Security Managers ◆ Integrators ◆ IT Managers ◆ Installers AUGUST 2021 ISSUE 434
SCATTERBRAIN
l H3C Plus Victoria Completes Melbourne Project l PMT Security Continues Growth Trajectory l Special Report: Security System Design l Review: Lilin Z2R8052EX25 25x Zoom Bullet l Case Transitions: King Street Wharf
PP 100001158
l Special Feature: Biometric Access Control l Special Feature: Perimeter Protection Systems l The Interview: Ryan Fairclough, Briefcam l Alarm Monitoring: The Great Fragmentation l HID Adds Biometrics To Signo Readers
SEN821_1cover.indd 1
29/7/21 1:13 pm
SEN821_2.indd 1
29/7/21 1:29 pm
editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS AU G U ST 2021 ISSUE 4 34
By John Adams
COVID-19 DELTA DEMANDS NEW ACCESS CONTROL APPROACH ECURITY managers are increasing pressure to S under alter the way they manage access control to take into account COVID-19 Delta’s elevated workplace infection rates. That means more than just managing social distancing in real time and contact tracing – it means keeping high risk staff members out of the office altogether using some form of vaccination green pass. There a couple of numbers that argue this case – the first being that COVID-19 Delta infections in the workplace are now running at 10 per cent in NSW. These figures are far higher than were registered for the Alpha variant in the first half of 2020. The second set of numbers speaks even louder – they tell us that in the United States only 150 of more than 18,000 COVID-19 deaths registered in May occurred in vaccinated patients – that’s just 0.83 per cent of total deaths. It’s a huge difference. There’s another number to keep an eye on, too. It’s Australia’s trudging vaccination rates. We are at around 14 per cent full vaccination at press time, compared to 49 per cent for America, 53 per cent for the United Kingdom and 59 per cent for Israel. And these countries have much higher first dose numbers – around 90 per cent in the UK – higher in Israel. Comparatively, a much larger percentage of Australia’s population is going to be vulnerable to the Delta variant’s higher death toll for a lot longer. Delta is more dangerous. Presently, there are more patients in ICU and more patients ventilated in key hospitals like Sydney’s RPA, that at any time during the pandemic. So significant is the impact in some hospitals that major surgery has been suspended because there are too few ICU beds to
For security teams, COVID strategies like proximity detection, people counting, tightly controlled visitor management, overarching reporting functions, and remote functionality must be enhanced. support patients experiencing negative outcomes from surgical procedures. According to reports, Delta infection is twice as likely to lead to hospitalisation as Alpha. From the point of view of security and risk management – and this applies to security integrators and installers, too – allowing unvaccinated workers into shared office spaces or encouraging them to be in contact with customers – risks breaching a duty of care that may have legal ramifications in the future. An issue no less impactful on business survival in an already challenging environment is a workplace closed down by government authorities because of an outbreak caused by mismanagement. Just one case is enough to get the doors barred and the entire building into 14 days isolation. Then there’s the impact on professional reputation of a security team or organisation that finds itself responsible for causing an outbreak that may lead to death – particularly among vulnerable members of the community. And none of this touches on the impact of ongoing lockdowns on the customers of security businesses. What’s the answer? For security teams, COVID strategies like proximity detection, people counting, tightly controlled visitor management, overarching reporting functions, and remote functionality must be enhanced. Other aspects of a COVID-safe environment that bear consideration revolve around low touch access control solutions, including touchless exit buttons, touchless biometrics, including face recognition solutions able to handle
access, time and attendance, and contact tracing. In many cases, the greatest functionalities may be delivered by integration of systems that allow analytics to deliver specific information without the need for searches. This sort of information may include a video record of who came into contact with a particular team member and for how long at every camera point across a site, as well as showing the locations a particular team member visited. But more is required. A France/ Italy style vaccination pass managed by existing access control systems that ensures only vaccinated staff members can access sites is the best way forward. While the French and Italian governments have made their COVID green pass mandatory for many activities in public space, adding vaccination as an access control rule is something we already see in Australia in medical and aged care facilities, so there is a clear precedent. The best access management solutions already have the capacity to grant or deny access on the basis of variables like up-to-date training or the completion of scheduled medical tests – tweaking this capacity to include COVID vaccination is a minor work that could easily be installed remotely in many access control applications. We’ve said this before but here it is again – while some people are highly resistant to COVID-19 vaccination, the vast majority are not. Security people, whose roles are built on duty of care, proactive protection and safety strategy, should lead the way – not only when it comes to vaccination but vaccination management, too. n
se&n 03
SEN821_3ed.indd 3
29/7/21 1:15 pm
6TH ANNUAL
JOINING US ON THE ROAD SO FAR
www.sectechroadshow.com.au SECTECH DPS_JUNE21.indd 4
23/6/21 1:35 pm
SECTECH 2022 IS GO!
Coming to your city in May 2022 PERTH
ADELAIDE
SYDNEY
MELBOURNE
BRISBANE
W E D 4 M AY
T U E 1 0 M AY
T H U R 1 2 M AY
T U E 1 7 M AY
T H U R 1 9 M AY
PERTH CONVENTION
ADELAIDE SHOWGROUND
H O R D E R N PAV I L I O N
MCEC
BRISBANE RICC
CENTRE
PRINCIPAL SPONSOR
LANYARD SPONSOR
MEDIA SPONSOR
For more enquiries contact Monique@bridgepublishing.com.au SECTECH DPS_JUNE21.indd 5
23/6/21 1:35 pm
8
18
28 and procedures with appropriate security technologies. Exactly how security system design unfolds will depend on the operational demands like requirement for access, value of protected items and the nature of incident response.
AUG 21 8: H3C PLUS VICTORIA COMPLETES MELBOURNE PROJECT Working in conjunction with ACAD Services, H3C Plus Victoria delivered an enterprise CCTV solution consisting of Milestone Systems management and storage servers paired with Hanwha Techwin cameras. 9: PMT SECURITY CONTINUES GROWTH TRAJECTORY Australian security integrator PMT Security reports it has signed significant new contracts in 20/21, and announced double-digit growth year-on-year for the past 3 years. The company provides electronic security installations and service for some of Australia’s biggest organisations across the retail, commercial, logistics and data centre sectors. In 2021, the company exceeded 4000 customer sites nationally. 18: SECURITY SYSTEM DESIGN Creating a capable security system demands meshing an end user’s operational requirements
SEN821_6cont.indd 6
22: LILIN Z2R8052EX25 25X ZOOM BULLET LiLin’s 25x zoom bullet camera features IK10 vandal resistance and IP67 weather and dust proofing, 1080p resolution, super low light performance, H.264 and H.265 compression, IVA and WDR. But whichever way you slice it, what defines this package is its monster focal length, from 5.3 to 130mm, supported by infrared range of up to 100m. In our street application, Lilin’s 25x long end blows the competition completely away. 28: KING STREET WHARF Security Integrator Micron Group has completed a complex electronic security integration for King Street Wharf in Sydney that incorporates Inner Range Integriti access control and automation, along with Milestone XProtect VMS supporting 211 Avigilon CCTV cameras. 44: BIOMETRIC ACCESS CONTROL Biometrics have long been considered the gold standard in authentication technologies and with COVID-19 pressing users towards touchless applications, biometrics has lost none of its appeal, with face recognition leading the way. 40: PERIMETER PROTECTION SYSTEMS Perimeter solutions push intrusion detection outside vulnerable facilities, increasing the length of time
29/7/21 1:13 pm
40
46
44
22
regulars
available for response to alarm events, as well as driving verification technologies, like PTZ presets. 36: THE INTERVIEW: RYAN FAIRCLOUGH, BRIEFCAM In the Interview this month, Briefcam’s Ryan Fairclough talks about the potential of video analytics to meet operational demands using existing CCTV systems, the importance of partnering, the possibilities of lateral CCTV applications and the company’s plans for APAC. 46: HID GLOBAL ADDS FINGERPRINT BIOMETRICS TO SIGNO READERS Multispectral imaging technology allows HID Signo 25B to capture fingerprint images from both the surface and the sub-surface of the skin, delivering consistent read performance regardless of environmental and skin conditions, including wetness, dust and dirt.
Security Managers ◆ Integrators ◆ IT Managers ◆ Installers AUGUST 2021 ISSUE 434
SCATTERBRAIN
l H3C Plus Victoria Completes Melbourne Project l PMT Security Continues Growth Trajectory l Special Report: Security System Design l Review: Lilin Z2R8052EX25 25x Zoom Bullet l Case Transitions: King Street Wharf
PP 100001158
l Special Feature: Biometric Access Control l Special Feature: Perimeter Protection Systems l The Interview: Ryan Fairclough, Briefcam l Alarm Monitoring: The Great Fragmentation l HID Adds Biometrics To Signo Readers
Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au
8: NEWS Latest business, product and technical news from Australia and around the world. 38: MONITORING Something weird has happened on the way to smart homes – a great fragmentation that makes the notion of modern smart homes impossible to squeeze into a box. So functionally isolated are many of the latest device-centric solutions it’s hard to even think of them as occupying the same ecosystem. 46: EDITOR’S CHOICE What’s new from our electronic security manufacturers. 48: HELPDESK Our team of electronic security experts answers your tough technical questions.
Editor John Adams Advertising Manager Monique Keatinge Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au
Design Tania Simanowsky e: tania@ taniasdesign.com.au
22 months A$195.00 (incl GST)
Subscriptions 11 issues per annum One year (11 issues)
Overseas 11 months A$220.00 22 months A$440.00
Australia 11 months A$110.00 (incl GST)
WEBSITE www.securityelectronics andnetworks.com
No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.
SEN821_6cont.indd 7
29/7/21 1:13 pm
NEWS IN BRIEF AUGUST 2021
SEKTOR DISTRIBUTING AVA AI CLOUD n CLOUD CCTV provider Ava Security has appointed Sektor distributor for Australia and New Zealand, with the intention of building a network of installer and integrator customers to offer the solution to their end user client bases. Ava Security’s flagship product, Ava Aware, is an AI video management system that analyses video feeds from all connected cameras in real-
time, identifying objects and events and sending instant notifications and alarms based on rules and unusual activity detection. The Ava managed service is lightweight, powerful and efficient, with recording options being 30, 60 and 120 days, with no clients or servers required. Recording and reporting is driven by audio and video analytics, and viewing is by cloud video stream on demand to app or
browser, with simple web link sharing and easy integration with other systems. “We see the market adopting cloud architecture at an increasing rate in the future,” Sektor Australia’s general manager Cameron Arnold said. “Ava represents the new breed of cloud-based video surveillance and has proven to be the global leader of these systems.
“We are excited to bring Ava to Australia and New Zealand and enable the security installer/integrator channel to deliver these innovative solutions to their customers.” Ava is headquartered in Uxbridge in the UK, and the company has teams
in the US, Norway, Sweden, Finland, Denmark, Germany, Belgium, and Poland.
RICHARD FORTALSKI JOINS CSM AS BDM FOR WA
H3C PLUS VICTORIA COMPLETES MELBOURNE PROJECT
n RICHARD Fortalski has joined Consolidated Security Merchants as business development manager in WA, where he will be providing pre and post-sales assistance with medium and large projects in support of CSM partners. Fortalski brings with him more than 30 years’ experience in the security industry. With a strong background in technical sales, support, and project management, he combines these skills to drive both stronger customer relationships and business growth. Fortalski comes to CSM after many years of deep experience in electronic security distribution businesses including with Honeywell Security Group (Ademco) where he was successful in providing partners and end customers solutions
n H3C Plus has completed an enterprise CCTV upgrade for a high-profile client in Melbourne. Working in conjunction with ACAD Services, H3C Plus Victoria delivered an enterprise CCTV solution consisting of Milestone Systems management and storage servers paired with Hanwha Techwin cameras. “Multiple camera technologies and configurations were used to achieve our client’s requirements,” H3C said. “The system is bound by a fibre optic backbone and structured Cat6 cabling system. “Our project team
MY COMMITMENT WILL BE ENABLING, EDUCATING AND DEVELOPING LOCAL SYSTEM INTEGRATORS AND GROWING THE CSM BUSINESS IN WESTERN AUSTRALIA.
Richard Fortalski, CSM.
to resolve complex security requirements while identifying new solutions to the channel to deliver value through new integrated technologies. “I am excited to join the CSM team in WA and to be part of a company that provides reliable, and quality electronic security products backed by outstanding customer service,” Fortalski said. “My commitment will be enabling, educating and developing local system integrators and growing the CSM business in Western Australia.” CSM’s Tim Sharman welcomed Richard
Fortalski to CSM WA. “We are very excited about this new addition to the WA team,” Sharman said. “Richard has a strong background in developing on-going relationships and supporting the product that he sells. His wealth of industry knowledge will be invaluable to the continuing success of the CSM WA business. “His background and experience will assist CSM Perth in further growing the security market in Western Australia, and we look forward to providing the best solutions and supporting both new and existing customers.”
also showcased their customisation capabilities with painted cameras to suit the environment and bespoke camera mounting poles. “Non-destructive excavation, service location, and structural engineering all formed part of the project management process that our team were involved in coordinating and overseeing.” H3C Plus has a 16-year history of providing complex electronic security integrations for major end users across Australia, with its client list including hospitals, courts and major sites.
08 se&n
SEN821_8news.indd 8
29/7/21 1:12 pm
PMT Security Continues Growth Trajectory p.10 Securcom Wins 200-Site City Of Gold Coast Security Tender p.12 Gallagher Grows Into New European Headquarters p.14 Security Industry Subcontracting Code Of Practice Activated p.16
COMPILED BY JOHN ADAMS
CSIRO AND OPTUS PARTNERING ON BUSHFIRE-PROOF COMMS n AUSTRALIA’S national science agency, CSIRO, and Optus have released findings of a joint nationwide project to improve bushfire resilience of critical telecommunications. Since mid-2020, CSIRO and Optus have collaborated on a study of the potential impacts of embers,
radiation and flame on and around Optus’ sites with telecommunications equipment. These learnings have been used to assess which sites were most at risk, and the priority site design changes. Information on topography, fuel load, vegetation type and local
bushfire weather severity was used to develop maps which then inform resiliency decisions for this critical infrastructure. Bushfire hazard and planning maps are early examples of the types of products being develop by CSIRO’s National Bushfire Intelligence Capabilities (NBIC) project, which is
seeking to develop relevant bushfire hazard mapping products for a wide range of infrastructure types ranging from residential housing to critical infrastructure. Optus is implementing the recommended mitigations at 2 of its sites in Victoria, Seville East and Dixons Creek, as reference examples for a larger, longer-term resiliency program and also to act as demonstration sites to help other infrastructure owners understand the learnings. In addition to using the findings to identify and invest in the most impactful upgrades, Optus has developed in-house training and site assessment tools to increase employees’ awareness of the threat to landscape and improve response preparedness. It has started training its
contractors to improve future design and builds, or to call out existing site concerns. CSIRO has a 70-year history of conducting bushfire research to help Australia respond to a changing and variable climate and build the resilience of our nation. “CSIRO has provided Optus with science and technology-based solutions that address a major threat facing all industries which rely on critical infrastructure: bushfires,” said Justin Leonard, CSIRO’s Research Leader for Bushfire Adaptation. “The research can inform resiliency decisions across a number of industries, including telecommunications, energy and emergency services.”
run alongside the expo and everyone is welcome to attend sessions of their choice. After SAGE, the annual ASIS dinner will be held and it’s the perfect opportunity for SAGE people to continue networking with
government security people in a relaxed and convivial atmosphere. Visit the SAGE website for more information or contact SAGE organiser, Monique Keatinge, on +61 2 9280 4425 or monique@sen.news.
