SEN July 2018

Page 1

CEL

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers JULY 2018 ISSUE 400

AT I EBR NG

400

ISSUES

PP 100001158

DEEP LEARNING

SEM0718_1cover.indd 1

lC onvergint Technologies Acquires Integrators Australia rotective Security Policy Framework Reforms Commence lP hat to See at Security 2018 Exhibition and Conference lW ase Study: Ryalex Installs Mobotix at 489 Anytime Gyms lC ase Study: ARM Security Transitions To Bold Manitou lC larm Monitoring: This Month the Future is on Show lA roduct Review: AMC X864 Kit B For LSC Security Supplies lP pecial Report: Cyber Security of Security Networks lS ew Product: Pelco VideoXpert Releases Traffic Report lN pecial Report: Applying Thermal Surveillance Cameras lS

28/6/18 2:04 pm


Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com www.hikvision.com.au

SEM0718_2.indd 1

Facial Recognition

Perimeter Prevention

People Counting

Number Flow Analysis Plate Recognition

28/6/18 9:37 am


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS J U LY 201 8 ISSUE 4 00

By John Adams

THE PAST PREDICTS THE FUTURE PARTICULAR challenge for security people – it doesn’t matter where in the business you sit – is retaining the ability to think with flexibility and be open to new technologies and new ways of using existing technologies. This is especially at issue when you visit a big trade show. There’s an inevitable confirmation bias that leads us to the same brand names, the same product stacks, the same ways of expressing our ideas of what an electronic security solution should be. Trouble is, we’ve reached a point where this sort of thinking is limiting. When it comes to the big annual security show, SEN waxes lyrical about technologies ever on the verge of breaking through. In recent years, this focus has tended generally towards networking and to the avalanche of ‘techvolution’ certain to roll onto us once security solutions reach a state of digitization that pushes collections of solutions beyond their angle of positive stability – the point past which they must turn over. Existing technologies are kinetic, driven forward by engineers, sales teams, satisfied users, complex business alliances and a vast weight of existing installations. All these things create a sort of technological gravity. But the potential for change fuelled by digital transformations continues to press, picking away at established ideas and prying open minds atrophied by decades of more-orless reliability and operational success. The word we used last year to describe the point past which technological development will start to run away was accelerationism. We’re not there yet but this year, that overhang feels

A

Existing technologies are kinetic, driven forward by engineers, sales teams, satisfied users, complex business alliances and a vast weight of existing installations. more precipitous and it’s increasingly multifaceted, coming at us from all directions – posing threats, proffering opportunities, streamlining operations, reducing costs, while enhancing the potential for an increase in total performance. Interesting too, people in the industry are starting to speak its language in flat tones of voice. Over the past 12 months I’ve heard revolutionary talk from mature industry executives in manufacturing, distribution and operations, each with decades of experience. That flat tone expresses acceptance and a readiness to get to grips with what looking back seems like tectonic change – huge yet so slow it’s barely discernible. Only when you look back over a period of 30 years does it become clear how much is different, and much of this difference is foundational. We have gone from one way of doing things to another way – a way which makes us hungry for wonderment and less fettered by old beliefs. The capacity for change and the preparedness to change is a virtue that carries with it huge operational benefits. What is driving the industry forward in multiple layers is a need for higher performance that the processors of the past could not manage, the firmware of the past could not encapsulate, that the comms of the past could not carry, that the management systems of the past could not coherently display, that the end users of the past could not comprehend. What will the electronic security industry be like in another 30 years? It’s very hard to say. There are operational parameters that will remain but it’s increasingly difficult

not to feel the possibilities are wide open. With this disclaimer, it’s certain that the future will include enterprise security solutions of unprecedented power that are mutually self-teaching, ever more capable of sharing and that meld data on a vast scale with less need for human intervention. Managing these systems with integrity will be a fulcrum across which many aspects of our future will swing. Speaking of the passage of time, Security Electronics & Networks Magazine publishes its 400th print issue this month. The magazine has now been published continuously for 37 years, initially as Security Australia Magazine, then incorporated into Security Electronics Magazine back in the year 2000. While SEN published its first issue in October 1998, our editor started out with Security Australia in August 1991, and much to his surprise finds he has written and published 297 monthly security magazines over 27 years. There’s big recognition due to Security Australia’s founder, Hans Laroo, who launched the Australian security industry’s first industry magazine in May 1981, as well as to former Security Australia editor, Rod Cowan, who contributed close to 50 issues in the late 1980s and early 1990s, engaging with key industry issues in a way not equalled since. Many thanks to our regular readers and contributors, as well as to our advertisers, some of which have been partnering with us for decades. Publishing has devolved into a splintered business – we reach the market every way we can. But when drowning in a digital river of noise, print remains the quietest channel. n

se&n 03

SEM0718_3ed.indd 3

28/6/18 3:11 pm


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM0718_4_5.indd 4

28/6/18 2:07 pm


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM0718_4_5.indd 5

28/6/18 2:07 pm


3RD

SECURITY & GOVERNMENT EXPO W W W. S E C U R I T YA N D G O V E R N M E N T E X P O . C O M . A U F O R F U R T H E R I N F O R M AT I O N C O N TA C T M O N I Q U E K E AT I N G E O N 0 2 9 2 8 0 4 4 2 5

MEDIA PARTNER

EXHIBITORS

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

SAGE DPS AD_JUL18.indd 6

28/6/18 2:08 pm


FREE EVENT

REGISTRATION OPENS 1ST AUGUST, 2018

November 8, 2018 Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital from 12-6pm.

ASIS seminars 9am - 4pm Free refreshments 3.30 – 5.30pm

Enquiries please contact Monique Keatinge +612 9280 4425

SAGE DPS AD_JUL18.indd 7

28/6/18 2:08 pm


22

10

38

there’s cutting technology tucked away in far flung corners if you take the time to discover it. 34: FIT FOR PURPOSE

JULY 18 10: CONVERGINT TECHNOLOGIES ACQUIRES INTEGRATORS AUSTRALIA CONVERGINT Technologies has announced the acquisition of Integrators Australia, a systems integrator based in Port Melbourne, Victoria, Australia. 12: PROTECTIVE SECURITY POLICY FRAMEWORK REFORMS The new PSPF commences on July 18, with some transition until Oct 2020. The changes were prompted by the Belcher Review into whole of government regulation, which found that the PSPF was inefficient, unclear, inaccessible, contributed to over regulation and a culture of risk aversion. 20: WHAT TO SEE AT SECURITY 2018 Security 2018 Exhibition and Conference is Australia’s biggest annual security event – with more than 100 exhibitors you really get to see what’s going on in the industry in a manner deep and wide. There’s plenty to see on the stands of the big manufacturers and distributors but

SEM0718_8cont.indd 8

Ryalex has installed a MOBOTIX video surveillance solution for 489 Anytime Fitness Gyms across Australia. The solution combines MOBOTIX Cameras, RemoteGUARD video monitoring and the MOBOTIX MxMC video management system. 38: TRANSITIONAL FORM ARM Security has transitioned its Grade 1A monitoring station to Bold Manitou and in the process has enhanced operational efficiencies and empowered operators, while offering customers a far superior monitoring capability. 50: AMC X864 ALARM KIT Recently, LSC’s AMC X864 Kit B arrived at the SEN office for testing – the kit includes the control panel, a touch screen keypad, 3 x Smile 20P pet digital PIRs, internal and external sirens. But the best feature is the free AMC MANAGER App. 56: SECURING SECURITY NETWORKS As electronic security solutions become more dependent on network infrastructure, the ability to secure them from cyber security attacks becomes more pressing. The challenge for installers, integrators and end users is embracing the fact that cyber security, like physical security, is an operational imperative that never ends.

28/6/18 3:57 pm


34

70

48

62

regulars

60: TRAFFIC REPORT Pelco VideoXpert offers traffic managers a wide array of tools to reduce congestion and accidents, including the ability to sense when traffic slows to a crawl and notify a traffic manager a section of road is congested or gridlocked, allowing measures to be taken to improve the situation. 62: APPLYING THERMAL CAMERAS Thermal cameras continue to make headway into the electronic security space, driven by falling prices and the capability to feed intelligent video surveillance solutions intrusion detection events virtually free of false alarms. But while thermal has great power, it needs to be installed thoughtfully to ensure operational outcomes are met.

