USA Contact: Outside the US call +1 203 840 5602 or email inquiry@isc.reedexpo.com ISC West is the largest security industry trade show in the U.S. allowing you to network with more than 30,000 security professionals, with technology encompassing everything from access control to unmanned vehicles from more than 1000 manufacturers and distributors.

+

SecTech Roadshow 2019 Dates: May 2019 Venues: 5 city Australian tour Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in its 5th year takes leading electronic security manufacturers, distributors and wholesalers on a national tour.

Security 2019 Exhibition & Conference

+

Date: July 24-26, 2019 Venue: International Convention Centre, Sydney Contact: +61 3 9261 4662 Security Exhibition & Conference offers Australia's largest showcase of cutting-edge security technologies from more than 150 exhibitors.

IFSEC London 2019 Date: June 18-20, 2019 Venue: ExCeL, London, UK Contact: ifseccustomerservice@ubm.com IFSEC International is Europe's leading integrated security event. IFSEC welcomes high-level security professionals from 113 countries who come to source specialist security equipment across IT, cyber, perimeter protection, access control and more. IFSEC 2018 attracted a record number of top-level decision makers and security industry elite, 34 per cent of whom held an annual purchasing budget of over £1 million.

SECURITY & GOVERNMENT EXPO

= DAILY, WEEKLY, MONTHLY.

Security and Government Expo 2019

Date: November 14, 2019 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 SAGE 2019 is the perfect opportunity for government and commercial end users, as well as integrators, installers and consultants, to see the latest security products and technologies in the nation's capital city in a relaxed and informal environment.



For stock availability, system design and high quality technical support, contact your local CSD branch.

VISIT WEBSITE


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.