SAGE 2021 ASIS ACT SEMINAR SPEAKERS ANNOUNCED n ASIS ACT’s Seminar speaker list for SAGE 2021, to be held at the Realm Hotel Canberra November 25 (health advice permitting) has been announced. Current speakers and tentative topics for ASIS ACT Seminars include: • Daniel Lewkovitz, CPP, CEO of Calamity on “How the Security Industry Became a Threat to National Security”. • Codee Ludbey, CPP, Principal Security Consultant of Tactix Group on “Assuring Cyber and Physical Security in Design: a Systems Engineering Approach”. • Yalda Assaf, General Manager, Aviation Security, MSS on “Comparing US and Australian Aviation Security”. • Julian Claxton, Managing
Director, Jayde Consulting, on “The Trusted Insider Threat”. • Dr Tony Murney, Deputy Security Controller, Australian Parliament (ret’d) on “Parliament House Security Upgrades: the Demise of Democracy?”.
security installers and integrators, and security consultants, the perfect opportunity to get a look at the latest security technologies in the nation’s capital with no travel expenses. SAGE ASIS ACT Seminars
• Nicholas Martin, Head, Property and Security Services, AGL Energy on “Converged Security Programs – People & Culture” (keynote speaker). According to ASIS ACT’s Mark Jarratt, keynote speaker Nicholas Martin will take a strategic security approach, addressing the convergence of physical and cybersecurity, and including fraud, privacy, risk, people and culture. Now in its 7th year, Security & Government Expo gives government security managers and facilities managers, ACT-based
se&n 09
SEN821_8news.indd 9
29/7/21 1:12 pm
NEWS AUGUST 2021
RYAN FAIRCLOUGH APPOINTED MD APAC, BRIEFCAM n RYAN Fairclough has been appointed MD APAC for video analytics solutions provider, Briefcam. Singaporebased Fairclough said he was excited to be off on a new journey. Using artificial intelligence and deep learning BriefCam transforms video into valuable insights for rapid video review and
search. The company’s solutions include its VIDEO SYNOPSIS technology, as well as real-time alerting and quantitative video insights. A video analytics pioneer, Briefcam has long partnerships with many high end video management system providers and powerful integration capabilities.
PMT SECURITY CONTINUES GROWTH TRAJECTORY Darren Taylor, PMT.
n AUSTRALIAN security integrator PMT Security reports it has signed significant new contracts in 20/21, and announced double-digit growth year-on-year for the past 3 years. The company provides electronic security installations and service for some of Australia’s biggest organisations across the retail, commercial, logistics
and data centre sectors. In 2021, the company exceeded 4000 customer sites nationally. “We have gained substantial success with the most sought-after accounts in Australia because of the value proposition we provide our customers,” said Paul Newby, head of business development. “We are now in a position
where we are big enough to provide comprehensive, cost-effective solutions for some of the best-known companies in Australia, but still small enough to provide personalised service.” According to Darren Taylor, managing director of PMT, growth is being driven from key areas in the business. “PMT Security’s success comes down to attracting and retaining the right people, working with great manufacturers and suppliers who support PMT, and the company’s ability to deliver value to customers in each market segment,” Taylor said. PMT was founded in 1979 with 2 staff and has grown into one of the largest privately owned electronic security companies in Australia.
UAL
WE CAN AND ITH
Seamless Security 24 hour, full colour surveillance
• • •
Ultra Sensitive Low Light Performance IR Range from 30M - 100M Variety of Chassis and Colours
• •
IVS 2.2 Compatible- Human/Vehicle Detection Deep Control System Integration
Our STARVIS camera series provide high quality surveillance in challenging light environments. LILIN Australia sales@lilin.com.au Sydney (02) 9646 4878 Unit 25/4A Bachell Avenue, Lidcombe, NSW 2141
www.lilin.com.au Melbourne (03) 9540 9756
ABN 64 107 084 008 3 Avondale Street, Springvale, VIC, 3171
10 se&n
SEN821_8news.indd 10
29/7/21 1:12 pm
Welcome Home. Your Rewards Program. Get back what you put in. For every $200 ex GST you spend with Hills, you’ll earn one point on Hills Homebase.
Earn eMastercards as you shop.
Selling made easy. Access exclusive commercial opportunities to help your business grow. Unlock better pricing. Check your annual spend, and see how close you are to the next pricing tier.
Points translate directly to dollars that you can redeem as eMastercards.
Let’s connect. Be the first to hear about our latest promotions and events.
As a Hills partner, come home to your all-in-one hub and watch your partnership with Hills grow into bonus rewards, discounted pricing, plus fantastic offers and events. Rewards are just the beginning.
Register today hillshomebase.com Terms and Conditions: The Hills Homebase Rewards Program is available to Hills Limited (“Hills AU”) account holders who register and are approved to participate. Registered customers that purchase goods and services from Hills Limited will earn 1 point for every $200 ex GST spent. The Hills Homebase Rewards Program will commence from 01 August, 2021. Full terms and conditions apply and are available on registration at www.hillshomebase.com. The collection and disclosure of personal information provided in connection with this promotion will be handled in accordance with Hills Privacy Policy https://www.hills.com.au/privacy. Hills Limited reserves the right to change these terms at any time without notice. Customers whose accounts are on stop credit may have their points invalidated.
SEN821_11.indd 210701 Homebase1A4 Flyer v5.indd 1
29/7/21 12:25 1:28 pm 23/7/21 pm
NEWS AUGUST 2021
ADT LAUNCHES NEW PARTNER PROGRAM WITH AN EXPANDED PRODUCT PORTFOLIO n ADT Security has launched a new partner program in Australia and New Zealand, giving entrepreneurially-minded security people and businesses an opportunity to distribute its range of security and automation products, and back to base 24/7 monitoring. With demand for smart personal safety and security devices increasing year on year, the ADT Security Partner Program offers an established business model with a guaranteed revenue stream. By
expanding into lucrative new growth markets in the health and wellness sectors that complement residential and small business security, ADT Security is offering partners an opportunity to tap into comprehensive solutions for a range of customers. The ADT Security Partner Program allows participants to benefit from ADT Security’s recognised brand, suiting both sole contractors looking to expand their services and larger businesses wanting
to scale and diversify. Partners are supported with comprehensive marketing programmes, tools and resources that nurture business growth. In addition to its suite of advanced technologies, ADT Security said it operates Graded A1 monitoring services across the region with “state-ofthe-art equipment, staffed by a dedicated team of trained professionals that are ready to respond to alarm alerts 24 hours a day”. The new ADT Security Partner Program is a
strategic move to help grow the ADT Security business in Australia and New Zealand. “By aligning with the ADT Security brand and its associated products and services, businesses will benefit from a full suite of safety and security solutions ranging from basic residential monitoring products to advanced building automation systems and new assistive health and wellness services,” said David Kirubi, vicepresident ADT, Asia Pacific. “Technology advancements and product development have allowed ADT Security to expand into new channels, such as the health and wellness sector, with a range of products designed to help more people feel safe and secure at home, outside the home, and while at their place of work including the home.” Program products include the ADT Home Assure personal alarm system, which gives people the ability to push a personal alarm button on a control panel, pendant, or wristband in an emergency. This alerts an ADT emergency response specialist at the ADT Security monitoring centres, who ensures users
receive the immediate help and care they need. Another new product is ADT FindU, an app-based safety system designed to help organisations monitor the whereabouts and wellbeing of employees and lone workers who operate in high-risk industries, such as truck drivers, field technicians, in-home health care workers and the many employees working from home. Kirubi said the program encourages a diverse partner eco-system, helping ADT Security broaden its brand presence in Australia and New Zealand while introducing its range of new products and solutions to a broader customer base. “We are also keen to work with technology partners, including system integrators, IT and security providers who are capable of integrating products into existing set ups and expanding the ADT Security product portfolio in fulfilling our mutual mission of enabling life safety and asset protection for the community at large.” For more information about the ADT Security Partner Program, visit www.adtsecurity.com.au/ home-security-systems/ adt-security-dealer
SECURCOM WINS 200-SITE CITY OF GOLD COAST SECURITY TENDER n SECURCOM has won a tender for design, supply, installation, maintenance and upgrade of electronic security assets, including closed circuit television systems and access control systems, at 200 sites for City of Gold Coast. Securcom’s Wade Anderson said the team was thrilled to have been selected as the successful tenderer to look after the City of Gold Coast’s electronic security infrastructure from August 1 2021. “It’s fantastic to be partnering with the City of
Gold Coast once again and to have the privilege of looking after its electronic security infrastructure going forward,” said Anderson. “As a proud Gold Coast resident, it was even more special to be involved in the process, and it was great working with Securcom team on our reselection process.” The scope of works includes access control, intruder alarm systems, CCTV, electric fences, motorised gates across 200 sites, 1500 access control doors, 1400 cameras from a management, preventative
maintenance and service work perspective. The contract also includes the supply, installation and maintenance of CCTV to the City’s Safety Camera Network, which maintains approximately 700 CCTV cameras and associated equipment at locations across the Gold Coast, primarily in the public domain. “Our Gold Coast team is very excited to continue on our journey with the City of Gold Coast, having been the incumbent over the last 5 years,” Anderson said.
12 se&n
SEN821_8news.indd 12
30/7/21 11:28 am
IDEMIA ANNOUNCES PARTNERSHIP WITH BOSCH
ANGELO SALVATORE JOINS OPENEYE
n IDEMIA has announced a global partnership with Bosch Building Technologies to tap the fastgrowing biometric access control market. To add a biometric layer to BIS, Bosch will offer IDEMIA’s flagship contactless biometric terminals including: • MorphoWaveTM, the only terminal in the world capable of scanning and verifying 4 fingerprints in less than 1 second through a quick, simple and fully touchless wave movement of the hand • VisionPass – said to be
“Bosch stands for quality and reliability,” said Gregor Schlechtriem, senior vice president, of Bosch Building Technologies Access & Intrusion. “We want to offer innovative and fascinating solutions, as our slogan ‘invented for life’ states. “When our customers are going to deploy biometric terminals for their security, they will be installed for years so we want to offer them the best option – Idemia is the right partner because of their technology expertise and field-proven quality and performances.
n ANGELO Salvatore has joined cloud video provider, OpenEye, as VP, international business development, based in Australia. Since its inception over 20 years ago, OpenEye has provided cloud-managed solutions for video security, business intelligence, and loss prevention focused within North America. After significant growth, OpenEye is now establishing an international presence. Based in Australia, Salvatore will be responsible for establishing relationships with channel partners within the region that will include Australia, New Zealand, South Africa and India. Salvatore holds a bachelor’s degree in Economics and Marketing from the Swinburne University in Australia and his career has spanned over 2 decades in the video surveillance industry, working alongside leading IP surveillance technologies that evolved from infancy to highly respected brands. He established Milestone Systems in Australia and New Zealand, where his career as country manager and regional channel director for APAC spanned
solutions to the channel to deliver value through new integrated technologies. He will also be providing training and sales assistance with medium and large projects to support our partners. “I am excited to join the Hanwha Techwin team in the region and to be part of a company that provides reliable and quality IP video solutions backed by outstanding customer service,” Maniatis said. “My commitment will be enabling, educating and supporting local end-users, integrators and partners
and growing the business in Australia and New Zealand.” James Hong, head of Asian Sales welcomed Maniatas to Hanwha Techwin Australia and New Zealand. “We are very excited about this new addition to the ANZ team,” Hong said. “Tas has a strong background in consulting and proposing various solutions and recommendations to partners according to their project and service requirements. “His background and experience will assist Hanwha Techwin in further
the most advanced facial recognition terminal combining 2D, 3D and infrared cameras with IDEMIA’s leading facial algorithms. These terminals combine high biometric accuracy, speed and convenience with a touchless user experience. They operate efficiently with sanitary masks and are well adapted for COVIDprevention policies. IDEMIA terminals are already integrated with the BIS platform and with most gates and turnstile vendors.
Angelo Salvatore
almost a decade. “I’m excited to join OpenEye,” Salvatore said. “Over the last 2 decades I have witnessed firsthand how complex and technically demanding some traditional video management systems have become. With OpenEye Web Services (OWS), that complexity is considerably reduced. “OWS provides ‘one pane of glass’ to manage all of your customers/ sites without the need for ongoing technical complexity, support and maintenance costs. I believe the OpenEye team has created the next video surveillance paradigm with OWS, and I’m thrilled to be able to showcase the benefits to our partners in the region.” You can contact Salvatore on (61) 431 3000 55 from outside Australia or on 0431 300 055 if you’re local.
TAS MANIATIS JOINS HANWHA TECHWIN n TAS Maniatis has been appointed technical sales manager for Hanwha Techwin Australia and New Zealand, based in Melbourne. Maniatis brings with him more than 20 years’ experience in the security
MY COMMITMENT WILL BE ENABLING, EDUCATING AND SUPPORTING LOCAL END-USERS, INTEGRATORS AND PARTNERS AND GROWING THE BUSINESS.
industry across the ANZ region. With a background in presales engineering, technical support and project management, he combines these skills to drive both building stronger customer relationships and business growth. Tas Maniatis comes to Hanwha after more than a decade of experience at Milestone Systems, where he was successful in providing partners and end customers solutions to resolve complex software requirements while identifying new
Tas Maniatis, Hanwha Techwin.
growing the security market in Australia and New Zealand and we look forward to providing the best solutions and supporting both new and existing customers.”
se&n 13
SEN821_8news.indd 13
29/7/21 1:12 pm
NEWS AUGUST 2021
GALLAGHER GROWS INTO NEW EUROPEAN HEADQUARTERS n GALLAGHER has officially moved into its new European Headquarters in Warwick, United Kingdom. The completion of the new headquarters signifies Gallagher’s increasing customer base across Europe and continued growth in the Northern Hemisphere. “We’re so excited to officially be in our new building, and we can’t wait to welcome our partners and customers,” said Richard Huison, regional general manager for UK and Europe. “We’ve grown at an impressive rate in recent years and fast outgrew our current premises. Our new building enables us to be better positioned from an operational perspective and provide a superior customer experience.” Gallagher now operates offices and warehouses in 10 countries, with more than 1300 Gallagher
employees based throughout the world. Mark Junge, global general manager for Security, explains an important part of Gallagher’s strategic growth includes scaling global distribution network and in-market presence. “It was necessary to increase our office, conference, and warehouse facilities so that our team can continue to grow, and our customers can see, first-hand, how Gallagher protects what matters most,” Junge said. “This new building provides even greater scope to showcase our world-class technology, host events, and support our channel, consultant, and customer network across the UK and Europe. “With discussions well underway with several UK government agencies, and some significant recent successes with high security customers
in the UK, this new facility provides the ideal base to support our continued investment in the development of solutions that support the UK and Europe.” The 1500sqm HQ allows Gallagher to host prospective clients, hold large events, and better support channel partners and joint customers with meeting, conference, and
training facilities. The headquarters also includes a 670sqm warehouse, to streamline UK and Europe operations, and deliver greater efficiency to support a heightened demand for Gallagher’s solutions, with land available for future expansions. Huison explained the European team was looking forward to inviting partners for a visit, and showing
them around the new building, once settled in. “Ongoing COVID-19 restrictions means we haven’t confirmed a date to officially open our headquarters in true Gallagher fashion – when we can celebrate appropriately, our company president, Sir William Gallagher, is excited to make the trip from New Zealand,” Huison said.
THIS IS NOT A CAMERA
Contact +61-2-8507-2000 info-au@mobotix.com 14 se&n
SEN821_8news.indd 14
29/7/21 1:12 pm
From the premium Hikvision distributors in Australia and New Zealand
SEN821_15.indd 1
29/7/21 1:28 pm
NEWS AUGUST 2021
SECURITY INDUSTRY SUBCONTRACTING CODE OF PRACTICE ACTIVATED n A NEW code of practice to improve the way companies successfully engage subcontractors in the Australian security industry comes into effect on July 1, 2021. According to ASIAL’s industry affairs officer, Steve Cropper, the code of practice applies to all ASIAL members and is designed to improve how companies can better secure customers, avoid unwanted breaches of the law and safeguard the rights and entitlements of workers. “Subcontracting is an acceptable and effective way of doing business but sometimes it can lead to problems when it isn’t done as well as it should,” Cropper said. “The code of practice applies to all ASIAL members who subcontract security services or are subcontracted by other security businesses to supply services to their clients. Remember though, the code is not the same as the law and if there is a conflict between anything set out in the code and any relevant laws, the law always comes first. “There is a full list of all applicable laws in all states and territories. But the code makes things very clear by explaining the important differences between prime contractors
Jennifer Hill-Ling.
and subcontractors, their rights and responsibilities.” Cropper explained that the code sets out the difference between contractors and employees. “This distinction is vitally important in protecting the rights and entitlements of workers and helping employers avoid unintended breaches of the law – the
Code also addresses the risky practice of multilevel subcontracting,” he said.