CEL

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

EBR

JULY 2018 ISSUE 400

AT I N G

40 0

ISSUES

PP 100001158

DEEP LEARNING

SEM0718_1cover.indd 1

l Convergint Technologies Acquires Integrators Australia l Protective Security Policy Framework Reforms Commence l What to See at Security 2018 Exhibition and Conference l Case Study: Ryalex Installs Mobotix at 489 Anytime Gyms l Case Study: ARM Security Transitions To Bold Manitou l Alarm Monitoring: This Month the Future is on Show l Product Review: AMC X864 Kit B For LSC Security Supplies l Special Report: Cyber Security of Security Networks l New Product: Pelco VideoXpert Releases Traffic Report l Special Report: Applying Thermal Surveillance Cameras

28/6/18 2:04 pm

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

10: NEWS Latest business, product and technical news from Australia and around the world. 48: MONITORING Smart Home systems, incorporating automation and security functionalities are continuing to grow at furious speed, with interest from big network players, as well as the insurance industry, adding heat to a sector already on fire. 70: EDITOR’S CHOICE What’s new from our manufacturers. 72: HELPDESK Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: taniasdesign@ optusnet.com.au Subscriptions 11 issues per annum One year (11 issues) Australia 11 months A$110.00 (incl GST) 22 months A$195.00 (incl GST)

Overseas 11 months A$220.00 22 months A$440.00 WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM0718_8cont.indd 9

28/6/18 3:57 pm


Protective Security Policy Framework Reforms Coming p.12 Seadan Security Investing in Next Generation of Security Professionals p.14 Sydney Trains Seeks Cloud-Based Portable Duress Alarm for 2500 Staff p.16 Axis Communications Opening Office For Software R&D p.18

NEWS IN BRIEF J U LY 2 0 1 8

COMPILED BY JOHN ADAMS

CONVERGINT TECHNOLOGIES ACQUIRES INTEGRATORS AUSTRALIA n CONVERGINT Technologies has announced the acquisition of Integrators Australia, a systems integrator based in Port Melbourne, Victoria, Australia. Convergint Technologies is a global, industryleading systems integrator that designs, installs, and services electronic security, fire alarm, and life safety systems, and continues to grow its global footprint via organic growth and acquisition. Integrators Australia is Convergint’s second international acquisition in 2018 and

provides Convergint with a physical location and a group of experienced colleagues to expand its services in the local market. “Acquiring Integrators Australia is another major step in building out our global service platform,” said Ken Lochiatto, CEO of Convergint. “The addition of Integrators Australia greatly expands our presence in the Australian market and strengthens our ability to meet the service needs of our global customers in Australia. We welcome Dean Monaghan and his entire team to the

Dean Monaghan (left) of Integrators Australia and Ken Lochiatto of Convergint Technologies

Convergint organization.” Founded in 2005 by Dean Monaghan, Integrators Australia is one of the largest independent integrators in Australia, servicing key clients across both Australia and New Zealand. Convergint chose to join forces with Integrators Australia because of its dedication to excellent customer service, a key component of Convergint’s own culture. “We are very excited to become a part of Convergint Technologies, in which we have found a like-minded culture of service-first delivery,” said Monaghan, managing director of Integrators Australia. “It has taken 13 years of dedication from our entire group to reach the strong level of capability and expertise that we offer today, and joining Convergint marks the next step in our evolution.”

KBC NETWORKS PARTNERING WITH BGW TECHNOLOGIES AT SECURITY 2018 n KBC Networks will show its full range of transmission solutions at Security 2018 Exhibition and Conference July 2527 in partnership with exclusive local distributor, BGW Technologies. “We look forward to partnering with BGW Technologies to launch several new, unique and innovative transmission products this year,” said Domenic Isola, director at KBC Networks for the APAC region. “Security 2018 Exhibition and Vlado Damjanovski Conference will be one of the avenues where we present KBC’s portfolio of solutions to the security industry.” Local and

international experts from KBC and BGW Technologies will be on stand C40 to present the latest solutions for secure data transmission over public and mobile networks with ThruLink, extended Ethernet over Coax or UTP with eCopper, as well as a wide range of industrial Ethernet switches, SFPs and media converters, wireless, and fibre optics and other industrial transmission and power solutions built to perform in virtually any environment. BGW Technologies offers a full range of KBC products across its branches nationally.

IP INTERCOM MANUFACTURER 2N – AN AXIS COMPANY EXPANDS LOCAL SUPPORT n HIGH-end IP intercom manufacturer 2N has a new representative handling the Australian market, Sean Kim, whose responsibilities range from sales support to Sean Kim

business development. According to Sean, the 2N product range includes SIP intercoms, IP access control, SIP audio, lift systems and GSM gateways. Many in the electronic security industry will recognise 2N’s bright orange 2N IP Safety intercom stations but Sean said there’s much more in the 2N product stable. “We are the only company that has an IP69k and an IK10-rated intercom range and we have comprehensive integrations to VMS, SIP, IP phones, access control solutions and home automation systems,”

Sean said. A key element of 2N’s integration capability is the Open platform (ONVIF, SIP, HTTP command) nonproprietary solution and working closely with its wide range of vendor partners. “These include Milestone, Genetec, Avigilon, Digifort and Exacqvision in the VMS market, while in the SIP IP phone market we work with Cisco, TIPT (Telstra IP Telephony, cloud-based), Avaya and Siemens” Sean said. “When it comes to home automation, we work with Control4, Savant,

Crestron, Leviton, while in the area of access control, we support any access controller with Wiegand output.” Sean said he was delighted to be onboard with 2N and was looking forward to the challenges of assisting distributors expand the local business. Axis acquired 2N on May 2016 - the full name of the company is 2N – An Axis Company – and direct distributors in Australia are Alloys, Anixter and Hills. At the time of its acquisition by IP video pioneer, Axis Communications, 2N was

already considered the number one player in the field of SIP intercom,SIP Audio (PA system) and had expanded its product range into IP Access control and IP Lift controllers. “2N has well-established sales channels through electricians and telecom installers, as well as lift manufacturers, which serve as a complement to Axis’ present global sales channels - at the same time 2N and its customers benefit from Axis’ strong market position and R&D resources,” said Peter Lindström, vice president new business at Axis Communications.

10 se&n

SEM0718_10news.indd 10

28/6/18 2:13 pm


Stay Untouched. And Secure Your Security. www.cactusconcept.com

At MOBOTIX, we have developed the unique cactus concept for a reliable and complete protection of end-to-end video security systems. Protect yourself against serious hacker attacks – with an intelligent video system that is ready to go, but can also stand up to the ever evolving challenges of our world. Stay untouched with MOBOTIX! SECURITY Exhibition + Conference 2018

SEM0718_11.indd 1 mx_Ad_en_180201_CyberSecurity.indd 1

July, 25 – 27 / Booth E14

Melbourne Convention & Exhibition Centre

28/6/18 am 02.02.189:37 11:52


NEWS J U LY 2 0 1 8

PROTECTIVE SECURITY POLICY FRAMEWORK REFORMS COMING n ASIS International ACT Chapter breakfast presentation has explained some of the changes coming to government security with the review of the Protective Security Policy Framework, set for release in July. The new PSPF commences on July 18, with some transition until Oct 2020. The changes were prompted by the Belcher Review into whole of government regulation, which found that the PSPF was inefficient, unclear, inaccessible, contributed to over regulation and a culture of risk aversion. Core requirements will be reduced in number from 36 to 16, supporting requirements will reduce from 2200 controls and 800 pages and 29 documents,

to approximately 100 controls, 150 pages and 16 documents. The AttorneyGeneral’s Department in consultation with stakeholder entities reviewed the PSPF in 2016 in response to recommendations from the Independent Review of Whole-of-Government Internal Regulation. In May 2017, the proposed suite of PSPF reforms were endorsed by the Secretaries Board. The presenter at the ASIS breakfast was Doug Rutherford from the Attorney General’s Department’s Protective Security and Fraud Section. The PSPF provides policy, guidance and better practice advice for governance, personnel, physical and information security.