SUBCONTRACTING IS AN ACCEPTABLE AND EFFECTIVE WAY OF DOING BUSINESS BUT SOMETIMES IT CAN LEAD TO PROBLEMS WHEN IT ISN’T DONE AS WELL AS IT SHOULD.
HILLS TAKES AIM AT CUSTOMER LOYALTY n HILLS and Aritech Australia have launched a new promotion rewarding customers with ‘Tecom Tecoins’ for purchases on eligible Tecom products. Customers can use Tecoins to select from a variety of tech happy rewards ranging from Apple Airpods, and the Dyson Hair Wrap to a Swellpro Splashdrone Waterproof 4K Camera. “We are really proud to launch the promotion, it’s a different type of offer, one that our customers will not have experienced from Hills before,” said Hills’ Jeff Corr. The promotion is the second high-value
HILLS ANNOUNCES NEW CHAIR, CONTINUES BOARD RENEWAL
promotion from Hills this year – the IDIS Savic Motorcycle giveaway was launched earlier this year. According to James Layton, head of distribution at Hills, the team is focused on creating opportunities for better customers to engagement. “Both the Tecom Tecoin and IDIS Savic Motorcycle promotions are targeted at customers buying from the access control and CCTV markets respectively, and underpin our new Loyalty Program ‘Homebase’ that will launch shortly, which we know customers are already talking about,” Layton said.
n HILLS has announced that Jennifer Hill-Ling has stepped down as chair of the company, and will retire as a director later this year upon appointment of a new director after a board tenure of 16 years. “The board renewal process that I instigated last year, lays a foundation for the company as it transitions toward health technology as a core business, and revitalises its security and communications operations,” said Hill-Ling. “As its major shareholder, the Hill-Ling family welcomes the changes and will continue to strongly support the company and its growth initiatives.” Following Hill-Ling’s decision, David Chambers has been elected as Hills’ chair. Chambers joined the Hills Board as a non-executive director in July 2020 and has more than 30 years of international experience
in the healthcare and technology sectors. He is currently the chair of ASXlisted Mach7 Technologies, and his previous leadership roles include Asia Pacific managing director of Allscripts Healthcare Solutions and chief executive officer of Pro Medicus. “I congratulate David Chambers on his appointment and look forward to working closely with him and the board he now leads,” said Hills CEO, David Clarke. “The renewal process Jennifer initiated has brought significant new talent to our board as we focus on growing this business with technology solutions that enhance the health and security of our communities. “This business was built on the spirit of innovation, challenging the status quo and on self-renewal. While over the years the company has evolved, that spirit is as important now as it has always been.”
Jeff Corr, Hills.
“It’s important for us to ensure that we have appealing promotions available to customers, not only do we want customers to receive great service and products, we want to reward them for being loyal. “For the next months, when installers purchase qualifying Tecom products from Hills they will earn Tecom Tecoins. Once they have earned a minimum of 150 Tecom Tecoins, they can start redeeming Tecom Tecoins from the many prizes in the pool.” For details on the promotion and to register visit TecomTecoin.com.au
16 se&n
SEN821_8news.indd 16
29/7/21 1:12 pm
YO U R
W
EGU LE LIF EARAB
ARD
ED W AT C H
OV E R
BY
BY
SOS EMERGENCY
ALL CALL CONVERSATIONS ARE RECORDED AT BENS
FALL DETECTION CALLS TO TAGGER RESTRICTED ONLY TO BENS
CONFERENCE CALL CAPABILITY LOW BATTERY ALARM
AUTO TAG & MANUAL TAG 3G/4G COMPATIBLE IP67 WATERPROOF
ML 409 213 896
MORE INFO: BENSECURITY.COM.AU SEN821_17.indd 1
29/7/21 2:07 pm
● Special Report
Systems
SECURITY SYSTEM DESIGN Creating a capable security system demands meshing an end user’s operational requirements and procedures with appropriate security technologies. Exactly how security system design unfolds will depend on operational demands like requirement for access, value of protected items and the nature of incident response. HEN you’re planning a high security solution the first thought is likely to be that the system be able to safeguard assets against external or internal threat. But over time, this fundamental has changed. Threats capable of destroying a business are as likely to come from email phishing as physical attacks on a premise – this means that alongside the
W
electronic security solution, an organisation requires a polished cyber security policy and strong security procedures. When it comes to the physical side, key considerations include establishing the nature of the threat then planning security requirements to face the threat. This will include conducting security surveys of the site and its approaches, selecting appropriate security systems for particular jobs, and planning for the integration of external services, like monitoring, cybersecurity, networking and remote management systems, like data centres and cloud. When it comes to a threat analysis, you want to know exactly what the assets or facilities are that require protection. To establish a cost case, you need to understand the intrinsic value of these assets, not only their cash value, but the value to the operation of the business. Some assets will be indispensable to business operation and their protection and the level of security that surrounds them needs to reflect this reality. As a security integrator, you need to establish what the user considers the threat to be, then use your own experience to establish what you consider the threat to be. The ultimate stance is likely to cover both threat perceptions. It may also be useful to talk to security managers of nearby precincts and to police
18 se&n
SEN821_18solutions.indd 18
29/7/21 1:24 pm
BY J O H N A D A M S
personnel and fire professionals, including RFS teams, to get a stronger sense of the security and risk environment. Who are your neighbours, what is their security position? How amenable, are they to security partnerships and information sharing? Consider crime statistics across the area. Consider law enforcement and the relationship between law enforcement and your customer. When it comes to the physical site, you want to establish where assets are located in relation to perimeter and building entrance points, as well as windows and other apertures. If there’s a high security level, it’s inevitable that intrusion alarms will be included in an integrated security solution, but these will need a response. A question you must answer is whether this will come from police from contract security patrols, or from security staff on site. When the system is being planned, not only the system but the defensive design of the site needs to be taken into account, and you need to bear in mind how long a response might take from the first intrusion. The further the system can be pushed towards the perimeter or beyond the perimeter, the more time a response team will have to arrive at the site before the inner ring is compromised. As part of your considerations, you’ll need to have a close look at the existing security system. How capable is it and can it be integrated into an expanded and enhanced solution? Does it need to be entirely removed or can portions of it be retained? Establishing security levels required is a particular planning challenge. A maximum-security site would contain high value monetary or intrinsic resources, which if lost will impact on the capacity of the business to function. This Level 1 site will contain resources that would be potentially compromised by unauthorized access through the disclosure or loss or destruction. A typical Level 1 application would incorporate an access control system, which would have a very high level of authentication, possibly biometric, and something carried, and the security system will incorporate encryption. The Level 1 security system will detect penetration of boundaries with the highest detection capability level a site will include video surveillance. You want on site security teams to assess threats and to respond very quickly. Meanwhile, Level 2 sites contain high value resources that if compromised would have a shortterm impact on operations. The security systems need to ensure a high probability of detection of unauthorized intrusion level. Level 2 sites need access control, but the authentication level might be something carried – a secure prox card. Regardless of security levels, many modern systems incorporate functionalities that would have been considered the highest security in the past – face recognition, remote management, video analytics with object detection and line crossing, high level integration between key sub systems straight out of the box. Capabilities like this make a focus on operational needs more important and they
also ask system planners to leach their systems laterally to cover operational efficiencies and safety requirements that in the past might have been the purview of a handful of high-end sites.
DESIGNING HIGH SECURITY SYSTEMS Answering key questions about site layout is an excellent way to get a sense of the sort of security systems that could be installed on a site. For instance, whether or not the site design allows installation of perimeter intrusion sensors that would provide early warning of perimeter penetration. Is there a fence or solid wall boundary that makes opportunistic access more difficult? Is it possible that this barrier can be protected by disturbance sensors and are there lanes of view which would allow video surveillance or thermal sensors to protect a sterile zone on either side of the barrier? When it comes to perimeter systems it’s advantageous if the fence or barrier can be divided into zones, depending on the detection technology used. System designers need to establish whether the space around perimeter barriers is level and open enough to allow use of intrusion detection technology like microwaves, or in higher security sites like prisons, whether there is scope for the installation of buried sensors. Other considerations will include whether or not there’s power at or near perimeters and whether or not there is line of sight for wireless links. If there is no perimeter, then building approaches may become semi-protected space, while doors and windows become first lines of defence. When it comes to video surveillance, modern systems deliver huge functionality for your money. But before you start to spend, you need to establish existing illumination levels. Is there enough, will additional lighting need to be incorporated, or can security cameras with infrared lighting or laser lighting or LED white lighting be installed to handle the task of monitoring fences and entry points? Strong lighting on external walls also has the capacity to deter potential intruders. If you have remote dark spots or long shared perimeters, would thermal cameras deliver value?
se&n 19
SEN821_18solutions.indd 19
29/7/21 1:24 pm
● Special Report
Systems
If the site includes gates, is it possible to push the access control system out to entry vehicle entry and exit points at the perimeter so as to deny access to vehicles or individuals who do not have appointments with staff in the facility. Access control is an excellent filtration device. A perimeter access control mechanism will keep out most opportunistic intruders, while access control at the door can be more discerning still. Closer to the building where there is typically plenty of open space, consider whether or not it is possible to have video surveillance cameras installed on the outside of the building that can incorporate video motion detection or video analysis programmed to detect movement, particularly after hours. Can the CCTV system undertake LPR and facial recognition functions and inform security teams or security management of approaching threats? Consider whether detection barriers located along through ways on approaches or around the perimeter of the building would enhance security levels and give an early warning of potential attempted breach of the site’s security system. When it comes to buildings, you want all exterior doors to have internal hinges and internal closers, and be protected with reed switches unless they are monitored by the access control system. Vulnerable windows may need to be protected with vibration sensors or glass break sensors. Inside the building, volumetric detect detection is useful to protect approaches and areas of high value. Layers of sensors allow early warning so response can be actioned before intruders reach areas of greatest vulnerability. Outside the building, the access control system first encountered at the gate may include an intercom at the front door to contact reception, as well as authentication for staff or trusted visitors. Once a new visitor is into the foyer there will need to be a visitor management system to assist them and to contact the team member they’re visiting.
When it comes to alarm events, monitoring is a key part of procedures. Typically, this will be a service provided by a professional monitoring station with signals transmitted over dual carrier 4G with secure cabled IP backup. Typically, quality integrators will have relationships with monitoring stations, and will be aware of the highest security communications systems available from these partners. They will understand the importance of matching the monitoring service with the security level of the site. This may include video monitoring and remote access management but CCTV can pose challenges – it’s very operator heavy. A security survey should also consider power failure, and the need for backup that’s beyond the battery life of a typical alarm/access control system. Typically, this will require integrated UPS. This UPS might support alarms, access control, automation, as well as key building management and life safety subsystems, like fire control, lighting and gate control. The larger and more complex the site. The more important this emergency power will be. It may be possible to support with UPS, or you may require installation of or access to a generator. Medium to large sites with plenty of roof space may opt to install solar arrays and battery backup. If the site has a large roof area and modest power consumption, renewable energy may go a long way to making a site self-sufficient – that’s a great strength when it comes to supporting security and automation solutions. Management of the system is another key element. Will a dedicated security team manage the site using a dedicated workstation, incorporating security management systems, and video management systems, or will these functions be handled both locally and remotely by general staff, only onsite during work hours with alarm events transmitted to a professional monitoring station? If there are local security officers, there will need to be thoughtful procedures around patrols for alarm response, or reporting to police on higher security sites. Other considerations include the ability of security officers to make arrests, management of emergency services in the event of a security breach or natural disaster – then there’s local communications with the guard house, or the security desk, or between security officers. As security systems become more networkbased, IT departments and/or IT contractors, become more intrinsic to the maintenance of core assets that support security subnets. This means the same high level security standards and redundancy that apply to the security system need to apply to network components that are used to support the system. This may mean a dedicated subnet, specialised security postures that may incorporate quirks like air-gapping or dedicated WANs. n
20 se&n
SEN821_18solutions.indd 20
29/7/21 1:24 pm
SEN821_21.indd 1
29/7/21 1:28 pm
● Product Review
LiLin
ZOOM WITH A VIEW LiLin’s Z2R8052EX25 25x zoom bullet camera features IK10 vandal and IP67 weather and dust resistance, 5MP resolution, super low light performance, H.264 and H.265 compression, IVA and 100dB of HDR. But what defines this package is its monster focal length - from 5.3 to 130mm - supported by infrared range of up to 100m. In our street application, Lilin’s 25x long end blows the competition completely away.
22 se&n
SEN821_22lilin.indd 22
30/7/21 1:15 pm
BY J O H N A D A M S
HIS month’s test is the first time we’ve got our hands on a Lilin bullet camera for nearly 10 years. Casting our minds back we can say the technology has changed but the recipe has stayed the same. This Lilin Z2R8052EX25 25x day/ night bullet camera, featuring IP67 and IK10 ratings, is a long-range bomber, same as its predecessor, and for end users needing serious reach there’s a lot to love here. The camera features a progressive scan 1/2.8-inch CMOS image sensor delivering a resolution of 5MP (2616 x 1964 pixels) at 25ips, sees the world through a 5.3–130mm autofocus zoom lens with an aperture that’s F1.6 at wide end and F4.3 at the long end and gives an angle of view that’s 55 degrees at full wide and 2.3 degrees at the long end. Supporting that epic distortion corrected zoom is a smart 100 metre IR array. Video streaming options include RTP/HTTP, RTP/ TCP, RTP/UDP, and multicast, with 4 configurable streams in H.265 and H.264 and motion JPEG, supported by configurable frame rate and bandwidth with bit rates running from 128Kbps– 12Mbps and frame rate and bit rate settable via VBR/ CBR/GOP, with fixed bitrate and simultaneous Smart H.264/H.265 compression capability. When it comes to image effects, you can tweak brightness, contrast, hue, saturation, sharpness, mirror, flip and rotation. Other features include white balance options include ATW-narrow, ATW-wide and AWC manual, 3D noise reduction, 2D WDR, 4 zones of privacy masking and Sense Up capabilities. Along with strong wide dynamic range, there’s also 2-way audio, support for video analytics, and easy integration with third party video management systems, home automation integration and NDAA compliance. There’s digital PTZ support, IVS, tampering/ audio/alarm/motion/network lost detection event functions, digital I/Os, ONVIF Profile S support, 60dB variable AGC, an electrical shutter with 1/25s – 1/30000s settings, 2-way audio with G.711 u-law/ PCM/AAC compressions, along with SIP (external microphone required) and an audio I/O. Networking protocols supported include IPv4, IPv6, TCP, UDP, HTTP, HTTPS, SMTP, SIP, MQTT, QoS, SNMP V1/V2/V3, SNMP Trap and heartbeat, NTP, DDNS, UPnP, FTP, ARP, DHCP, PPPoE, DNS, RTSP, RTCP, Telnet, ICMP, IGMP, ONVIF Profile S, SDDP, Bonjour , 802.1x, there’s support for 10 simultaneous users with password protection, and Base64 HTTP and HTTPS encryption. There’s also digest HTTP authentication, RTSP authentication, TLS, 802.1x, and DDNS via HTTPS. Power consumption at 12 V DC is 12W, including to 14W using PoE+ (we use this option), operating temperature is from -40C to 50C, camera dimensions are 372mm long, 116 wide and 112mm high, while weight is 1800g. The camera supports microSD/ SDHC/SDXC cards to 128GB for circular recording. Something it’s worth pointing out is that this is a beautifully built camera with great hand feel. The robust cast alloy housing is a little larger than typical
T
Plates at 45m
Pedestrians at 70m
se&n 23
SEN821_22lilin.indd 23
30/7/21 1:15 pm
● Product Review
LiLin bullets in order to house that big lens, but a bit of extra size is no issue considering the huge optical power it gives you.