The 36 mandatory requirements assist Agency Heads to identify their responsibilities to manage security risks to their people, information and assets. Non-corporate Commonwealth entities are required to apply the

PSPF as it relates to their risk environment. It is best practice to do this through a security risk management approach, with a focus on fostering a positive culture of security within the entity and across the Australian Government.

THE PSPF PROVIDES POLICY, GUIDANCE AND BETTER PRACTICE ADVICE FOR GOVERNANCE, PERSONNEL, PHYSICAL AND INFORMATION SECURITY.

GENETEC GROWS PRESENCE IN APAC AND ANZ WITH STRATEGIC PARTNERSHIP AND BUSINESS DEVELOPMENT APPOINTMENTS n GENETEC has announced new appointments to its growing Asia/Pacific (APAC) and Australia / New Zealand (ANZ) regions, with Philippe Ouimette taking an

Daniel Lee

expanded role as director of strategic partnerships, and Tiago Ferreira joining Genetec as business development manager in ANZ. After serving as country manager for the ANZ / Oceania region, Ouimette is taking on broader responsibilities to develop and lead new strategic commercial ventures in APAC. Ouimette will oversee new business alliances and technology partnerships across all APAC regions, and other parts of the world, to expand the Genetec vision of delivering enterprise-

grade unified security solutions. Tiago Ferreira joins Genetec in the ANZ region bringing 18 years of extensive operational experience from working in law enforcement at both national and international levels. Ferreira has years of experience in coordinating a whole-ofgovernment approach in leading investigations related to human trafficking, cybercrimes, child protection, counterterrorism, Interpol and community crime prevention. In his role,

Ferreira is working closely with ANZ municipalities and government organizations to cultivate and win strategic accounts, help guide integrators and endusers to build a worldclass unified security system and grow partner relationships in ANZ. “We are experiencing aggressive growth in the APAC region, and by expanding regional strategic partnership responsibilities for Philippe Ouimette and adding Tiago Ferreira as business development manager to our ANZ

region, we are well aligned to address and cultivate market demands for growth and penetration in APAC,” said Daniel Lee, Genetec’s managing director for APAC. “Genetec will attend ASIAL Conference 2018 in Melbourne Australia, July 25-27th on Stand D-8. All attendees are invited to schedule an appointment to meet Philippe and Tiago, and discuss current trends and issues in physical IP security, and get demonstrations of the latest open-architecture security innovations from Genetec.”

You’ve got a sexy front end and a sophisticated back end.

But you still need a reliable lock on the door!

www.sprintlocks.com Email: security@sprintlocks.com EN1634 2-hour fire resistance

China prices + British quality control = Unbeatable value!

12 se&n

SEM0718_10news.indd 12

28/6/18 2:13 pm


Intelligent buildings. Future enabled. Built on cloud-based technology, the UltraSync system allows you to remotely monitor, manage and automate building or home security systems, lights, thermostats and locks, from your smartphone or tablet. Also demonstrating the latest version of TecomC4, Interlogix will showcase the Tecom portfolio and how it continues to evolve to meet the needs of modern businesses.

Visit the Interlogix team at Booth C14 for the latest innovations in security management.

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security. Š 2018 United Technologies Corporation, Inc. All rights reserved.

InterlogixAd_July2018-DRAFT.indd 1 SEM0718_13.indd 1

25/06/2018 1:30 am pm 28/6/18 9:37


NEWS J U LY 2 0 1 8

SEADAN SECURITY INVESTING IN NEXT GENERATION OF SECURITY PROFESSIONALS

PCSC offers the world’s first Fault Tolerant (FT) controller series creating the highest level of reliability with its automated process of system recovery for access control, alarm monitoring and output control systems. With Safetrust, users can store an unlimited number of Access Cards, Authentication Credentials, Payment Cards and more, all in a highly secure wallet, on their mobile device. INS Global Biometrics and readers offer Style & Security with low profile and highly aesthetic finish, the readers are a perfect choice for modern commercial and high rise residential installations.

CHASE SECURITY SOLUTIONS SPECIALISES IN... • • • • •

Access Control Systems Access Cards & Mobile Credentials Mifare & DESFire, HID, Indala, Keri, Farpointe Remote Building Access Management Biometric Readers

Sales@chasesecurity.com.au P: 1300 79 33 16 www.ChaseSecurity.com.au

n SEADAN Security, which recently celebrated its 31st year of operation, reports the company is now in its 14th year of partnering with Box Hill Institute of TAFE’s Certificate 3 courses, as part of a strategy of investing in the next generation of electronic security installers and integrators. “In 2004 Seadan Security first offered complimentary training to Box Hill institute’s Security Certificate 3 students in addition to sponsoring prizes and recognition rewards for a couple of their most promising students,” said Seadan’s Ian Harris. “These awards were later recognised to be Apprentice of The Year and Most Improved Student, and regular training sessions have continued ever since. On average students at Box Hill Institute receive 2-3 training and professional development sessions per year incorporating CCTV, locking, intercom and access control. “In relation to CCTV, students are given an overview of a typical CCTV system with much of the jargon explained and deciphered in addition to developing an understanding of HDCVI and IP systems along with their features and benefits. They also receive a review touching on the history of locks and locking with detailed educational information on

the anatomy of a standard lock with greater emphasis placed on electric locks. “When it comes to intercoms, much of the session is aimed at explaining the differences between analogue and IP systems, while the access control component provides students with a number of basic access control devices before they are introduced to more sophisticated units such as the Rosslare 2 and 4-door controllers, and other IP-based and networked solutions. By the conclusion of the session, students have a deeper understanding of general security products and their associated functions.” According to Harris, Seadan Security appreciates the importance of giving back to the industry it serves. “The directors see their position in the market as incorporating a responsibility to ensure that the next generation of security professionals is more skilled and knowledgeable that the previous generation,” he said.

BY THE CONCLUSION OF THE SESSION, STUDENTS HAVE A DEEPER UNDERSTANDING OF GENERAL SECURITY PRODUCTS AND THEIR ASSOCIATED FUNCTIONS.

14 se&n

SEM0718_10news.indd 14

28/6/18 2:13 pm


SEM0718_15.indd 1

28/6/18 9:36 am


NEWS J U LY 2 0 1 8

SYDNEY TRAINS SEEKS CLOUD-BASED PORTABLE DURESS ALARM FOR 2500 STAFF n SYDNEY Trains is seeking to provide 2500 staff with the capacity to use smartphones as a platform for a portable duress alarm (PDA) Service. When the PDA application is activated, a notification must be sent via the contractor’s PDA service

to the Security Operations team at Sydney Trains, which provides information on the user’s location, contact details and the nature of the incident, in a monitoring portal supplied by the contractor. Additional support services are also being sought, including

the provision of training videos, a help desk, and reporting and analysis services. Proposals are invited from qualified suppliers to provide the PDA Service, which consists, amongst other things, of the following elements: • An Application (the

PDA application) that is available on a user’s smartphone (Android or iOS) and allows the user to notify Sydney Trains Security Operations and/ or police and emergency services (000) of an incident • The PDA application will allow users to be tracked, in a defined work location, and/or to notify security operations that they are working in an isolated working mode * When a user activates the application, it will generate a notification to security operations which provides the user’s name, phone number and identity, as well as the type of incident that has occurred • A system that receives the notification and displays it as an alarm to security operations at

Sydney Trains using a monitoring portal, hosted by the contractor, or the contractor’s third party. • Potentially, the inclusion of a wearable device that can be used to remotely operate the PDA Application on the user’s smartphone. The intention is that, when at work (in defined work locations), the staff can either use the wearable (if procured), operate the PDA application directly, or use the smartphone (as a phone), to contact 000 or Sydney Trains Security Operations. The procurement will be conducted using a procure IT contract, a draft of which is included in the RFX documentation. The tender closed on July 9, 2018.

16 se&n

SEM0718_10news.indd 16

28/6/18 2:13 pm


We can help you

INTEGRATE

Solve the technology integration puzzle with Hills and these best-in-class solutions

25-27 JULY 2018 MELBOURNE CONVENTION & EXHIBITION CENTRE

Visit us on stand C2 For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

SEM0718_17.indd 1

E N T E RTA I N

SECURE

28/6/18 9:36 am


NEWS J U LY 2 0 1 8

C R KENNEDY SIGNS STRATEGIC PARTNERSHIP AGREEMENT WITH ZHEJIANG UNIVIEW TECHNOLOGIES n C R KENNEDY and Zhejiang Uniview Technologies signed a strategic partnership agreement at the Zhejiang - Australia Trade and Investment symposium in Sydney recently. Uniview is China’s 3rd largest manufacturer of video surveillance equipment and now Top 5 in the world overall – its revenue last year exceeded

AXIS COMMUNICATIONS OPENING OFFICE FOR SOFTWARE R&D n AXIS Communications will open an R&D office for software development in Linköping in Southern Sweden in May and plans to employ around 100 staff on software development within 2 years. “Axis is a growth company. Our strong focus on research and development is one of the cornerstones of our success. As we are growing rapidly, we have to look outside Lund to recruit the required competencies at the rate we need,” says

Darren Banks

Kenneth Jonsson, vice president R&D at Axis Communications. During 2017, Axis generated sales of just over SEK 8.6 billion (just under $US1 billion), of which more than 18 per cent was reinvested in R&D. At Axis headquarters in Lund, more than 1000 people work with research and development of new products and solutions in areas such as network video, access control systems, audio systems and video analytics. At the office in Linköping,

software development will be in focus. The operations in Linköping will be started in cooperation with the consulting company HiQ. “We see many benefits of having an office in Linköping, where we find a combination of a good university and a well-functioning business community. This gives us a good basis for finding the right competencies and for pursuing successful R&D operations,” says Jonsson.

$US480 million and continues to grow rapidly. “This agreement further cements the already very strong relationship between our 2 companies which has built up over the past 3 years,” Uniview vice president Kai Lin said. “We see great opportunities and a very bright future in store for both companies in Australia and New Zealand.”

ICT APPOINTS HARRIET DUNN REGIONAL SALES MANAGER, QUEENSLAND

Harriet Dunn

n ICT has appointed Harriet Dunn to the role of regional sales manager (Queensland). Dunn first joined ICT’s admin team, transferred to customer services and then took on an NZ sales role in early 2014. Company growth provided a shift in focus to the lower North and the South Island regions, which saw Harriet relocate to Christchurch in 2016, then to Wellington in 2017 to support and contribute towards developing new business opportunities across the country. “As the company continues to expand, a key focus is supporting the growing Australian market and we are delighted that Harriet is taking on her next adventure and

has made the move to Queensland,” said ICT’s Richard Hawker. “Harriet’s love of people and background in providing outstanding service to ICT’s clients has made her a very popular asset within the sales team. When added with her knowledge of ICT products and passion for demonstrating the opportunities an ICT solution provides, she is well equipped to take on the challenge of a new role and a new country.”

AS THE COMPANY CONTINUES TO EXPAND, A KEY FOCUS IS SUPPORTING THE GROWING AUSTRALIAN MARKET...

18 se&n

SEM0718_10news.indd 18

28/6/18 2:13 pm


Meet the Bosch Transformer & discover our best kept secrets at Security 2018

Rethink and transform the way you see security. Experience our unique solutions by visiting the Bosch Technology Room at the show.

Directions to upstairs Hospitality Suite 5.201: Enter through door 9 (opposite the Bosch Transformer), turn right and take the stairs near the Organiser's Office to Level 1.

Cloud-based Services • Video Monitoring

Bosch VMS

Camera Technology

Maximum Resilience Direct to iSCSI Recording Intelligent Streaming Class-leading Forensic Search

• Virtual Assistant

• • • •

IVA in Action

Intrusion Alarm Systems

AVIOTEC

• Smart Traffic Solutions • Health & Safety Applications • Customer Service Analytics

• G Series • Solution Series • Intrusion Cloud Integration

• Video-based Smoke and Fire Detection

• Alarm Verification & Intervention

WIN

For a chance to a Bosch Power Tool*:

1

Show us your selfie with the Bosch Transformer

2

Attend a demo in the Bosch Technology Room

3

Enter the draw

ONE EVERY HOUR*

• Intelligent Bitrate Management • Intelligent Tracking with PTZ Touring • Fusion Metadata

Visit SONY at the BOSCH Technology Room

• 4K Camera • Panoramic 360o • Compact Transport Camera • Dual Light Camera

*Prizes will be drawn between 10am - 4pm on Wednesday 25th and 10am - 3pm on Thursday 26th July 2018. Images used for illustrative purposes only. SEM0718_19.indd 1 Untitled-1 1

28/6/18 9:36 27/06/2018 6:14:26 PMam


● Special report

Security 2018 Preview

BY J O H N A D A M S

WHAT TO SEE AT SECURITY 2018 Security 2018 Exhibition and Conference is Australia’s biggest annual security event – with more than 100 exhibitors you really get to see what’s going on in the industry in a manner deep and wide. There’s plenty to see on the stands of the big manufacturers and distributors but there’s cutting edge technology tucked away in far flung corners if you take the time to discover it.

20 se&n

SEM718_20show preview.indd 20

28/6/18 2:48 pm


SEM0718_21.indd 1

28/6/18 2:12 pm


● Special report

Security 2018 Preview

ECURITY 2018 is going to be an interesting show – the electronic market seems to be leaning in on some key technologies, while evolution in other areas is delivering great operational results. There are also always some quirky new things at the show – there are small companies operating without much money which are at the bleeding edge of new technology and it’s well worth keeping an eye on what they are up to. SEN will undertake its usual detailed review of new products and technologies in the post-show issue, so this month we’re going to take a run-through of what we think will be interesting this year. Genetec will demonstrate its unified, open architecture, IP security platform, Security Center (5.7) featuring enhanced privacy protection addressing new GDPR regulations, with new cybersecurity protections and a new reporting feature that automatically alerts system administrators to outdated camera firmware. The company will also showcase new Synergis features and hardware designed to unify access control and intrusion monitoring, along with new models of the Genetec Streamvault security appliance product line, with local support and streamlined delivery for the ANZ region. The company will feature its Genetec Trust Center, a repository of educational materials focused on cybersecurity, privacy, and risk analysis, created to help systems integrators and customers understand trusted best practices keeping people and organisations safe from cyber espionage, hacking, and unauthorized takeovers. Genetec is always coming up with some new piece of functionality designed to serve key verticals – they’ll be looking at Traffic Sense and Airport Sense – solutions that provide collaborative insights and intelligence to meet the explicit needs of cities and airports. Geutebruck Pacific will be showing off its enterprise level software platform – GSIM (Security Information Management), which will highlight

S

the interoperability of a wide range of 3rd party products along with a long list of integrated hardware devices. Along with some of the most widely utilised network video recorders within the security and surveillance industry, Geutebruck is also demonstrating its latest advancements with operational systems, including Live Face Match and Automatic Licence Plate Recognition, which work seamlessly within the G-SIM platform. An area of significant growth for the business is within the logistics space with Geutebruck being able to provide end to end functionality for a wide range of business applications which involve, transport, packaging, warehousing, stock rotation, object counting and stevedoring. Hanwha Techwin, distributed by EOS, has released new 30fps 640 x 480-pixel thermal cameras with a range of lenses that offer highperformance imaging quality even in the most extreme weather conditions like complete darkness and the presence of airborne obscurities such as fog, especially in areas where micro dust is so dense that objects cannot be identified. Thermal is great for big sites – ports, solar farms – but it’s under-utilised internally, in locations where privacy is paramount, as well as in applications like fire detection, where it offers serious promise. Something else I want to see is Paessler AG’s PRTG Network Monitor, which the company says is a powerful, affordable and easy-to-use unified monitoring solution for monitoring IT infrastructure that’s ideal for protecting today’s networked security solutions. FLIR Systems always brings a tip-truck load of new stuff to the big show – this year we want to see the new multi-spectral Saros Dome, part of a 6-model product family of new outdoor perimeter