TEST DRIVING LILIN’S Z2R8052EX25
Plate past 80m
Depth of field is excellent.
Wide gives plates...
We are running the camera on SEN’s test network, supported by a Ubiquiti PoE+ switch, viewed on a Benq LED monitor and driven on a Dell Optiplex 9020 server. I can see the camera lens has a magnesium fluoride coating on at least the front element, which is designed to handle wavelengths around 550nm. We start out in a daytime scene at the wide end of the 5.3-130mm range. There’s bright variable light in this scene and without wide dynamic range activated, there’s deep shadow on the near side of the road. The camera doesn’t show any signs of overexposure on the bright side. Something that is immediately apparent are widespread chromatic aberrations – purple fringing - both longitudinal and latitudinal. These are to be expected at the wide end of a lens this long. I notice no pronounced barrel distortion – this is probably due to the slightly longer wide end. My first move, given the darkness on the near side of the street, is to activate wide dynamic range. Once I’ve done that, I can settle down and enjoy the image stream. Something I notice, even with WDR activated and leveling out colour and contrast, is that the colour tones are very true. The greens perhaps a little oversaturated, but the silvers, greys, browns, beiges - all these are very subtle handled at the wide end of this lens. Something else is that while there’s plenty of detail from edge to edge, deeper into the scene at the wide end there’s slight blur – it’s not pixel spread – it’s as if those parts of the scene are outside the focal plane at F1.6. Deeper in at the wide end – about 22m – I have good skin tones and plenty of detail of pedestrians, including details like running shoe type. The colour of shoelaces, the design of carried bags. I can even see access control credentials that are hanging around the necks of workers walking by. As soon as I start rolling in the zoom. the performance of the camera changes. Suddenly I have fast-moving plates in high resolution and fine details deeper into the scene. It’s a bit like a tele-lens at F32 on a bright day – everything seems in focus. Backing out again, I’m easily able to capture moving number plates at a focal length of around 6-6.5mm. I’m also able to get good detail of pedestrians at 70 metres from the lens. However, I notice there’s evidence of spherochromaticism deeper in at the wider angles of view. which certainly comes down to the very long lens, and the relatively fast aperture. Typically, long lenses do better when stopped down. At this 6.5mm focal length, I still have widespread spread chromatic aberration. But that doesn’t stop me getting considerable detail of activity on the street. This lens with its slightly long wide end congregates the 5MP of resolution in a way that delivers large amounts of detail, including everything from dog
...and faces.
24 se&n
SEN821_22lilin.indd 24
30/7/21 1:15 pm
collars and patterns on leashes, to hats and bags. As the test goes along, I find this quality is enhanced by zooming. On the topic of zooming, I creep in a bit further. I haven’t adjusted the camera’s, angle or tilt, and this means I’m shifting the field of view towards the road surface, but I immediately see that the congregation of pixels allows me to snare the number plates of fastmoving traffic. By now I am at around 8.5mm and I’m getting a great deal of detail of pedestrians and vehicles to the point of being able to view newspapers in the hands of the passengers in taxis and to see specific scuff marks on carried baggage. As light levels fall – it’s now about 5.20pm - shutter speed slows down. Because I’m still at slightly longer than wide, the aperture is stopped down a little and that’s having an impact, too. I’m not getting the plates of motorcycles going by, but we are well under 10 Lux at the lens. Regardless, the image stream appears surprisingly bright on my monitor. At this focal length I don’t have court admissible face recognition, but I do have identifiable faces, and there’s no doubt that a friend or colleague would be able to identify a subject from these image streams. As evening wears on, colour tone from the lowpressure sodium lights at the far end of the street start to make an impact. But closer to the lens. I still have the cooler tones of LED. I don’t have face recognition, but I have a lot of other detail. Clothing colour, hair colour shoe style, the presence of pets and their colour and even hair style – it’s Surry Hills in 2021 after all. When it comes to fast moving motorcycles at 5.45pm there’s the intrusion of tone mapping and tails, suggesting shutter speed has dropped down to the 1/30th of a second minimum settings. Even without plates, I do have the overall style of the machine, the colour of helmets, the colour of panniers or stowage boxes. The same goes for faces at this widish angle. I also notice some noise pushing through in colour mode in areas of movement, suggesting amplification of region of movement. I still have clothing colour, the colour of the straps of bags, hair colour, and general details of attire. Next day, I adjust the camera angle to give me a better long view. And as soon as I reel the camera in halfway, maybe 15-18mm, I’m surprised by the awesome performance of this lens, the chromatic aberrations have disappeared, pixels have congregated. I can see high levels of detail from about 25m through to 100m. The compression characteristics of a lens this long are excellent. Despite the compression, I can readily discern the associations between people. I can see the staff inside the pizza restaurant on the far side of Albion Street. There’s no vehicle that passes into my angle of view whose number plate I’m unable to capture, while strolling pedestrians and office workers are easily identifiable. Performance at this long focal length is much superior to the performance I was getting at the wider
COLOUR RENDITION, SHARPNESS, TONE – ALL THESE KEY CONTRIBUTORS TO DETAIL ARE EXCELLENT.
angle – depth of field is better, too. Face recognition 70-80m from the lens is court admissible and there’s excellent detail of carried accessories, bicycles, the guff in the back of utes. There’s somewhat less, but still very strong, details of pedestrians on the far side of Albion Street – that’s 110 metres from the lens. I’ve never had a view as good as this is, never had this sort of reach from a bullet camera. Looking at these images you wouldn’t think the camera was hanging on SEN’s same old balcony. Now, I tweak the angle a little to the left and lift the camera slightly to get the best possible view at the longest possible zoom. Back at my workstation, I’ve succeeded in my goal, but the angle of view presents as a very congested street scene. At this point it occurs to me the camera’s performance is going to be limited on full zoom by the largest object in this cluttered field of view – a street sign or the trunk of a paperbark tree. Regardless, at this focal length, the intersection of Albion Lane and Albion Street is rendered in extremely high detail with almost nothing unwanted in the scene. Number plates could not be easier, details of every kind are ready to hand. I have very nearly got court admissible face recognition on the far side of Albion Street. The level of detail past 80m from the lens is unprecedented. Now, I go in the whole way on the zoom and, as I thought, the camera focuses on a sign and a tree at about 80m. This focal point renders the deeper parts less focused that they were, but that’s a characteristic of long lenses. Performance at the extreme edge of the focal range would be better in a less cluttered environment and I wind the camera back into the high teens. The result is a very pleasing view 80 metres from the lens. Colour rendition, sharpness, tone – all these key contributors to detail are excellent. I even have detail of the shapes of leaves on the far side of Albion St. Given the afternoon is wearing on, something I start to wonder whether or not this excellent longrange performance is going to be attainable as light levels fall further still. It’s now 6.29pm and I have left the camera at a long focal length to watch the evening unfold. The image is showing the yellow colour cast generated by the sodium streetlights at the far end of the street. However, levels of detail remain high. I have no plates, but the make, model and colour of vehicles are discernible, and I have plates if parked. Most interestingly, I can still see all the way across Albion Street and into the restaurant on the far side. That’s a distance of more than 110 metres. A person runs across the field of view, and although they are rendered with significant blur, I can see they are wearing gym shoes with white soles, that the subject is a woman wearing a skirt and leggings, that she’s carrying a cloth bag, that she has a mask, or muffler around her lower face, that her hair is blonde or light grey, that she’s wearing a dark coat with a white fur or fake fur collar. Behind her, perhaps 20 metres away, a man with grey hair wearing a leather jacket
se&n 25
SEN821_22lilin.indd 25
30/7/21 1:15 pm
● Product Review
LiLin THE CAMERA’S EXTRAORDINARY LONG-RANGE PERFORMANCE IN COLOUR IN SUB-4 LUX IS NOT WHAT I WAS EXPECTING. IT’S EXCEPTIONAL.
Wide colour.
Wide monochrome.
Long view – pedestrians are 70-plus metres.
and a dark top and carrying a white bag is crossing the road in the opposite direction wearing spectacles. My next move is to switch over into night mode. And if anything, the performance of the camera goes up a notch – more sharpness from the edges, good handling of greyscale. I have IR on - remember, it’s 100 meters of IR - and yes, this camera has 100 meters of IR range - at least. I have IR reflections from reflectors all the way across Albion Street. Most interesting is the sharpness and tonal detail through the scene and across the lens from edge to edge that I have in monochrome. The depth of field is very strong. The compression is still valuable too. In this scene, although distances are being compressed in a way that requires a discerning eye, I am viewing from 25 metres to 110 metres in a single view. Throughout, I have faces and high levels of detail. In front of the restaurant, I can see a chap picking up his pizza order. Cars can be identified by make model and colour though number plates can’t be discerned, but the levels of detail when it comes to clothing are simply excellent, especially in the live view. The shoe details. The clothing details and hair colour, skin tone, and the ability to generally ascertain whether the person is carrying any items or is with another person. While this is not admissible ID, it supports the views of other cameras used in an investigation. Next, I wind the camera back out to full wide and, once the autofocus has done its thing, I get a sense of night performance across the scene at the wide end. I have make, model and colour of vehicles and good detail of pedestrians, but the quality of the images at the wide end isn’t in quite the same class as the long end. This applies equally in colour. At the wide end there’s a little bit more noise in colour. I can also still see that slight aberration at the wide end further into the scene, which must relate to the nature of the lens equation of this very long lens. Regardless, I still have solid situational awareness.
CONCLUSION
Face at 35 metres, sub-4 lux.
Lilin’s Z2R8052EX25 25x bullet is an excellent surveillance camera from an experienced manufacturer. Its performance is solid, day or night, and it’s fabulous once you start zooming in. From around 8mm, quality steps up markedly, and deeper into the zoom range things really start to hop. The camera’s extraordinary long-range performance in colour in sub4 lux is not what I was expecting. It’s exceptional. This is the bullet camera for users requiring serious reach on the street or in larger applications – it’s simply a must see and SEN rates it highly recommended. n
26 se&n
SEN821_22lilin.indd 26
30/7/21 1:15 pm
[Print]Hikvision Oceania MinMoe Intercom Kit 202107.pdf [Print]Hikvision Oceania MinMoe Intercom Kit 202107.pdf
1 1
29/7/21 29/7/21
10:33 am 10:33 am
Touchlessaccess accesscontrol controlwith withface facerecognition recognition Touchless Touchless access control with face recognition Bettersecurity securityand andimproved improvedefficiency efficiency Better Better security and improved efficiency Elegantdesign designwith with4.3-inch 4.3-inchLCD LCDtouch touchscreen screen Elegant Elegant design with 4.3-inch LCD touch screen Remotecontrol controlvia viamobile mobileAPP APP Remote Remote control via mobile APP Max.3000faces facescapacity capacityand andMax.3000 Max.3000cards cards Max.3000 Max.3000 faces capacity and Max.3000 cards
C
C
C M
M
M Y
Y
Y CM CM CM MY MY
Intercom Intercom Intercom
MY CY CY CY CMY CMY CMY K K K
MinMoe MinMoe Terminal MinMoe Terminal Terminal
DS-KIS901-P DS-KIS901-P DS-KIS901-P
ACCESS IS EASIER THAN EVER ACCESS IS EASIER THAN EVER ACCESS IS EASIER THAN EVER
MinMoe Intercom Intercom Kit Kit MinMoe MinMoe Intercom Kit
Linkingto toHikvision Hikvisionintercomindoor intercomindoorstations stations: : Linking Linking to Hikvision intercomindoor stations : Onetouch touchto tocall callHikvision Hikvisionindoor indoorstations. stations. One One touch to call Hikvision indoor stations. Receivecall callinformation informationand andunlock unlockdoors doorsremotely remotely Receive Receive call information and unlock remotely andconveniently conveniently usingthe the APP onaadoors mobile device. and using APP on mobile device. and conveniently using the APP on a mobile device. Dual-lenscamera cameradesign designhelps helpsprevent preventfraud fraudby by Dual-lens photosororvideos videos design helps prevent fraud by Dual-lens camera photos photos Distributed by or videos
Distributed by Australia Australia Distributed by Australia
SEN821_27.indd 1
R
Hikvision Oceania Hikvision Oceania
New Zealand
www.nesscorporation.com
Scan and Learn More
New Zealand New Zealand
www.csd.com.au www.nesscorporation.com www.nesscorporation.comwww.videosecurityproducts.com.au www.videosecurityproducts.com.au www.atlasgentech.co.nz www.csd.com.au www.atlasgentech.co.nz
www.csd.com.au
Scan and Learn More Scan and Learn More
www.videosecurityproducts.com.au www.atlasgentech.co.nz
www.nfs.co.nz www.nfs.co.nz
www.nfs.co.nz
R
R
www.hikvision.com.au www.hikvision.com.au Hikvision Oceania Hotline 1300 976 305 Hotline +61+61 1300 976 305 salesau@hikvision.com www.hikvision.com.au salesau@hikvision.com Hotline +61 1300 976 305 Oceania Hikvision Follow Hikvision Oceania Follow us us onon | | salesau@hikvision.com Follow us on |
Hikvision Oceania
29/7/21 11:18 am
● Case Study
King Street Wharf
KING STREET WHARF Security Integrator Micron Group has completed a complex electronic security integration for King Street Wharf in Sydney that incorporates Inner Range Integriti access control and automation, along with Milestone XProtect VMS supporting 211 Avigilon CCTV cameras.
icron Group’s integration of CCTV and access control at King Street Wharf is a high quality solution that wrangles an unusually complex built environment incorporating 4 commercial and 4 residential buildings separated by a busy street at one of Sydney’s premier harbourside locations. The commercial side overlooks King St Wharf and backs onto Lime Street, while the residential side is across Lime Street and bounded by Shelley St to the East. The residential towers range in height from 8 to 14 stories, with 155 residential apartments in the North Tower, 107 residential apartments in the South Tower, 95 residential apartments in 4549 Shelley Street and 114 Serviced Apartments at the Medina next door. Meanwhile, the commercial waterfront between Lime Street and Darling Harbour consists of 85 commercial suites with a
M
Anthony Lyon, Micron
retail area underneath containing 11 restaurants, the largest of which seats 450. You have to walk the ground to get a proper sense of the operational and installation complexities of this disparate precinct. Physically linking the buildings is an underground carpark, which lies beneath and connects both sites in multifarious ways. Moving around and between the King Street Wharf commercial and residential buildings has its labyrinthine moments. The underground areas feature the sort of variable lighting that severely tests CCTV cameras, as well as incorporating multiple access-controlled building service rooms. Something that adds to the complexity of this installation is the diversity of interest groups. There are management teams and security teams taking care of day-to-day operations. Each team answers to a management team guiding the overall business.
28 se&n
SEN821_28kingst.indd 28
29/7/21 1:22 pm
BY J O H N A D A M S
BUILT IN 2000, KSW STILL HAD AN ANALOGUE CCTV SYSTEM – THIS MEANT IP CAMERA CABLING NEEDED TO BE UNDERTAKEN FROM SCRATCH. But while the buildings are managed as one, they have separate owners and separate strata titles. All this means that a key element of the integration was establishing the requirements and pain points of the various stakeholders and ensuring that, as far as possible, everyone got what they needed. Ultimately the key for site management was the ability to manage the sites as securely and as easily as possible from a single security workstation, with secondary access for the facilities management team. Also important was the creation of comprehensive event reports supported by CCTV footage, LPR at the main carpark entry and exit, and the ability to deliver security and management teams situational awareness of the entire site, including views of the external spaces around the buildings. As Sydney CBD’s only Gold-level Milestone partner, and with considerable security integration
experience across a 23-year history, including highrise work, the 30—plus Micron Group team was well placed to handle the task. I meet the team at its nearby office, then walk the site with Micron Group’s Antony Lyon. My impressions from the start are that this is a highly professional crew and the work they’ve done at KSW certainly bears that out.
THE KSW SYSTEM It’s always tempting to rush straight into a case study like this one but let’s take a moment to run through the system components first. Cabling is the core of any security integration, and this site is no different. Built in 2000, KSW still had an analogue CCTV system – this meant IP camera cabling needed to be undertaken from scratch. But when it came to the access control system, much of the existing infrastructure was retained.
se&n 29
SEN821_28kingst.indd 29
29/7/21 1:23 pm
● Case Study
King Street Wharf
The security system is built around an optical fibre backbone, linking 9 remote CCTV cabinets, as well as the Inner Range Integriti control panels integrated with them. It’s a comprehensive installation, with CCTV cabinets supported by dedicated power, patch panels and FOBOTs, as well as incorporating ION UPS solutions at each remote cabinet and the main rack. Supporting the network are 8-port switches at 4 commercial properties, 24-port switches at parking levels 1 and 2, and 48-port PoE switches supporting devices at 23, 35 and 45 Shelly St towers. There’s also an SFP core switch and 18 fibre modules. The system includes nine 12-core OS2 single mode fibres along with terminations, there are 9 ION UPS units in the field, as well as a 3KVA ION UPS with an extended battery pack in the main comms rack. The cross section of Avigilon H5 cameras installed at the site gives a clear idea of the care that’s been taken in planning this installation. Too often, one or 2 camera types are used to cover every demand, but not at King Street Wharf. While there are 152 2MP entry and general coverage domes in the mix, there are also multiple entry ID WDR domes, 8MP external bullets, 2MP external bullets with IR, 2MP carpark entry domes, 2MP carpark long distance cameras, 2MP wide angle minidomes and a 4-sensor 360-degree camera.
Managing CCTV is Milestone XProtect VMS, supported at the head end by 1 Dell management server and 3 Dell recording servers delivering storage of 48TB, with recording undertaken at 30ips on all channels in 1080p resolution. Handling the system side is a workstation, with a dual monitor PC at the concierge/management desk, and 2 quad monitor PCs in the security office. Supporting the workstation in the control room are 4 x 24-inch and 1 x 55-inch Samsung monitors. Access control is handled by Inner Range Integriti access control panels, with 58 controllers supporting 61 doors and 78 HID iClass SE readers. There are no alarm inputs associated with the access control side of the system – alarms and ancillaries like video intercoms are handled at a building level.
WALKING THE KSW SITE As we head out onto Kings Street Wharf, Lyon explains the nature of the complex – 8 buildings, half residential, half commercial, with that big underground carpark joining them, as well as providing space for back of house services. In keeping with the location, these are high end buildings – the commercial areas are beautifully done with wonderful views across the harbour, while the residential towers have premium finishes, including gardens, pools, gyms, lobby sculptures and more. Having taken in the external cameras located under eaves around the commercial buildings and ducked into a network room on the commercial side, we cross Lime Street and head around to a residential tower entry on Shelly Street. Once we’re through the lobby I quickly lose my bearings as we dive into the back of house areas. Our first port of call is a network room with CCTV cabinet and from here we head up into the pool area of the first tower. It’s all very nicely done. Entries are access controlled and CCTV coverage is solid, the angles of view taking in access points, as well as public areas. Next, we head to the gym, which is access controlled and incorporates CCTV, the cameras of which are monitored 24 x 7 at the security control room. We emerge into the lobby of the next residential tower where cameras are challenged by strong backlight in the mornings, then it’s back down into back of house, the narrow corridors ceiled with cable trays, network and service rooms to left and right, the cavernous carparks with variable lighting stretching as far as the eye can see. “Despite appearances, the buildings are managed as a single precinct by a central management company, with the main rack of the security system located adjacent to the facilities management office,” Lyon explains as we wind our way along. “From the main rack there’s a link to the security control room, which is part of the office at the loading dock, where it can oversee the main entry ramp.
30 se&n
SEN821_28kingst.indd 30
29/7/21 1:23 pm
“The nature of management here had an impact on the design of the system – the security team doesn’t report to facilities management but works alongside them, both sides having visibility of the system and access to relevant pieces of functionality.” As this explanation progresses, we continue our journey in and out of network rooms, checking out CCTV cabinets and Inner Range Integriti control panels, Lyon pointing out salient features as we go, including cameras in the fire stairs which required drilling in from behind to cable patch panels. Throughout I notice the depth of the CCTV coverage – even the most challenging areas are well monitored. There are also multiple access points all managed by the upgraded system - in another network room Lyon shows me the existing wiring reconnected to new Integriti hardware. We also visit the main rack handling the head end of the CCTV system. This foundational rack is thoughtfully configured and sweetly cabled – a beautiful piece of work. The use of fibre optic cable helps keep things organised by minimising the volumes of cable required to bring remote video feeds to node zero. Poking around the back I see the professional touches are not skin deep. “Something special about the main rack was that it needed to be mobile so it could be moved
THIS SECURITY SYSTEM IS BUILT AROUND AN OPTICAL FIBRE BACKBONE, WHICH LINKS 9 REMOTE CCTV CABINETS, AS WELL AS THE INNER RANGE INTEGRITI CONTROL PANELS INTEGRATED WITH THEM. around a little and that meant flexible conduit had to be incorporated to allow extra movement,” Lyon explains.
KSW SECURITY ROOM At this point we arrive at the main security room adjacent to the loading dock and the main entry ramp down from the street. At the security workstation there are 3 22-inch Samsung monitors displaying live image streams while a 4th monitor supports the Integriti management system and is showing a detailed map view of the site called up in Gatekeeper. Depending on what’s happening on site, Integriti applications can be minimised, and Milestone XProtect VMS viewed on the monitor. It’s impossible for me to walk into a control room in a challenging application like this one, with areas of very low light and areas of strong backlight, and not get fixated by the camera views. In short,
se&n 31
SEN821_28kingst.indd 31
29/7/21 1:23 pm
● Case Study
King Street Wharf
image streams from the Avigilon H5 cameras are surprisingly good. We’ve never tested an Avigilon camera at SEN, and I walked into the security room with no preconceptions. The ability of the H5 cameras to iron out variable lighting is excellent and colour rendition is another strength. You’d expect cameras looking out from under a covered loading dock into sunlight to struggle with overexposure but the Avigilon H5 WDR does a nice job of handling it. Viewing security monitors you see the sense in camera selections, wide angle cameras handling some of the sweeping views, while narrower angles of view perform well covering access points in the passageways, giving the best possible identification without covering too much wall. In the sprawling carpark these narrower angles of view translate into depth of field. In some applications I can’t help noticing the barrel distortion and widespread CAs coming from the compact domes but elsewhere the ability to view multiple entrances with one camera and the high quality of the WDR performance looking out of lobby windows into direct sunlight on the street renders such quirks trivialities. There’s minimal blooming, too, which can be a challenge in carparks. The security operator on duty says compared to the old system the Avigilon/Milestone solution is excellent, with navigation being particularly easy. Something else he points out is that the old analogue system included camera views that were almost
impossible to make out, while the new system delivers excellent colour images, even in low light areas. Viewing the video wall, I can see what he means. The operator also points out that recently there was an incident of bicycle theft and calls up the footage for us to see. When watching high resolution video streams from quality CCTV cameras it’s hard to believe people would be silly enough to behave the way our subjects do, peering through external doors in full view of cameras to check the coast is clear before loading a stolen bike into a car so they can add LPR to their court admissible faces. While the crime is minor, the performance of the system is not. This is an excellent investigation tool. A key part of the security operation is managing access cards and there’s a dedicated Integriti ILAM with an integrated HID reader handling the commissioning task from the security desk. Leaving the security room, we head to the facilities management office, stopping off along the way to check out a new numberplate recognition camera installed in an old housing that snares LPR as vehicles come down the ramp from the street. Facilities management runs from an open plan office with multiple workstations around the walls and at one end, that 55-inch Samsung wall-hung monitor we met earlier. A keyboard and mouse sit on the desk space underneath the monitor and are easily accessible to adjacent managers. Running on
32 se&n
SEN821_28kingst.indd 32
29/7/21 1:23 pm
the monitor is a full instance of Milestone XProtect Smart Client, so there’s plenty of functionality to be had when the team needs situational awareness across any area of operations covered by the precinct’s comprehensive camera views. That could be a delivery, the state of works, or a security situation. According to Andreas, from property management, the Milestone Smart Client is simple to use. “It’s certainly valuable having the ability to see all the access events and to view cameras and to switch between cameras to follow events and view recordings,” he says. Beneficial for the facilities managers is that Smart Client allows customised templates to be set up which give them coverage of areas of particular interest that might assist with projects – for instance, every access point in every lobby around the site.
INSTALLING THE SYSTEM The physical installation was the biggest challenge of the KSW application and the complexity started before any hardware was hung on the wall. According to Lyon, because existing access control cabling was to be re-used, multiple techs needed to pull old devices and check cable runs to ensure their integrity, as well as verifying the accuracy of the original CAD system drawings supplied by the customer. “Right at the start, the techs needed to work out which cables related to which devices in the field,” he explains. “That meant there was a lot of testing with techs identifying each door strike and reader and which door controller they were connected to. It was a labour-intensive process but once it was done, we were able to tag the cables and reuse the existing infrastructure for new devices. Given the size of the site, that meant a big saving for our customer.” Once the testing was completed, the team got to work on the installation, with a team of 4 technicians handling everything from elevated ladder work to crowd control, to feeding cable for CCTV cameras. “We did a lot of the work during normal hours – starting at 7am in the morning and finishing at 3.30 in the afternoon,” Lyon explains. “The customers were comfortable with the work and with our safety precautions. With COVID continuing, there’s really no time that people are not on site in a residential, due to the hybrid work model. From the perspective of security installations, it’s just a matter of being considerate and respectful of those stuck at home. “When it came to the Integriti panels, as pointed out, we reused the existing cabling and simply put our new hardware in. We then added links between Integriti and the new CCTV system.” While most the access control cable could be reused, when it came to installing the CCTV cameras things were very different. Original coaxial cable and analogue cameras had to be removed and new Cat6 cable needed to be run to serve expanded camera coverage.
THERE WERE LOTS OF COMPLEX CONDUIT RUNS, AS WELL AS SOME HIGH-LEVEL INTEGRATION WORK. THE INSTALL DEFINITELY KEPT THE TEAM BUSY, AND IT KEPT THEM THINKING.
“When you look at the nature of this precinct you know it’s going to involve meandering, torturous cable runs,” Lyon says. “For instance, one of these buildings had a cable run that came out of the switch room and into a cable tray, then into a ceiling cavity above a big cool store for a restaurant. Within the cool store was a panel we needed to remove, and the cable then needed to be fed diagonally into a riser 3m away. “There were a lot of challenges just getting cables where they needed to go. There were sections we needed to drill holes through to make penetrations into the back of fire panels in the main lift lobbies of some of the buildings. There were also lots of complex conduit runs, as well as some high-level integration work. The install definitely kept the team thinking.” Despite the size and complexity of the site, work progressed at good speed. “The project began on April 6 and was handed over at the beginning of August, so it took 5 months in total but of that, 2-3 months was spent on cabling core infrastructure. Once the cabling was in place, the team got stuck into the back-end stuff, including racks, switches, management and recording servers and UPS.” The cameras were installed after the cabling was completed and camera selection depended on
se&n 33
SEN821_28kingst.indd 33
29/7/21 1:23 pm
● Case Study
King Street Wharf THE NETWORK ROOMS ALSO NEEDED TO BE CAREFULLY HANDLED – HAVING MULTIPLE SWITCHES AND MORE THAN 200 CAMERAS REQUIRED CAREFUL CABLE MANAGEMENT IN THE SWITCH ROOMS. want a cable run to be but you just have to find your way through as a team. We’re certainly very happy with the results.” Once all the physical work was done, there was still plenty to get through in terms of configuration, programming and commissioning. This included setting up the workstations, adding smart mapping, integrating alarms, connecting the CCTV system with Integriti, setting up users, access and permissions, setting up the database, configuring recording scopes and archiving, setting up email servers and smart device apps, creating operating manuals for the systems and for this specific integration. There was also time required for training the security and facilities management teams.
application, with a single camera handling lobbies in the commercial buildings, while up to 4 cameras cover the residential lobbies, which have more design elements that intrude into angles of view. Importantly, the residential cameras are designed to offer overlapping fields of view. “The CCTV installation was conducted on a camera-by-camera basis and when it was acceptable to decommission one, we would cut over to the new camera,” Lyon says. “Ultimately, we had the 2 CCTV systems running in parallel and the new Avigilon cameras were installed and recording when we finally removed the analogue cameras. “We had some interesting challenges working through each building positioning cameras for best performance – some for close up facial identification and others zoomed in on entrances, some with wide angle views to give situational awareness. In some cases, to get those views we had to drill through from the other side of heavy reinforced concrete to provide a path for the cable to the camera. It’s just a complex environment. “The network rooms also needed to be carefully handled – having multiple switches and more than 200 cameras required careful cable management in the switch rooms. We also added additional cables between nodes, so we’d have redundancy. And there were physical stipulations for some elements of the installation to ensure the end result was as discrete as possible. “At all times the built environment made things complicated - in a particular instance there’s a large concrete slab that steps down and gives you about 2 inches of space to get your conduit in and then you’ve got a sharp 90 degree corner to go down – from an installers point of view, that’s not where you
Andreas at the helm.