22 se&n

A good clean live stream

SEM718_20show preview.indd 22

28/6/18 2:48 pm


COMMUNICATION SOLUTIONS for any environment

is

x tA a N

Vertical Specialty # 8 - Truck Entry Point

it 2 s i V nd sta

8 2 D

#

2N - An Axis Company, Melbourne VIC 3000 Australia

SEAN KIM ANZ Sales & BDM sean@2n.cz 2N Telekomunikace a.s. Pod Vinicí 20, 143 01 Praha 4, Czech Republic / Sales: +420 261 301 500

SEM0718_23.indd 1

28/6/18 2:12 pm


● Special report

Security 2018 Preview

security cameras. Saros dome combines patented and patent-pending technologies in a unified solution for accurate alerts and verified alarm data for outdoor commercial perimeters. In case you’re not interested yet, consider Saros Dome integrates multiple technologies in 1 device, including 2 lowcost FLIR Lepton thermal sensors supported by advanced onboard analytics, IR and visible LED illuminators, 2-way audio and digital input/outputs, and the choice of a 1080p or 4K video camera. Integration with central alarm monitoring stations will also expand opportunities for enterprising installers. The Bosch Experience Room (Hospitality Suite 5, Lvl 1), is also going to be worth visiting. A major release is MIC IP Fusion 9000 with thermal and optical imaging with fused metadata for full situational awareness, intelligent tracking and geolocation. Bosch Intelligent Video Analytics will also be in action for retail, people counting, tracking objects while moving, idle objects and traffic analytics. Bosch’s latest VMS seamlessly integrates devices across any IP network, and features key differentiators like forensic search, intelligent bitrate management and intelligent auto exposure.

Something else to check out is Bosch CloudBased Services for video verification and remote intervention capabilities, as well as the AVIOTEC video-based fire detection camera. Sony Video Security will be demonstrating its key camera range with the 4K, dual light, new 360-degree panoramic and the compact transport cameras. Big distributor ISCS will showcase leading brands from the technology industry, including long range identification experts Nedap, access control masters HID Global and ICT Protege, IoT solution provider Bluvision, video security specialists AliusVision, Sony Cameras and NX Witness. The ISCS team will also be showing integration between multiple platforms, including video solution provider NX Witness, access control provider ICT Protégé, Nedap long range readers and HID’s Bluvision BluFi RTLS. Hikvision is going to be showing its Deep Learning solution at Security 2018 – the company is investing plenty in an area it believes will be the key to intelligent buildings and smart cities. Hikvision’s Facial Recognition technology harnesses Deep Learning AI in public venue settings. When a person of interest enters a venue, Hikvision’s facial recognition technology instantly recalls their face and initiates access control, personalised services and more – with a face-capture rate of up to 95 per cent accuracy and face-comparison accuracy rate of 98 per cent. The sophisticated algorithm and highperformance GPU generate more accurate VCAs and faster computing over conventional systems at financial institutions, casinos and critical government infrastructure sites – along with public spaces like airports and stadiums. Hikvision says that anywhere there is a crowd this technology improves profits while protecting patrons. Hikvision says that unlike its competitors, the company embeds its facial recognition algorithms within its cameras and recorders, so no PC server is needed. This means less delay in transmission, decreasing the burden on back-end devices, while

24 se&n

SEM718_20show preview.indd 24

28/6/18 2:48 pm


MORE THAN A COLLECTION OF BRANDS MORE THAN A COLLECTION OF BRANDS MORE THAN A COLLECTION OF BRANDS

AN ARA PRODUCTS COMPANY AN ARA PRODUCTS COMPANY AN ARA PRODUCTS COMPANY

SEM0718_25.indd 1

1300 111 010 1300 111 1300 111 010 010 www.iscs.com.au www.iscs.com.au www.iscs.com.au

28/6/18 2:10 pm


● Special report

Security 2018 Preview

retaining the ability to fast-track through oceans of data to find the small amount that is critical – something hugely appealing to customers. UTC will be showing a new cloud connection called UltraSync, a secure, cloud-based environment that gives users a simpler way to connect and manage their security systems. UTC says with the UltraSync system, you can manage multiple sites through a single application. It also allows you to define different levels of access for different people and you can create personalised schedules that allow access to selected parts of your building at designated times and on designated days. Also available on the ZeroWire security platform, UltraSync gives you a home automation solution that is reliable, future-ready and scalable. UltraSync allows users to remotely automate their security, lights, thermostats, locks and more from their smartphone or tablet. Interlogix will also soon release UltraSync for the Tecom Challenger platform, giving you the ability to monitor your security system via the secure UltraSync cloud. At Security 2018 2N – An Axis Company will focus on 2 verticals - 4G intercom for highway/ freeway for emergency call points that have no fibre connection where it would be difficult to run cables, and existing multi-apartment complex transitions from analogue to IP with home automation as add-on feature. You can check out 2N at Axis and the Hills stand, where it will show integration to Genetec focusing on Car Park and Health verticals, and the Alloys stand for integration to home automation, including Leviton and Fibaro. MOBOTIX will be revealing its new MOVE line of cameras, as well as showcasing its latest integration and technology partnerships, reflecting the emerging culture of openness within the company. The MOBOTIX MOVE series offers

standard PTZ, motorized varifocal lenses and WDR for the first time. All 4 MOVE models are ONVIF G compliant, come with integrated IR illumination and can deliver up to 3 streams of H.264 simultaneously. Also, on the stand will be the just-released second generation flagship Mx6 camera, with integrated MxBus functionality. This 2-wire cable system developed by MOBOTIX is encrypted against cyberattacks and expands camera functions by including practical additional MOBOTIX modules such as the MX-GPS-Box, a reliable time server for a complete video system. Seadan Security & Electronics will be displaying a number of solutions as opposed to product-only displays. You’ll see Dahua’s number plate recognition solution and people counting system, which keeps an accurate record of entries and exits when placed over a doorway, as well as Dahua’s mobile solution and body worn cameras. Seadan will also be showing the Kantech access control system and its integration with the exacqVision server and software. Alarm, access control and locking gear on Seadan’s Stand J39 includes Risco, Rosslare, FSH, Assa Abloy and U-Prox range of products. Axis Communications will also display endto-end solutions for key segments - from a smart system for basic surveillance to a more advanced system for security on a larger scale, which also features network audio systems and access control solutions. But I’m also going to be very keen to see the new AXIS Q3518-LVE which delivers 4K, and the stainless-steel AXIS Q3517-SLVE, which delivers 5 MP, at 30 fps with outstanding image quality in challenging light conditions. The new cameras include support for Axis OptimizedIR illumination, Forensic WDR and Lightfinder technology, and Zipstream. Sensatek will be displaying IPConfigure, which offers a variety of Windows or Linux browserbased and seamlessly support unlimited cameras, locations, and users in a centralized, distributed, or hosted architecture. IPConfigure’s Orchid & Enterprise Surveillance Manager VMS platforms, License Plate Recognition, and SteelFin Appliances have been successfully deployed in facilities ranging from quick service restaurants to international ports, hospitals, and universities. New to Australia and well worth a look. Imagus, which is distributed by BGW Technologies, will be on the Milestone stand showing off its advanced face recognition solution fully integrated in Milestone XProtect. In addition to live recognition capability from low quality surveillance video, and due to the way the Imagus solution operates, it has the ability to instantly find an unknown face through its historical search features from prior analysed video CCTV footage. This enables cross matching of unknown faces in time and location. Camera settings and configuration are also housed within Milestone, so the user experience is seamless. As we saw at SecTech Roadshow Camera Shootout, the ability to drag and drop images into the historical