CONCLUSION Despite the physical challenges of the application, Lyon says the hardest thing about King Street Wharf was the process of satisfying stakeholders. “In an application like this, with multiple vested interests, any changes to the scope of works needed to be signed off by everyone,” he explains. “If a camera needed to be relocated somewhere else to improve its angle of view, or if there were any revisions to the original plan requested by security or management, getting final authorisation was a process. Fortunately, we were able to stay 95 per cent to the plan as originally drafted, which was a good outcome for all concerned.” Upon completion, the KSW solution was thoroughly checked over by security consultant, Paul Charles, who praised its workmanship. “All nodes and the head end rack were inspected – all appeared clean and dust free and workmanship and cable management appear to be of a high standard,” Charles says. “Micron took the added step of installing an additional 10 gigabit Cat 6a cable to each of the nodes to act as a backup should the optical fibre cabling become unserviceable.” The success of the King Street Wharf project is reflected in the fact that not only are the security and facilities management teams satisfied with the capabilities of their new system’s ability to streamline day-to-day operations, the site benefits from the added security and safety provided by an excellent integration that delivers high quality situational awareness and excellent footage of access events. The high quality of the products installed, the design of the system and quality of the installation makes Kings Street Wharf an exceptional security integration. n
34 se&n
SEN821_28kingst.indd 34
29/7/21 1:23 pm
There are easier ways to stay in the loop
SEN EDM NEWS I REVIEWS I TENDERS
Subscribe at securityelectronicsandnetworks.com EDM print ad_Jul21.indd 1
23/6/21 1:29 pm
● Regulars
The Interview
Ryan Fairclough, Briefcam In the Interview this month, Briefcam’s Ryan Fairclough talks about the potential of video analytics to meet operational demands using existing CCTV systems, the importance of partnering, the possibilities of lateral CCTV applications and the company’s plans for APAC. JA: Would you agree that there are tens of millions of CCTV cameras around the world delivering practically no return on investment? RF: Certainly, I’m not sure you can go as far as to say they have no return on investment but certainly they aren’t being utilised to their fullest. By complementing the initial surveillance system investment with comprehensive video analytics, you transform the massive amounts of video data that normally goes untouched, into valuable insights for safety, security and operational efficiency. JA: Is it fair to say that these cameras have considerable potential when it comes to automating searches, reporting events? RF: Completely fair! The better we can extract and manage events and data from cameras the more we can start to have great effect on not only the traditional safety and security applications but also expand to operational decision making, customer experience and the overall optimization of a physical space. JA: Something the security industry thinks too little about is lateral applications for analytics-powered CCTV cameras – how big are the possibilities? RF: I think analytics has evolved quite significantly over time, and the demand for transforming video content into meaningful, actionable insights is upon us. Those of us that have been in the industry for a while remember that it wasn’t so long ago that video analytics was over promised, and most often under delivered. Today, the world of video analytics is very different – the accuracy
and performance of video analytic solutions, as well as the scope and breadth of capabilities, have dramatically improved. The traditional use cases for analytics is most known in the safe city and policing aspects of forensic search. As technology has evolved, the use cases for safety and security have expanded and cover not only forensic video review, but real-time situational awareness and the ability to understand trends over time. With a robust platform approach to video analytics, the application for video analytics is expanding deeper into verticals such as retail, hospitality, transportation, healthcare, manufacturing – the list goes on. In addition to the benefit across verticals, is the application of video analytics into areas of the business unrelated to security. These applications help operations, customer experience, marketing and other lines of business make better decisions for optimizing physical spaces, enhancing the customer experience and ultimately driving revenue. These applications take the existing investment in your security surveillance system and transform it into a cross functional business solution. JA: Deep learning is an opaque label – what does it mean in the context of video content analysis? What are the operational benefits? RF: I am always amused by the term deep learning; I believe if you ask 10 people what it means you will get 14 different answers. I love the use of the word opaque in the question. Fits nicely! I think as far as part of the ‘deep learning’ moniker is applied, we are attempting to unlock the
unstructured data that is sitting in these tens of millions of cameras and making that data structured and useful to us to increase productivity and safety in order to free the human part of the equation to make better and more precise decisions faster. JA: From the point of view of security integrators, what’s the key to worthwhile video analysis? RF: This question is a simple as it is hard to answer! I think for anyone wishing to deploy and promote analytics it needs to fit your customers’ requirements. Is this making my customer’s experience better, is it improving their day-to-day interactions with my solution? JA: Briefcam has been doing VCA for a long time – since 2008 – what does this pioneering history give the company’s solutions? RF: I think anyone who has seen our products in action is always amazed how the patented VIDEO SYNOPSIS capability truncates many hours of surveillance footage into a brief takeaway to be analysed in much shorter periods. The expanded capabilities beyond VIDEO SYNOPISIS enable the acceleration of investigations, attaining situational awareness with real-time alerting, and the operational intelligence derived from understanding trends in video over time and as previous mentioned allow the human element of the interaction to make better decisions faster. JA: What are some of the key points of difference with Briefcam’s solutions? RF: I think our agnostic approach being a self-contained comprehensive solution - allows a more flexible approach to solution deployment. We can be a foundation to a solution to cover multiple different types of analytics in one package. While we integrate and work with many different technology partner vendors, who may or may not offer their own solutions, at some level we offer the across-the-board, comprehensive approach to analytics in one package. JA: As well as product development, Briefcam has done plenty of partnering – how important is that for integrators and end users? RF: It is very important - if not the most important thing. Working with other
36 se&n
SEN821_36interview.indd 36
30/7/21 1:14 pm
RYA N FA I R C L O U G H W I T H J O H N A D A M S
JA: Do you have a message for installers, integrators and end users – how can Briefcam help them meet operational demands? RF: Add more value to your customers investment!
technology vendors to mix and match the best solutions to address an end user’s needs is a core benefit of BriefCam. Because BriefCam is VMS and cameraagnostic, the solution can fit into almost any environment. For those that know me, it would be remiss of me not to drag this back to sport. Any good team has a multitude of different parts with differing skills that combine to win. Forwards, backs, goal kickers, goal keepers, etc. In our case, VMS partners offer one skill, camera partners offer another and BriefCam beings another. Individually, they may be brilliant contributors, but combined they provide a far more compelling case by providing a solution that solves end user’s problems. Maybe I should wander down and mention this to my beloved Carlton Football Club, the security industry has worked it out, why can’t they? JA: Would you argue VideoSynopsis is one of the key technology developments of the past 10 years thanks to its ability to deliver fast searches? RF: In my mind, yes! Having been around this industry for nearly 20 years I’ve seen some great products. Our patented VIDEO SYNOPISIS is a core capability in the solution that sets BriefCam apart from other VA solutions. Like I mentioned before, these capabilities are leading in the traditional security space, but also become more and more necessary and relevant in new verticals and applications. VIDEO SYNOPSIS in combination with the breadth of BriefCam analytics is changing the game. JA: Is VCA becoming more important as COVID-19 demands security solutions deliver operators more automated functions, more remote capabilities? RF: I wonder if important is the right word – certainly it has sped up many applications within the analytics space. Maybe these applications would have evolved organically without the impact of COVID, but certainly with the limited nature of human interaction I think it showed a very quick snapshot of what the value of video analytics is. I think also it showed how adaptive analytics vendors are. Very quickly R&D resources were pivoted away from their planned roadmaps and towards COVID
Ryan Fairclough
solutions and some were deployed within months of the initial outbreaks. Distancing, mask check, etc. Which I think highlights how quickly the technology is evolving. It makes you really excited when it comes to what these same vendors will be able to achieve once we have seen the end of the COVID era. JA: Generally speaking, what are your plans in terms of growing the Briefcam branch in APAC? RF: BriefCam has quite rightly been historically positioned within law enforcement and government city safe applications, but as our product evolves and the peripheral technologies evolve with us, the plan is to start approaching a more commercial market strategy, we will still be working our traditional space. As we evolve our strategy, I hope to see us become active a wider range of verticals. We have a small team at the moment, but I am right now working on expanding our sales and technical support channels to provide a better experience for our channel as they work with us. Any product like ours is underpinned by its technical support, so better access to training and support is paramount in regional success. For the interim the ANZ market will be serviced by myself from a sales side, as soon as I am allowed home for a visit but until then via the wonderful world of Zoom.
JA: How are things going up in Singapore and across SE Asia – is the security market there doing well, considering the current challenges? RF: Like elsewhere the market shifts every other month, some open, some close and some are long term in not a great place. Just when you think a nice project is coming next month there is another outbreak of sorts, market sentiment drops and next month quickly becomes next quarter, but we are living a once in a generation event, so we roll with the punches. I think the middle market has been most affected across Asia. The big deployments are still going ahead albeit at a slower pace and the smaller market seems to be picking up. We have had some great success even recently in North Asia and China – SEA has slowed down but luckily not come to a full stop. Stay tuned for some good announcements from Australia! JA: How excited are you to join a company which has such a pointy solution suite? RF: I think anyone who knows my history in the industry would say I don’t always choose the products that have an easy path to market. To borrow a quote from JFK: “We choose…not because they are easy, but because they are hard; because that goal will serve to organize and measure the best of our energies and skills”. BriefCam has a solid product offering excellent backing from our parent company and the wider industry, it’s a respected product and I feel that as we start to realise a more aggressive strategy in the region more people will see the value of BriefCam, but also many other analytics options. It’s a nice feeling to know that I have joined a company that stands on the edge of its demand explosion and to consider all the exciting and cool things I know we will be working on in the years to come with friends I know from the past and new ones I will meet in the future. n se&n 37
SEN821_36interview.indd 37
30/7/21 1:14 pm
Proudly brought to you by
● Regulars
Monitoring
Your Monitoring Specialists
1300 130 515
www.bensecurity.com.au
Scatterbrain
Something weird happened on the way to smart homes – a great fragmentation that makes the notion of modern smart homes impossible to squeeze into a box. So functionally isolated are many of the latest device-centric solutions it’s hard to even think of them as occupying the same ecosystem. OR the longest time, alarm systems and smart home systems – the latter featuring I/Os to automate functions – were conceptually fixed. They managed sensor inputs and they drove outputs, always through a local controller, managed by a local keypad. As the world moved to wired and wireless networks, not only systems, but single devices, could be managed on a smart phone app – that static concept has been broken. This does not mean to say that there are no longer traditional-looking alarm and automation solutions, the latest of these built around affordable wireless with slightly longer life batteries. What it means is that every single device in the home from the watering system, air conditioners, smart locks, baby monitoring cameras, pet monitoring cameras, lighting systems, thermostats, electric lawnmowers, weather stations, exercise equipment, smoke sensors, window blinds, alarm clocks, pool pumps, smart speakers, doorbells, video intercoms, cameras, smart switches, light bulbs, pressure cookers, barbeques, smart beds, vacuum cleaning robots, extension cords and everything in between are now automated and driven by separate apps in a way guaranteed to do a user’s head in. In a real way, it’s as if the worst fears of home automation standardisation organisations have come to pass and the chances these devices will be wrangled into a single coherent form later seem remote, indeed. Rather than integrating devices to create smart systems, market forces are squeezing manufacturers and app developers into making individual devices smart to create sales hooks and
F
generate recurring revenue. There’s nothing wrong with such motivations and in many cases, the devices work well enough, it’s just that they don’t make a home smart, so much as scatterbrained. From the point of view of an end user, trying to manage a galaxy of devices using individual apps is intensely challenging to the point many smart devices are going to be relegated to the status of gimmickry and discarded once their gloss has worn off. Worst of all from the perspective of smart home installers, the impossibility of managing multiple smart devices reflects poorly on the entire notion of a smart home system in the minds of some consumers, making sales tougher. Regardless of the weaknesses of device-based smart solutions, there are core pieces of functionality that users are going to cleave to – which pieces of functionality will appeal most are going to depend on the user – if there are security and life safety devices in such a diffuse ecosystem, it’s likely these will be among the favourites. Things like smart locks, video intercoms and smoke sensors also spring to mind. However, for aquarists or wine buffs, temperature sensors might be more important, while gardeners with North-West facing gardens might favour automated watering systems. The complexity of these clusters of disparate devices, that are at once hard to maintain and impossible to centrally manage, proffers opportunities for budding integration businesses. For security installers getting their teeth into home automation – especially automated environments with so little cohesion – may sound like a reach. But it is possible to use
38 se&n
SEN821_38monitor.indd 38
29/7/21 1:20 pm
Proudly brought to you by
Your Monitoring Specialists
1300 130 515
www.bensecurity.com.au
unifying smart home operating systems to bring together a host of devices into a single dashboard. The best smart home operating systems will support thousands of products – in some cases tens of thousands. There are key things to look for when it comes to unifying smart home solutions. These solutions will be managed from a touch screen and/or from an app, and in some cases, you’ll be able to hop into the dashboard via any network connected browser. A well-designed interface will include controls for air conditioning, the alarm system, CCTV cameras, lighting, video intercoms, front door locks, the sound systems and much more. There will need to be a lot of flexibility in the interface – it’s going to need to evolve as the user (and the installation team) grows into it. The app will need to mirror much of the functionality and appearance of the primary touch screen, and it would be great if the dashboard could be mirrored on a smart TV as well, though driving it with a remote might be onerous if other options were readily to hand. Driving functions like lights and volume is going to be easiest with sliders but other functions will require on/ off buttons. While there are multiple options available to aggregate smart devices into smart home solutions, the best way to choose a system from the point of view of a security installer looking to expand, is to install and test solutions yourself – not only at the office but at home, where they can be stretched to the limit by the demands of family life. There are plenty of open-source solutions like OpenHAB, Home Assistant, OpenMotics, HomeBridge and Smarthomatic on the market, but customising one of these is going to be a challenge and there’s no guarantee your hard-earned IP will survive sharing by an expanding customer base. Instead, partnering with a professional developer is likely to be the best option. If the solution is flexible enough, you will find a steady supply of existing and new customers eager to combine their devices and home security systems into an integrated smart home. n se&n 39
SEN821_38monitor.indd 39
29/7/21 1:20 pm
● Special Report
Perimeter Protection
PERIMETER PROTECTION SYSTEMS Perimeter solutions push intrusion detection outside vulnerable facilities, increasing the length of time available for response to alarm events, as well as driving verification technologies, like PTZ presets.
F the 4 defence lines defining site security, the first 2 include the protection of the perimeter fence and grounds of the site, and the protection of the walls, roofs and external fittings of the site’s buildings. In other words, perimeter security accounts for 50 per cent of a site’s 4-tiered security solution. There are some sites on which the first line of defence are the walls of the building, but it still should be possible to move security outside a building to its approaches. A perimeter solution should cover gates, covered entries and driveways, as well as external sensors supporting walls, windows and doors. And physically harden up your doors and windows, incorporating vibration sensors to give early warning of physical attack on an entry point. Physical barriers need not be only fences or walls. A creek, hedge, gully or natural wall can function as an excellent perimeter barrier when supported by electronic systems like AIRs beams, external microwave and video motion detection. A perimeter solution is not simply a detection technology on the end of an alarm zone – you also need to think about onsite reporting, as well as alarm monitoring and response. According to Gallagher’s Adrian Chen, perimeter protection systems offer considerable operational value to security managers. “Perimeter protection acts as the first line of defence for an overall security system,” Chen explains. “The key benefit of perimeter detection is the ability to detect an intruder before they enter your site. When a fence sensor is triggered, an alarm will activate for that zone, providing more time to respond and allowing guards to immediately focus their attention where it is needed most. A networked perimeter solution incorporates sensors that continuously monitor
0
fence vibration or movement and can be used with or without an energised pulse to detect intrusion, without the intruder being aware. “Perimeter solutions, especially those installed on the outer perimeter fence, provide the maximum time for monitoring stations and security patrols to respond to intrusion attempts, due to detection occurring as soon as an intruder attempts to enter the site’s boundary. The most important aspect of monitoring and security patrols is ensuring that they are responding to actual events and not false alarms. “High levels of false alarms can lead to what we commonly refer to as false alarm fatigue, which is when security patrols are continually dealing with high volumes of false alarms, and as a result, they reach a point where their response is lessened through the assumption that it’s “just another false alarm, I’ll deal with it later”. This is where the selection of detection technology is key, and choosing a perimeter technology that works effectively, rather than making a decision based on price, is critical. Depending on the level of security required, combining multiple technologies such as Monitored Pulse Fence and VMS can improve coordination of the response.” How difficult is it to integrate perimeter detection and protection systems with common security panels, in Chen’s opinion?
40 se&n
SEN821_40perimeter.indd 40
29/7/21 1:19 pm
BY J O H N A D A M S
“Perimeter detection can easily be scaled from a basic alarm system to a fully integrated solution that provides additional information, such as maintenance alerts or voltage feedback on the fence line,” he says. “For instance, Gallagher Command Centre allows for seamless integration with other systems and third-party perimeter products. The capabilities of Command Centre extend from the fence line in, providing true site management from a centralised platform. A high-level interface between Gallagher’s Command Centre and perimeter security system delivers multi-site, multi-zone control and monitoring through a single graphical user interface.” In Chen’s opinion, which sites are best suited to perimeter security systems? “All sites that value their assets, should consider some form of perimeter/exterior protection,” he says. “From a dairy cooperative, to an airport, a local car yard, or a substation – sites of varying needs and sizes all benefit from perimeter security in some way, shape, or form. “Critical infrastructure sites for example, are at greater risk of intrusion or sabotage and the shutdown of their facilities can affect hundreds of thousands of people. The protection of critical sites starts with a perimeter security system. In comparison, sites such as distribution centres or storage yards, are also at risk with potential knock-on effects to business continuity. Whether it be individuals trespassing a
SITE SECURITY IS AN INTEGRATED MULTI-LAYERED SOLUTION CONSISTING OF PERIMETER SECURITY, CCTV, ACCESS CONTROL, AND INTERNAL DETECTION SYSTEM.
site to access parked vehicles and fuel tanks, or to intrude site buildings to steal goods – it all has an impact on the operational running of the business. “The best defence is always executed from the fence line inwards, and perimeter detection is your first point of defence on the site. Site security is an integrated multi-layered solution consisting of perimeter security, CCTV, access control, and internal detection system. The most effective perimeter security solution comprises of multiple layers – from a physical fence, to video, disturbance/ vibration, energised fence, taut wire, and a combination of multiple technology, each site is going to have its own individual requirements.” Design philosophy that considers clear operational goals is vital when it comes to perimeter security. “The operational goals of a business are critical when designing a perimeter system. If you do not understand the operational requirements of the site, you are relying on pure luck to solve your customer’s security challenges,” Chen says. “What perimeter security you implement for a warehouse facility may be completely different to a 24/7 airport facility or corrections facility. It’s imperative to understand what they are wanting to achieve, what process they have in place should an intrusion occur, the implications they face if assets were lost or damaged, their duty of care to the public, and
se&n 41
SEN821_40perimeter.indd 41
29/7/21 1:19 pm
● Special Report
Perimeter Protection
how quickly the site can be secured if an intrusion takes place. “By considering the operational goals of a business, you are better able to determine what technology, or combination of technologies, are required to secure the site, ensure reliable and timely detection, and be able to respond accordingly.” Chen argues that in some cases powered fences are the best way to deter intrusion attempts on high risk, unmanned sites. “Without a doubt, when it comes to perimeter security, it can generally be summed up with 3 Ds – deter, detect, and delay,” he says. “Without the 3 D’s, the perimeter system isn’t going to be as effective. As a result, there’s no more effective deterrent on a perimeter than an energised fence. Facing an obstacle that has 7000V–10,000V is a significant psychological deterrent, but unlike other deterrent technologies it is intentionally designed to be safe. It is the only system that can actively deter, detect, and delay an intrusion at the perimeter.” According to Sektor’s Tom Kinkade, the primary advantage of perimeter surveillance is early detection and assessment of targets. “Some technologies such as PSR can even provide 360-degree intelligence on airborne and ground-level targets as they approach a perimeter from 1000s of metres, allowing security response teams to ‘meet them at the fence’ or take necessary counter-measures,” he explains. “In order to deliver meaningful perimeter security systems, professional security consultants determine the risk profile of their clients and then implement technology and a tailored concept of operations to meet the individual organisational needs. “From our experience military, aviation, seaports, utilities, corrections, data centres and resources customers seem to be most concerned about implementing meaningful perimeter security.
WHEN IT COMES TO PERIMETER SECURITY, IT CAN GENERALLY BE SUMMED UP WITH 3 DS – DETER, DETECT, AND DELAY.
“When it comes to perimeter, I don’t think any single technology is a gold standard, meaningful deployments take unique factors into account and often multiple techniques are used in concert to deliver the desired outcome. “However, thermal cameras are the way to go in terms of accuracy, distance capability and consistency when compared to optical cameras. The best camouflage in the world is no match for a thermal camera. Moreover, thermal cameras are not affected by shadows, sun glare and scattered or moving light sources – all causes for degraded image quality and false alarms in the visible spectrum.” According to Kincade, standard alarm panels are not the best solution for high security perimeter applications. “Common security panels monitor binary sensor condition, i.e. open/closed,” he says. “This works well for traditional alarm sensors used on perimeters. On the other hand, large or high-risk locations may require enhanced situational awareness that can be garnered from perimeter surveillance systems. Dedicated systems can provide real time data on multiple targets including identity, classification, geolocation, speed, direction, friend/foe status and so on.” According to Doug Kennedy of CRK, it’s not only high security sites that benefit from perimeter solutions – many SMEs have operations and facilities that can benefit from pushing the security system outside buildings for earliest possible detection. “Perimeter systems are discreet, provide early attack warnings and offer alarm verification – best of all they don’t need to be complex or expensive,” he says. “One of the great advantages of the integration between Risco alarm panels and Dahua cameras is how easily they can be connected and integrated together to provide a perimeter security solution. “Earlier detection of intruders gives time for security patrols to react and respond to intrusion attempts, especially on sites like factories and warehouses that have large areas to cover, where they also reduce the dependency on cameras and active patrols.”
DESIGNING PERIMETER SOLUTIONS Man-made barriers must be employed if you need to deter and delay criminal entry. Fact is that regardless of whether your site employs PE beams, AIRs, microwave, optical VMD, external PIRs, capacitance sensors, fibre optic cable, thermal cameras, taut wire devices, monitored pulse fences, external dual technology sensors, fluid pressure systems, leaky coax; all should be installed in support of some form of physical perimeter barrier, whether it be a fence, wall, gate, grill or screen. Exactly where the physical perimeter is located in relation to electronic sensing devices depends
42 se&n
SEN821_40perimeter.indd 42
29/7/21 1:19 pm
on your application. A defence installation is likely to have a physical barrier, a sensing field then a series of tight perimeter solutions around specific potential targets across a site. A prison on the other hand, will have its perimeter systems projected into the facility with electronic protection installed before the most significant perimeter wall or fence is reached by a potential escapee. Many perimeter solutions will incorporate electronic sensing as part of the physical perimeter itself. Fibre optic solutions can either be buried or supported by a perimeter fence and are ideal if there’s a big perimeter that needs stable and reliable coverage at a competitive price. Taut wire systems, capacitive sensors, and fluid pressure sensors are all ideal for use in support of standard chain-link perimeter fences. To provide reasonable security against opportunistic intruders a chain-link perimeter should incorporate a 3 or 4 stranded, barbed crown that slopes outward at 45 degrees to make entry into the site a more challenging proposition. The fence should use 9-gauge wire or heavier, and employ barbed lower strands. It should be at least 2m in height with a 2m support-post interval. Mesh size should not exceed 2 inches. Any gap between the lowest wire and the ground should be at most 2 inches and you should seriously consider the ease with which loose soil can be scraped away to allow entry under the fence. If the funds aren’t available to anchor midsections between support posts to concrete sills, then they should be fixed to steel spikes driven deeply into the earth. When specifying barbed wire to support your electronic systems make sure you get 12 gauge, twisted double strand with 4 barbed points spaced at 4 inches and installed with strands less than 6-inches apart. Electronic systems that can be installed in support of fence lines include pulse monitored, taut wire systems installed as part of the fence and positioned between a wire strand and a support post fixing point, or capacitive field systems, which employ an electrical field to create a stable EMI environment that intrusion will disturb. CPS systems are highly sensitive and can be used in higher security applications. A particularly stable and relatively inexpensive solution is provided by the fibre optic cable sensors mentioned earlier. These cables can be installed directly on a fence (or buried). Pulsed light is fired down the fibre and if the properties of this light are disturbed by cutting or vibration, an alarm will be generated. The effectiveness of this sensing mechanism relates directly to the management software scanning the signal looking for aberrations in the ambient noise floor. Every gate or access point in a site’s perimeter increases vulnerability to penetration and, if any electronic system is to be incorporated, increases
the potential for false alarms. Effective electronic and manpower support of access points is the key to maintaining control. Within the limits of practicality, access points should be kept to a minimum. Doing so will mean fewer monitoring points, smaller gatehouse manpower requirements and fewer expensive long range access control readers. Because breaks in the perimeter barrier are a weakness, special attention should be given to the construction, fixing points, and locking systems of gates. Electronic monitoring of access points is vital, and you should consider installing mechanisms like tyre shredders that render unauthorized vehicles leaving your site undriveable. Access point security levels should be greater than for your physical perimeter barrier, particularly in terms of physical strength. There are a number of threats a perimeter system must be immune to, by virtue of technology, design and installation. The following factors will cause alarm in various perimeter systems – you need to manage these factors, or avoid them altogether: l Passage of heavy transport l Wind movement of tree branches l Soil subsidence l Microwave interference l Inadvertent intrusion by kids, visitors or staff l Fog, smoke, rain, fumes and dust l Extremes of temperature l Ice and snow l Wind vibration l Drying soils lG round movement generated by tree root movement l Weight of rain water l EMI and RFI l Lightning l Wind blown leaves l Long grass, shrubs and bushes. n
se&n 43
SEN821_40perimeter.indd 43
29/7/21 1:19 pm
● Special Report
Access Control
BIOMETRIC ACCESS CONTROL Biometrics have long been considered the gold standard in authentication technologies and with COVID-19 pressing users towards touchless applications.
VERY person is unique in multiple ways – fingerprints, facial structure, the way they walk, the way they talk, the pattern of their blood vessels. These fundamental differences can be used by access control systems to create a ‘something you are’ authentication method that is unique, as well as being consistent over time. There are advantages not only in terms of security levels and touchless reads – biometrics requires no cards authentication credentials cannot be lost, there are no passwords that might be shared, and no ongoing hardware costs. In some cases, it’s possible for a user’s smart device to be employed as a credential, which has advantages in certain applications. According to Gallagher’s Steve Bell, while
E
biometrics can be secure there’s more to think about when it comes to authentication procedures than one type of technology. “Authentication is the process to prove that the person or machine that is seeking access, is the same person or machine that was initially granted permission to have that privilege in the first place,” Bell explains. “Multi-factor authentication provides the gold standard for best security and a lower chance of a false accept. Multi-factor authentication requires 2 different types of authentications with the options of: l Something you have: often a token with a cryptographic key for authentication l Something you know: a password or PIN number l Something you are: biometric. “This means the gold standard will be a multifactor authentication and often one of those factors is a biometric.” When it comes to which biometric technology, or technology combination, is the most secure, Bell argues that simulation is the greatest threat. “The weakness in biometric technology is the ability to simulate another person’s biometric,” he says. “There have been several examples of someone obtaining a fingerprint image from a glass
44 se&n
SEN821_44biometric.indd 44
29/7/21 1:18 pm
BY J O H N A D A M S
and preparing it appropriately to fool the fingerprint reader and gain access. With facial recognition, it can be as easy as holding up a photograph to the facial recognition camera. So, it’s less about the actual biometric type that is used, and more about how well the manufacturer has implemented the reader and the liveness detection that is required. Another issue for end users is read speed, which in busy applications has caused delays in the past. “These days, the read speed is less about the type of biometrics, and more about the quality of the manufacturer’s solution,” Bell explains. “The quality of the integration of a biometric solution into an access control system or other software that requires a person to be authenticated, is also a factor for performance. Gallagher has ensured that our biometric integration partners, IDEMIA and Invixium, have invested in producing a high performing solution. It’s important for customers to undergo their due diligence when selecting a biometric solution and consider using well-known and respected brands.” Something else security managers and security integrators should have front of mind at the moment is the COVID-19 pandemic, which continues to morph and is likely to challenge security operations for years to come. On that score, which biometrics technologies are safest in terms of COVID-19 prevention? According to Bell, even before COVID-19, there were many countries requesting contactless biometrics. “My experience with Turkey, South Africa, and the wider Middle Eastern region, is there has been a desire for touchless biometrics for several years,” he says. “COVID-19 will continue to extend that desire to all markets of biometric access control.” Has the time of facial recognition as an authentication method arrived, in Bell’s opinion? “High security sites, such as airports, require 2-factor authentication, with facial recognition being one of them. In medium to low security situations, single factor facial recognition can be a great option. An example of this is the turnstiles leading to the lift lobby of a high-rise office building. Facial recognition can achieve good throughput and has the reassurance that there is generally another access control point at the entry to the actual offices.” When it comes to the future of biometrics – which technologies does Bell feel will prevail? “Many of the smart devices we see today implement very high levels of security for the storage of biometric authenticators,” he says. “The privacy of these solutions is great, as they maintain the biometric identifier information on the smart device. My feeling is that these smart devices will be one of the primary authentication use cases in the future.” Over at Nirovision, Jason Allan sees biometrics as offering significant benefits. “We believe any authentication method is greatly enhanced when biometric credentials are added to the mix, because they rely on the right person with the right access being present, whereas cards, mobile
OF ALL BIOMETRICS, FACIAL RECOGNITION PROVIDES ACCURATE IDENTIFICATION WHILE BEING THE LEAST INTRUSIVE ALTERNATIVE, AND FULLY TOUCH-LESS.
devices and pin codes can be easily shared, stolen or hacked,” he explains. “Of all biometrics, facial recognition provides accurate identification while being the least intrusive alternative, and fully touch-less. Furthermore, with facial recognition, a workplace has video evidence of who accessed any area, as opposed to standalone time logs that don’t tell the full story. “Due to its touchless nature, facial recognition is more important than ever in the fight to keep workplaces open and workers safe. Whether it’s used for visitor management, worker time & attendance, temperature checks or access control, the benefits are clear: it can fully automate identification, health and compliance checks, alert upon inconsistencies or problems, and create detailed logs and reports that can be used for contact tracing and auditing purposes.” When it comes to the future of biometrics, Allen argues that what appeals to end users is safety and simplicity. “When used safely, facial recognition technology can make our lives safer and simpler: in addition to automating a generally manual process, facial recognition contributes to more accurate identification and is conveniently unobtrusive,” he explains. According to Jackie Han of Hills, the big advantage of biometrics is that they are a unique authenticator. “We all have a unique biometric signature which unlike credit cards or passwords can’t be copied,” Han says. “This makes biometrics a safe authentication method in the access control market that continues to show growth. “For instance, face recognition technology is extremely difficult to copy and is unique to each individual. The latest face recognition algorithms are so accurate that even photos, dynamic video and other image forms of counterfeit will not authenticate and with accuracy rates of up to 99.5 per cent.” According to Han, face recognition is made more appealing by the need for low-touch COVID-safe environments. “Face recognition complies with both non-contact authentication and social distancing, 2 key factors in COVID prevention,” says Han. “In the case of Dahua, face recognition solutions can accurately detect faces within range of 0.3m to 1.5m, and also supports mask detection, so even if you are wearing a mask a system can authenticate you without any need to contact a common surface, which helps prevent the spread of COVID.” “In recent years, non-contact biometrics such as facial recognition technology have become more and more widely accepted. The onset of the epidemic has made people more aware of the importance of non-contact identification methods for public safety, with some countries and cities restricting or prohibiting the use of fingerprint identification.” n
se&n 45
SEN821_44biometric.indd 45
29/7/21 1:17 pm
● Regulars
Products
Editor’s choice
What’s new in the industry.