26 se&n

SEM718_20show preview.indd 26

28/6/18 2:48 pm


SEM0718_27.indd 1

28/6/18 2:10 pm


● Special report

Security 2018 Preview

search area also gives users a seamless experience and enhances forensic searching. Chase is showing Safetrust at the show, a solution that makes a mobile device even more powerful. With the simple tap of a smartphone, Safetrust enables people to identify themselves electronically, gain access to buildings, online and physical resources, and protect their privacy. The consolidation of these credentials significantly reduces the cost of delivery, improves the security of the credential, merges online and physical identification and provides a win-win solution for the constant battle between security and convenience. The solution also supports a large range of connected and stand-alone systems including building access, car park entry/exit and entry/ lock systems. Options include the SABRE DECAL/ READER COVER which requires zero change to an existing infrastructure, the SABRE INLINE/RELAY/ READER which is designed to augment an existing infrastructure, and reader replacements provided by technology partners. CSM will be showing many products from its big range, including IndigoVision, Vesta, AARC, Honeywell, Comelit, TVT, Crow and many more. Something to note is the Crow TouchScreen kit with virtual keypad, arm/disarm multiple sites, bypass, output control, event retrieval, push notifications, customised text, real-time zone status, and personal and remote monitoring. Inner Range has had a huge year of development resulting in a large selection of new products and

features at Security 2018. See the new vector-based Inner Range Schematic Maps with animated graphics, Integriti License Plate Recognition integration, new Inner Range Mobile Reader App, Integriti Guard Tour module, new SkyCommand App, new PrismaX Keypad and the new expanded T4000 Alarm Communicator. Inner Range says this range of new products and features is a demonstration of the company’s unrelenting commitment to the research and development of highly relevant and highly functional security products that deliver real world security solutions for real world security problems. Dahua will be displaying its latest products and integrated solutions at the 2018 Security Expo including Dahua Artificial intelligence devices, drone solutions, AV products such as large LED walls, 800m ePoe solutions, IoT devices as well as retail, parking and mobile solutions. A standout product is the IPCHF8242F-FR camera which includes human facial feature extraction, real-time facial snapshots, and a comparison database of up to 10,000 face images and 5 libraries that are stored on-board. An additional feature the IPC-HF8242F-FR offers is accurate, real time facial analysis that includes 6 types of facial features. These include age, gender, expression, glasses, mouth mask, and moustache and 5 types of expressions including happy, normal, surprised, sad, and rage. At the CR Kennedy and Uniview stand you’ll see Super Starlight cameras with exceptionally low light performance at 60 Frames per second to capture fast moving detail in low light, the new 5MP Starview range with superior low light performance and

28 se&n

SEM718_20show preview.indd 28

28/6/18 2:48 pm


stunning image quality. The latest 8MP/4K cameras have significantly reduced prices, with radically improved low light colour performance - just 0.003 Lux. Dahua NVRs with up to 128 channels will be on display. They will be connected to the UNICORN VMS platform which can manage up to 1000 devices, all at a fraction of the cost of similar systems. Uniview will also be demonstrating a range of smart solutions including face recognition, automatic licence plate recognition and a host of other analytics. Other things we’re interested in are Faro’s range of scanning solutions, 360iQ, which is a remote operation management tool and intelligent video surveillance system giving owner-operators and managers complete visibility into their multi-unit businesses. Alarmcorp is showing Vanderbilt SPC, an intrusion detection platform that delivers a modern, powerful security system. It offers versatile and comprehensive alarm management functionality through use of cloud services, end user apps, and a dedicated software suite. AGuard will show how you can monitor the performance of your security guards online through any browser using 3G, while ATOM AR2 is the world’s first auto-tracking security robot with light bulb base. It’s not for everyone but in some applications, even high security applications, something discrete and affordable like this is not to be discounted. AR2’s light bulb adapters can be connected to Edison light-bulb sockets, making them completely cordless and wireless. The CNGE4+2 from Comnet is a light managed switch with cyber security

feature, 6-port, with intelligent redundant ring Gigabit switch with optional PoE+, 4 x 10/100/1000BASE-TX RJ-45 ports, 2 x 100/1000BASE-FX SFP ports and DIP switches for RSTP/IGMP. There are 30W and 60W PoE versions available and you get a lifetime warranty even in industrial applications. Avigilon will showcase Appearance Search technology which will allow users to initiate a search for a person by selecting certain specific physical descriptions, including hair and clothing colour, gender, and age. The new feature is designed to provide security operators enhanced speed and flexibility when conducting a search for a person. Meanwhile, Advanced Detection Technology – UVIS will be showing innovative composite view imaging that combines multiple camera views with realtime high definition video, LowCam Under Vehicle Inspection Systems (UVIS) generate an instant sideto-side undercarriage view and unique depth of field that other scanning systems can’t duplicate. Apsect will show Human Security RadarTM (HSR) a fully automatic walk-through system that screens large amounts of people, in real time, for hidden explosive threats and firearms. Salto will be displaying AElement Fusion, which eliminates lock hardware on the door by encasing all electronic components inside the door itself, making security virtually invisible. The latest XS4 2.0 Controller Control Unit, which makes it even easier to bring superior access control to a customer’s facility thanks to the ability to control and manage multiple doors through one Ethernet connection and one IP address, is also going to be on show. Still in access control, there’s the c-level pro from dormakaba Australia, which offers door monitoring with the wireless TouchGo function: Your hands are free, the transponder stays in your pocket and it supports NFC (Near Field Communication). You’ll also see FaceStation 2 from Suprema Inc. on Stand B1. FaceStation 2 is the most advanced face recognition terminal powered by Suprema’s latest innovation in facial biometrics and offers unrivalled matching speed, accuracy and level of security. With Suprema’s patented optic engineering, FaceStation 2 achieves up to 25,000 lx of operating illuminance. Digifort will be showing Digifort face biometric system which can differentiate between people that look alike, even on databases of thousands of enrolled people. FSK Electronics SA will show the Falcon Global intruder alarm and fire safety solution. Falcon Global is a highly featured, superfast, multi-network GSM-based communicator which is used for reliable transmission of alarm signals over the GSM network. It features a mobile app that allows you to control your alarm system anywhere in the world. It’s going to be a busy 3 days July 25, 26 and 27 at Security 2018 – we look forward to seeing you there! n

se&n 29

SEM718_20show preview.indd 29

28/6/18 2:48 pm


● Regulars

The Interview

J O H N A D A M S W I T H D A N I E L S U LTA N A

SMART CITIES HAVE THE POTENTIAL TO MAKE URBAN AREAS SAFER, MORE CONVENIENT AND MORE COMFORTABLE FOR RESIDENTS. challenge and a balancing act over the coming years. Smart cities have the potential to make urban areas safer, more convenient and more comfortable for residents. But governments and citizens need the education, training and assistance to improve security to drive success. Smart cities need to be equipped to manage the data load and connectivity of IT assets on the network if they are to uphold the convenience and security they promise their residents. JA: What would you say is the scope of a smart city – what lies at its core and what systems can then be arrayed around that core and managed in an integrated way that maximises situational awareness and return on investment?

Daniel Sultana, Paessler AG

This month, SEN editor John Adams speaks with Daniel Sultana, director of Security and IoT Systems, Paessler AG – PRTG The Network Monitor, about the importance of network security, IoT, smart cities and the increasingly ambiguous nature of networks.