HID GLOBAL ADDS FINGERPRINT BIOMETRICS TO SIGNO READERS
AETEK INDUSTRIAL FIBRE MEDIA CONVERTER FROM CSD
l HID’s 25B Signo biometric reader is now designed to capture and read fingerprints for verification and identification purposes. The reader is the latest addition to the company’s signature line of HID Signo Readers and adds an API for integration with access control software solutions from HID Global partners. This enables a single point of biometric template enrolment through an access control system, with templates pushed to all connected devices simultaneously. Multispectral imaging technology allows HID Signo 25B to capture fingerprint images from both the surface and the subsurface of the skin, delivering consistent read performance regardless of environmental and skin conditions, including wetness, dust and dirt. Liveness detection capabilities prevent spoof attempts with fake fingers or using latent fingerprints. The HID Signo Biometric Reader 25B supports Seos, iCLASS SE, iCLASS, MIFARE and HID Mobile Access virtual credentials. Each device supports Near Field Communication (NFC) and Bluetooth out of the box. The reader is paired with web-based HID Biometric Manager software that performs configuration and management of the reader, including firmware updates over the network.
l AETEK M30-011-30 is the industrial-grade Gigabit PoE+ media converter, featuring one 100/1000BASE-X SFP fibre port and one 10/100/1000BASE-T 802.3at PoE+ copper port in an IP30-rated rugged but compact-size case. Being able to operate under the temperature ranging from -40 to 75 degrees C, the M30-011-30 provides reliable, stable, and continuous long-range data transmission and can be installed in harsh environments. See this and other Aetek products at your local CSD branch. Distributor: Central Security Distribution Contact: 1300 319 499
Contact: HID Distributors
HANWHA RELEASES NEW 2MP HD AI CAMERAS l HANWHA Techwin has expanded and updated its line-up of
P-Series AI cameras with 5 new entry level 2MP HD models in IR bullet, domes, vandal domes and box camera variations. Hanwha P-Series AI cameras include license-free video analytics based on deep learning that can detect various object types such as people, vehicles, faces and license plates as well as identify unique object attributes such as a person’s age group, gender and clothing colour, or a vehicle’s type and colour. The cameras offer enhanced people counting, queue management and heat-map functionality with no requirement for overhead mounting. Digital auto-tracking provides a second video stream featuring close-up detail on objects being tracked. Wisenet AI cameras can significantly reduce the false alarms generated from irrelevant movement such as moving trees, shadows and animals. Enhancements to the line include WiseNR II noise reduction, which utilizes AI to identify object movement and reduce blur in noisy low light environments. Contact: Hanwha Distributors
JOHNSON CONTROLS RELEASES QOLSYS l JOHNSON Controls Qolsys IQ Wi-Fi alarm and automation panel integrates multiple connected devices. The mesh network supports up to 8 IQ Wi-Fi agents, and installs using the IQ panel’s 7-inch touchscreen. Dual band SSID allows partitioning of security devices from consumer Wi-Fi devices for improved security and maintenance. Meanwhile, users can manage guest networks, change passwords, view and manage connected devices from the IQ Panel’s intuitive interface. IQ WiFi is the latest product manufactured by Qolsys, which was acquired fully by Johnson Controls in 2020. IQ Wi-Fi can connect and cameras, video doorbells, garage openers and consumer WiFi devices so they can be managed using the IQ Panel. “The security industry has become increasingly dependent on the end user’s network to support the growing demand of internet connected devices,” said Dave Pulling, Johnson Controls general manager and former CEO of Qolsys. “IQ Wi-Fi elegantly connects and manages these devices to deliver better coverage and fast, reliable service.” Distributor: BGW Technologies Contact: +61 2 9674 4255
46 se&n
SEN821_46prods.indd 46
29/7/21 1:25 pm
SUPREMA INTEGRITI BIOMETRIC INTEGRATION
HIKVISION 4-CHANNEL POE NVR
l INNER Range Integriti users are now easily able to connect to
l HIKVISION’S new I-Series 4-channel PoE NVR able to support resolutions up to 12MP and designed to replace the current K-Series, is now available from CSD. The HIK-7604NI-I1-4P houses a new, powerful chipset that incorporates the latest V4 graphical user interface (GUI). This brings the 4-channel NVR in line with the rest of NVR range, providing a consistent interface for all NVR sizes. In addition to the new V4 GUI, the new 4-channel I-Series NVR now fully supports AcuSense, ColorVu, ANPR, people counting, thermal cameras and heatmapping. The unit features 1 SATA interface with 8 TB capacity, draws 1.8A, has a working temperature of -10 to 55C, has dimensions of 315 x 240 x 48mm and weighs 1.2kg. There are 4 x plug & play independent PoE interfaces, a 40Mbps throughput, H.264, H.264+, H.265, H.265+, MPEG4 compression options, human and vehicle search, Hik-Connect P2P – quick remote access setup, HDMI, VGA and CVBS video output and Alarm I/O.
Suprema biometric devices and manage the accompanying data efficiently. With global health concerns, a range of measures have been implemented worldwide to reduce the opportunity for viruses to spread. Biometrics technology is one of them and contributes to limiting the spread of a virus through minimising physical contact with surfaces. As part of the latest release of Integriti, Version 21, Inner Range has launched a new integration with Suprema, a leading global provider of biometrics solutions. Integriti Version 21 allows the integration of Suprema’s wide range of contactless biometric terminals. Biometric credentials can be added directly into Integriti’s software, which instantly updates the Suprema databases in the biometric access control terminals. This integration streamlines data management, now only requiring one point for user management. Manufacturer: Inner Range Contact: +61 3 9780 4300, sales@innerrange.com
Distributor: Central Security Distribution Contact: 1300 319 499
INNER RANGE INTEGRATES WITH AXIS CAMERA STATION
EOS RELEASES WISENET PNM-9322VQP 10MP-22MP MULTI-DIRECTIONAL PTZ
l CSD reports that the integration between Inner Range and Axis Communications’ Camera Station has been completed. The AXIS Camera Station ecosystem which includes IP cameras, IP audio solutions, IP intercoms, body cameras and the companion series, can now be part of the extensive portfolio of high-level integrations to Inner Range’s Integriti ecosystem incorporating their subsystems based on access control, security, fire and visitor management. Such a broad spectrum of ecosystems integrated into one major super-system that provides the end user with a complete site management solution that utilises the superior quality and advanced technology provided by AXIS and Inner Range.
l THE Wisenet PNM-9322VQP, available from EOS Australia, is a multi-directional PTZ camera which has been designed by Hanwha Techwin to provide a highly cost-effective solution for detecting and tracking object over wide and open areas. This camera has the option of selecting exchangeable 2 and 5MP lens modules, which in turn allows the camera’s sensors to work together in order to capture 360-degree images up to 20MP. Making the PNM-9322VQP ideal for use in a wide range of applications that require complete 360-degree surveillance. The PTZ camera element can be configured to zoom in and track a moving object along with moving to a user-defined preset positions when the line crossing detection function detects any activity. The PNM-9322VQP incorporates Wisenet WDR and there’s support for a variety of exclusive video and audio analytics, which includes face detection, tampering notification and motion detection. The PNM-9322VQP is equipped with the Wisenet7 chipset and is NDAA compliant. Lens options range from 2.4 to 12mm for the 2MP module, and 3.7 to 7mm for the 5MP module.
Distributor: Central Security Distribution Contact: 1300 319 499
Distributor: EOS Australia Contact: +61 2 9749 5888
se&n 47
SEN821_46prods.indd 47
29/7/21 1:25 pm
● Regulars
Help desk
Q: When it comes to selecting internal alarm sensors, what are the features installers should be looking for? Are all internal sensors the same or do some offer superior catch performance and false alarm resistance? A: When selecting a PIR for internal use look for dual or quad multiple pyroelectric sensing. These reduce false alarms through increased stability. Other features you should rate highly include creep zones, a good-sized detection window, not just a slot or a small hole; and RFI, surge and lowvoltage protection. You also want zone adjustment that allows range to be changed or zones to be ignored, latching (with LED indicator), walk test capability (and LED indicator). You want a high signal-to-noise ratio, antimasking, tantallum capacitor circuits for EMI/RFI rejection, trouble log, silent alarm relay, enhanced processing, temperature gain compensation and a tamper switch. Other beneficial features include site adjustable sensitivity, first-to-alarm memory, low voltage signal and auto self-test. The best PIRs will have dual edge or quad sensing zones and an array that offers a significant number of look down zones, as well as more than one sensing range and the greatest possible number of discrete zones. They’ll have surge and low voltage protection, adjustments letting you alter the range of mask zones, as well as LED-supported latching. A plug-in test meter is an advantage. Once the temperature gets over
Our panel of experts answers your questions.
35C, any PIR is going to be seriously disadvantaged even if temperature compensation is fattening up that tiny pyro signal through an amplification circuit. If things are going to be warm or there will be direct sun on glass, you should think quality dual technology. Dual technology sensors combine a pair of technologies that are sensitive to 2 different types of disturbance – microwave and PIR. The thinking behind this is to ensure that each sensor supports the weaknesses of the other to eliminate false alarms. It works thanks to the intrinsic nature of each of these 2 sensing technologies. PIR elements sense the level of IRE changing between zones over a set time at a set speed. There aren’t many environmental disturbances that mirror this sort of activity – but heat sources, especially warm air currents, spell trouble for PIRs. Microwaves work differently. They cover an area with a signal and then pick up variations between the signal sent and the signal reflected back. It’s called the Doppler shift. Microwave sensor technologies offer strong detection performance – they’ll pretty much detect anything that moves. In terms of dual technology, what’s vital is that PIRs are sensitive to movement across their zones, while microwave devices activate if they pick up a Doppler shift that moves either towards the sensor or away from it. As important as appropriate selection of sensor technology is the correct sensitivity adjustment and walk testing of a sensor onsite. If sensors are left at their factory
settings, they are more likely to false alarm due to over sensitivity that is inappropriate for the size of room they are installed in or because of environmental conditions in the installed environment. Q: What do you think are the right tools for network troubleshooting? Can we use our existing gear, or do we need to expand? A: In some cases, you might not need to reach any further than your trusty multimeter. It goes without saying that cable testing tools like multimeters are just as vital for network cables as they are for coax or 12V DC. You’re going to be looking for things like voltage and impedance – the latter being especially important. Impedance on LANs is resistance that helps control a signal and every cable in which a data signal is being transmitted will incorporate a level of impedance that indicates proper transmission and interpretation of a signal. With resistance you’re looking for points in an electrical path where the passage of current is being restricted or blocked. You’ll be on the hunt for unexpectedly high impedance or very low impedance that might indicate things like a broken or crushed wire, a faulty termination point or an improper pairing of wires in the cable. There should be impedance but neither too much, nor too little. Your first test might be for shorts or open circuits in the wire – you’ll be looking for a lack of voltage (open circuit) or too much resistance (short). You can also test for the presence of stray
48 se&n
SEN821_48help.indd 48
29/7/21 1:24 pm
electrical signals causing noise and also important will be checking the resistance of terminations. A multimeter is a broad term given to a range of test devices that can cost from $A20 to $4000 – the extra cost will give one button functionality, automatic troubleshooting, interface with maintenance and reporting software and a bunch of other good stuff. Depending on the capability of your DMM you may be able to test for circuit noise by pressing a single button, you may be able to save readings for print out or download them via a USB port. Very high end DMMs are valued for their extreme accuracy and while this capability might be great for an electrical engineer, chances are it’s going to be more than you need to measure network integrity as a tech. Another useful tool when troubleshooting networks is the crossover cable, in which transmit and receive wire pairs in a connector have been reversed so a couple of nodes can be linked directly. The beauty of a crossover cable is that it allows the tech to very quickly establish whether or not a network interface card is operational, and this allows you to quickly move on to cabling or devices upstream rather than focusing on a DVR or NVR that might be functioning perfectly. Cable continuity testers are another useful tool when network testing – they’ll allow you to establish whether or not a cable is getting a signal to where it needs to go. The way a continuity tester works is by putting voltage to the conductors at one end of a cable and measuring what comes out the other end. Obviously, a continuity tester consists of a couple of devices including a base mechanism that supplies voltage and the field device that measures voltage at the other end of the cable. LEDs or a beeper will indicate a pass or fail. You’ll need different testers for different LAN types, Fast Ethernet or Gigabit Ethernet, for instance. Some continuity testers will test things like correct pairing, as well as highlighting things like shorts, and crossed wires. You wouldn’t pay any more than a few hundred dollars for a continuity tester but it’s an invaluable tool. Another neat troubleshooting device that can be used as a continuity tester as well as giving you a bunch more functions is
a cable performance tester. This tester will tell you if a cable is carrying more than just current as well as measuring attenuation in a cable, measuring nearend cross talk, measuring the distance to a connected device, termination or cable fault, measuring termination resistance and impedance, issuing pass or fail ratings for various cable types, and showing measurements over the entire length of a cable. At the upper end of cable performance testers there’s also a time domain reflectometer which fires a signal down a cable then measures the way in which the signal bounces back to the TDR before analyzing the results. Any feature of a cable plant that modifies signal amplitude can be analysed by the tester, including things like connectors, crimps, bends, short circuits, mismatched cables, etc. The tester looks at the values of the return signal, including the time it takes to get back to the tester and compares them to the original in order to assess cable faults. TDRs can measure the distance between nodes and segments, which is important if you’re in unfamiliar territory. And if the network is coax, the TDR can report whether or not terminations are clean and functioning at optimum levels. If any elements of the network are fibre-based, you may need an optical time domain reflectometer. Q: A customer has asked if we can protect a safe by detecting and alarming when a person touches the door – the issue is that the safe is located on the secure side of the access control system, but multiple people have access to the area. A: Yes – you could use a capacitance proximity sensor to detect people approaching or touching the safe. Such a sensor would work in a similar way to electrical capacitors which consist of a pair of conductor plates separated by a dielectric – a change in the charge results in a change in capacitance between 2 plates. With capacitance proximity sensors, one plate would be formed by the metal safe being protected, while the other would be formed by an electrical reference
ground plane, which had been established around the safe. The safe will need to be separated from the ground plane using insulating blocks of non-conducting plastic, not wood, so that air surrounds the safe completely and forms the dielectric medium. The way it would work is that the safe would be electrically charged to a potential sufficient to set up an electrostatic field between itself and the air that forms the direct electric medium. The strength of this field would be safe to touch, yet sufficient to cause a change in capacitance that can be detected and used to generate an alarm event if a person closely approaches or touches the safe. When that happens, the electrical conductivity of the person’s body changes the dielectric characteristics of the proximity sensor, and these changes alter the capacitance between the protected object and reference ground so that a threshold is crossed and an alarm event is activated. It’s possible to tweak sensitivity so such a proximity sensor detects a person approaching the safe, or sensitivity can be reduced, so the intruder must actually contact the safe before an alarm event is generated. Proximity detection would be possible up to about 1-1.5 metres from the safe, but that level of sensitivity would be best in high security, low traffic applications. In busy environments, 15cm or direct contact is likely to be the best option if you want to avoid false alarms. n
se&n 49
SEN821_48help.indd 49
29/7/21 1:24 pm
SEEKING PROFESSIONAL SECURITY TECHNICIANS?
Try SEN JobsMarket
events Security Exhibition & Conference & Integrate Date: 18 November, 2021 Location: ICC Sydney Contact: securityexpo@divcom.net.au Diversified Communications Australia is pleased to announce that the 35th edition of the Security Exhibition & Conference in 2021 will for the first time ever, be co-located with our sister show, Integrate Exhibition, Australia’s premier audio visual and integration exhibition.
S E C U R I T Y Security & Government & GOVERNMENT EXPO
Expo 2021
Date: 25 November, 2021 Location: Realm Hotel, Canberra Contact: +61 2 9280 4425 Held in partnership with ASIS ACT, SAGE and the ASIS seminars and ASIS dinner give government security managers and facilities managers, security installers, security integrators, and security consultants, the perfect opportunity to get a look at the latest security technologies at a relaxed one-day event in the nation’s capital.
securityelectronicsandnetworks.com ISC West Date: 22-25 March, 2022 Location: Sands Expo, Las Vegas, U.S. Contact: +1 203 840 5602 Taking place July 19-21 at the Sands Expo in Las Vegas, ISC West looks forward to welcoming the security & public safety industry back to accelerate market recovery and re-define the roadmap ahead.
SecTech Roadshow 2020 Dates: May 2022 Venues: 5 city Australian tour Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow organisers have announced the dates for SecTech 2022 – Perth on May 6 at the Perth Convention Centre, Adelaide on May 11 at the Adelaide Showground, Sydney on May 13 at the Hordern Pavilion, Brisbane on May 18 at the RICC and Melbourne on May 20 at the MCEC.
IFSEC International Date: 17-19 May, 2022 Location: Excel, London, UK Contact: +44 (0)20 7921 8166 IFSEC International is an annual trade fair and conference for the global security industry. Organised by Informa Markets, it is held at ExCeL London alongside FIREX International, Safety & Health Expo and Facilities Show.
SEN821_50events.indd 50
29/7/21 3:21 pm
SEN821_51.indd 1
29/7/21 1:27 pm
now I N T E G R A T E S with Y RIT U SEC UDIO IP A
AXIS
A COCCES NTR S OL
IP CA ME RA
M A N A G EM EN T
VI SI TO R
Camera Station
INTERCOM
Finally, two of the biggest brands in the Australian security market have a high level integration bringing two extremely powerful ecosystems together to form a super - system. Cascade multiple Axis Camera Station servers to create a VMS with 1000’s of cameras Axis Camera Station live video and playback directly in the Integriti window Bidirectional event based control between Integriti and Axis Camera Station Associate cameras, intercoms and audio devices with entities in Integriti system Live video or playback on event or associated entity event from Integriti Control Axis PTZ, including presets from Integriti Trigger commands in Axis Camera Station from Integriti Receive events from Axis Camera Station to trigger events in Integriti Add cameras to schematic maps LPR number plates from Axis Camera Station for access or review Export video clips from Axis Camera Station to Integriti Evidence Vault
SEN821_52.indd 1
29/7/21 1:27 pm