JA: We bandy around concepts like IoT and smart cities but how realistic is it that such solutions can be created and defended without securing the infrastructure on which these ecosystems must depend? DS: With IoT, we will undoubtedly be analysing and monitoring large parts of our personal and community life, through smart devices, smart buildings,

and smart cities. A city is dubbed ‘smart’ if it integrates information and communication technology (ICT), and Internet of Things (IoT), in a secure fashion to manage its assets. The interconnectivity of these assets allows the city to monitor what’s going on in the city, how it’s evolving, and how to enable a better quality of life. Securing smart cities will be both a

DS: According to market analyst Roland Berger, there are 3 areas which affect the technological advancement of any urbanisation – specific areas of application, strategic planning and IT infrastructure. The Smart City Strategy Index indicates which cities are becoming smarter. A smart city strategy has 6 fields of application: Health, education, energy and environment, buildings and mobility – covering just about every area of public administration. The technological intricacies of a smart city depend on both bottom-up (citizen) activities, and topdown (government) measures, requiring synergy between them. Singapore is a prime example of where these 2 elements come together. The nation-city presents something of a paradox: Highly connected citizens, technically advanced infrastructure, and a forward-thinking government, yet traffic and pollution are very real challenges. The city represents an excellent proving ground for smart city technology and is in the top 3 of the world’s most technologically-connected cities. The haze which blights Singapore on occasion is caused by a sudden rise in particulates – for instance, caused by Sumatran farming practices at the beginning of the dry season. The particulate matter at a granular level can be visualized using PRTG Network Monitor from Paessler. PRTG can hook-in

30 se&n

SEM0718_30interview.indd 30

28/6/18 2:51 pm


Visit Sony Video Security at Upstairs in the Bosch Technology Room Enter through door 9 (opposite the Bosch Transformer), turn right and take the stairs near the Organiser’s Office to Level 1.

Experience first hand what makes Sony cameras unique and ideal for applications such as education, transport, critical infrastructure and retail. Learn how we consistently deliver excellent images, anytime, anywhere. Cameras showcased in the Bosch Technology Room will include: • • • •

360º Panoramic (SNC-HMX70) NEW Compact Transport dome (SNC-XM63x) Dual Light camera (SNC-VB642D) 4K camera - our industry-leading flagship product (SNC-VB770) Education

Critical Infrastructure

SNC-VB642D • Dual Light feature • Edge Analytics • Excellent Wide Dynamic Range

SNC-VB770 • Full Colour Ultra Low-light • 4K resolution @ 30fps • Interchangeable Sony E Mount lenses

Transport

Retail

SNC-XM636 / 637 • Transport Certified • 1080p Outdoor Compact Minidome • Excellent Wide Dynamic Range

SNC-HMX70 • 12MP, 360o Panoramic • Excellent Wide Dynamic Range • Edge Analytics

Ph: 13000 BOSCH (26724) or visit www.boschsecurity.com/sonyvideosecurity for more information.

Sony Video Security driven by Bosch

SonyASIALad.indd 1 1 SEM0718_31.indd

28/06/201828/6/18 7:18:59 2:10 AM pm


● Regulars

The Interview that covers the entire scope from basic network monitoring to cloud computing monitoring. This includes LANs, WANs, servers, websites, applications, cloud services, and many more. JA: How important is the security of network infrastructure?

INTERNET OF THINGS CREATE NEW THREATS, MAKING SECURITY AN IMMENSELY COMPLEX CHALLENGE TO OVERCOME. to systems collecting sensory data and display the data in a digestible format. Thresholds and fault notifications can be used to inform the city authorities if pollution levels are getting critical. JA: Broadly, what is the scope of that ambiguous word ‘network’, where does the network begin and end in a typical major integrated solution, in your opinion? DS: Networks are complex and ever changing, especially in recent years. With the explosion of IoT devices and connectivity initiatives by employers networks vary tremendously project to project, business to business. What we do know for sure is that the parameters of the network are growing, which is why network monitoring has become so important. Network monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of bottle necks or outages, so they can act quickly before the end-user notices any depreciation in performance. When we say network, we typically mean the internal network (LAN) of an organisation, as well as the external infrastructure, like the connection to the Internet and server systems accessible via the Internet that are located somewhere else. Our PRTG is an end-to-end monitoring solution

DS: In rapidly evolving IT, security becomes more important every day. New technologies and a world of Internet of Things create new threats, making security an immensely complex challenge to overcome. As a result, it is essential for organisations to have complete visibility of their networks. Implementing an all-encompassing security strategy is the only way for businesses to respond to today’s dynamic security needs. This is not only beneficial from an operational perspective, but can also benefit customers, increase compliance, and positively impact a company’s bottom line. By making network security a crucial element in the development of your organisation, IT administrators can ensure the network is protected and maintained 24/7, leaving time to focus on other essential tasks. JA: What would you argue are the most common vulnerabilities in typical WANtype networked security solutions? DS: Wide area networks (WANs) are especially prone to network problems, as they are distributed over large areas and often span several countries or even continents. The data accessed via WAN flows through emails, and many other business-critical applications, such as databases, CRM systems, VoIP traffic, etc. In addition, this data needs to be available in real time, and accessed by a tremendous number of people, such as employees and contractors. This is where the weaknesses lie - in the users, access and applications. JA: What lessons could major users of networked security solutions – universities and smart cities – learn from major events such as the London Olympics or the recent Commonwealth Games on the Gold Coast which used very large networks to manage transient digital solutions across dozens of remote sites? What do big event organisers get right? DS: For large networks, permanent (university infrastructure) and temporary

(major events), it’s incredibly valuable to leverage network monitoring to keep an eye on all devices in the network. For today’s schools this could include devices like smart boards, lecturer’s laptops and student’s tablets. Visibility is the key to success, and the one thing administrators should not under-estimate in value. Visibility provides administrators with the ultimate control over their network, the power to see challenges ahead, and the ability to quash issues before they impact mission critical systems. Our technology enables users to oversee system performance from security cameras and perimeters, to bandwidth and applications, making it a must have at any event to ensure guests and staff have no trouble connecting into the network. As an example, our Paessler Router Traffic Grapher (PRTG) Network Monitor system, a multi-dimensional solution, was used by Idonix, a company contracted by the BBC to deliver a range of graphic automation systems for the 2014 Winter Olympics coverage. Idonix used PRTG to deploy custom sensors that monitored the availability of their customer’s graphics rendering system and created a custom reporting tool that collated the data needed by the teams on the ground. It meant that Idonix had up-to-the minute information on stall and load time, and other KPIs to keep the live broadcast running smoothly. Thanks to the success of the project, Idonix also used PRTG to remotely monitor their systems hosted at the International Broadcast Centre in Rio De Janeiro, Brazil for the 2014 FIFA World Cup. JA: What message would you give large end users in corporate and government looking to create serious networked solutions – what can Paessler offer them? DS: The creation of these seriously networked solutions, like smart cities, is a gradual process that is usually always a work-in-progress. Technology works 2 ways: Top-down, as governments or businesses install infrastructure, or bottom-up, as citizens or employees use tech to empower themselves. Paessler can offer entities using networks a safe and continuous connectivity with PRTG Network Monitor – a software solutions that simplifies network monitoring regardless of your business, or your application. n

32 se&n

SEM0718_30interview.indd 32

28/6/18 2:49 pm


hanwha-security.com

Seeing beyond sight

Wisenet thermal cameras Wisenet thermal cameras provide high contrast images based on temperature differences between the object and background to make the unseen details visible without additional lighting. In addition, they have seven different types of color palette for users to select the best image in various situations.

TNO-4050T, 4051T, 4040T, 4041T, 4030T

White hot

Black hot

Rainbow

Custom

Sepia

Red

Iron

www.eos.com.au

SEM0718_33.indd 1

28/6/18 2:10 pm


● Case study

Anytime Fitness

FIT FOR PURPOSE Ryalex has installed a MOBOTIX video surveillance solution for 489 Anytime Fitness Gyms across Australia. The solution combines MOBOTIX Cameras, RemoteGUARD video monitoring and the MOBOTIX MxMC video management system. NYTIME Fitness is a global 24-hour health and fitness club. Founded in 2002 in the United States, the gym chain now has in excess of 3300 clubs in 26 countries. There are currently 489 Anytime Fitness Gyms in Australia, and each one must meet the global Anytime Fitness security standards. The biggest challenges to a 24-hour gym are ensuring the safety of patrons and property when the facility is unmanned, and preventing membership abuses, such as tailgating (when more than 1 person enters on a single card). Anytime Fitness Australia was looking for a system which could offer more than just security when management approached Ryalex Security

A

to develop a solution for its national chain of gyms. The Sydney-based company, which specialises in designing integrated security systems, has a network of highly-skilled contractors throughout Australia, which meant it was easily able to take on a project of this scope. “When we initially suggested replacing their analogue system with an IP solution, Anytime Fitness was concerned it would be more costly,” says Robert Delauney of Ryalex Security. “However, we were able to show that preventing just 2 tailgates a week through the new system, combined with no longer having to pay staff to review hours of footage, would recoup the costs.” MOBOTIX cameras were an obvious choice, thanks to their seamless integration with RemoteGUARD back to base monitoring software. “We needed to develop a solution where the cameras and alarm events were on a platform which could also be used to communicate with emergency services, and to operate external devices, such as doors and lights,” Delauney says. “Furthermore, the MOBOTIX 6MP technology means the cameras provide excellent image quality even in low light conditions.” Ryalex Security has developed a standardised solution for Anytime Fitness featuring MOBOTIX hemispheric outdoor cameras for entry and outdoor areas, and cameras from the MOBOTIX indoor range to cover interiors, plus a MOBOTIX MX-232-IO interface box to allow integration with external devices. The indoor range, which comes

34 se&n

SEM0718_34anytime.indd 34

28/6/18 2:14 pm


â„¢

Dual Thermal Sensors Object Classification Analytics HD or 4K Imager Integrated White Light / IR LEDs ONVIF Compliant For Open Integration

SEM0718_35.indd 1

28/6/18 2:10 pm


● Case study

Anytime Fitness

THE QUALITY OF THE RYALEX CAMERA SYSTEM IS EXCEPTIONAL – WE WERE ABLE TO EASILY IDENTIFY A SUSPECTED THIEF IN OUR CLUB AND PROVIDE HIGH QUALITY CLOSE UP IMAGES TO THE POLICE. with all the same MOBOTIX advanced imaging components and software features as the outdoor cameras, offers great value for money, helping to keep costs down. The solution is programmed inhouse at Ryalex, simplifying installation on site, so it can be up and running in under 3 days. There are duress alarms located throughout the premises, as well as portable ones which can be worn. If a duress alarm is pressed, the monitoring centre is immediately alerted. An operator will then assess and manage the situation by viewing live footage of the incident area, and contact emergency services if required. Using the 2-way audio capability of all MOBOTIX cameras, they can communicate with people on site, automatically muting the gym’s music system, and they also can control external devices, such as doors. This visual verification of alarm events provided via the monitoring centre was also a pre-requisite in order to allow over-16s to join the gym. One of the biggest sources of income loss for a 24-hour gym is non-members using the facilities without paying. Until now, the only way to monitor tailgating and catch perpetrators was through manually reviewing camera footage. Ryalex Security integrated an anti-tailgating system into the overall solution. If an additional person enters on a single card, the door buzzes to alert that tailgating has been detected, with an optional voice message to inform the perpetrators that the event has been tracked. The image from the tailgating event is emailed from the camera to management, which can view all tailgating events at any time via the MOBOTIX VMS MxMC(MxManagementCentre). MOBOTIX cameras offer high image quality and intelligent, easy to use video-management tools,

making them an effective tool to prevent vandalism and theft from occurring. “A serial offender who had stolen personal belongings at several different gyms was reprimanded thanks to the quality of the MOBOTIX footage,” Delauney explains. “Once we were able to get a crystal-clear image of the offender’s face, he was then caught at the next club he visited.” Equally, recordings have been used to ensure that members are respectful to one another. Members who repeatedly track mud through the gym, or never wipe sweat from equipment, can be identified via the footage and reminded of the gym rules. The Ryalex Security solution has supported Anytime Fitness to reach its goal of providing members with a convenient, safe and welcoming environment to train in 24 hours a day. It has saved gyms time and money thanks to effective antitailgating measures, which no longer cost staff hours of their time. “The quality of the Ryalex camera system is exceptional – we were able to easily identify a suspected thief in our club and provide high quality close up images to the police,” says Sandi Reay from Anytime Fitness Bondi Junction. “Getting tailgates emailed directly to the club has saved our team hours, freeing them up to spend more time with members and on income-generating activities. Best decision to use them.” n

36 se&n

SEM0718_34anytime.indd 36

28/6/18 2:14 pm


SensaTek image ad A4 6-2018.qxp_Layout 1 21/06/2018 4:30 PM Seite 1

Our new level of eďŹƒciency ... SensaTek is proud to announce its partnership with IP Configure. Their award-winning Video Management System is set to impress in the Australian Market. The Orchid VMS as well as their Analytics are great additions to our product portfolio.

We focus on your priorities. 1300 560 026 | sales@sensatek.com.au | www.sensatek.com.au

Come see us in Melbourne at the ASIAL 2018 on stand J28 SEM0718_37.indd 1

28/6/18 2:10 pm


● Case study

ARM Security

TRANSITIONAL FORM ARM Security has transitioned its Grade 1A monitoring station to Bold Manitou and in the process has enhanced operational efficiencies and empowered operators, while offering customers a far superior monitoring capability.

HEN you think about the cutting edge of electronic security technology alarm monitoring software doesn’t immediately leap to mind – automated thermal drones and robotic sentries seem more thrilling. But when it comes to meeting the operational demands of security and safety for many customers, monitoring software really is where it’s at. The digitisation of communications and technology is allowing monitoring stations to harvest data inputs in new ways, driving lateral expansion of services and delivering opportunities for growth in a business beset by corporate sharks hungry for a bite. Visiting ARM Security in Perth feels like the antithesis of the recent push from big corporates intent on getting a more-or-less self-monitored home automation solution into every home, with

W

38 se&n

SEM0718_38arm.indd 38

28/6/18 2:44 pm


BY J O H N A D A M S

video intercom, trendy silver smoke sensor and surveillance camera with fisheye views. ARM Security is an entirely different animal – along with security installation business, Securus, it’s a division of CTI Security, a subsidiary of CTI Logistics, which publicly listed in WA in 1987, and has a turnover of more than $A150 million. ARM Security’s deep roots in the electronic security industry are reflected in the intensity of the company’s operational focus on behalf of customers - this focus led ARM Security to a major technological transition that changed the way its monitoring business was managed. The transition was a process stimulated by growing dissatisfaction with multiple existing platforms, as well as by the realisation the digital revolution offers well managed businesses more opportunities than threats. According to CTI Security manager Chris Burns,

Jeremy Hopfmueller (left) and Chris Burns

IT’S A BIG FINANCIAL COMMITMENT AND A HUGE COMMITMENT IN TIME AND YOU MUST MAINTAIN YOUR BUSINESS EFFICIENCY THROUGH THAT MIGRATION.

the move from its old monitoring platform to Bold Manitou was part of a long process of deliberation. “Times are challenging – technology changes, there are new corporate competitors, but there are also new markets and new revenue streams evolving - going to Bold Manitou was our response to those opportunities,” Burns says. “I first saw Manitou at IFSEC in 2014 and we could already see the way the industry was changing. In the UK, if you want a police response, visual verification gives you priority. “We spoke with Bold, did some evaluation and made the decision to go with Manitou with support from Bold’s local distributor, SCSI,” Burns explains. “It’s a big financial commitment and a huge commitment in time and you must maintain your business efficiency through that migration. The process is not to be underestimated but having been through it, the gains are significant and it was well worth making the change. In the current market, you either take a giant leap or you get left behind. You must invest in your customers. “For us, the growth of visual verification as a key monitoring service is significant – from an alarm response perspective it’s simply brilliant and we can also undertake virtual patrols across a range of sites, including public utilities. In the past, patrols would have been scheduled at significant cost. Video patrols aren’t just more cost effective, they are a lot more effective and they can be conducted around parameters given to us by the customers, or Manitou will decide when an operator should undertake a virtual tour based on remote site events. “Prior to this we had multiple technologies, platforms and workstations the operators would work from, this was complicated and had the potential to lead to errors. Furthermore, when operators wanted to review an event they could not do so from a single platform. Now everything is on a single platform, with every event input, every keystroke, every snippet of video that is watched being recorded.

se&n 39

SEM0718_38arm.indd 39

28/6/18 2:44 pm


● Case study

ARM Security

MANITOU SUPPORTS A LOT OF DIFFERENT TECHNOLOGIES THAT CAN BE INTEGRATED DIRECTLY INTO MEDIA GATEWAYS AND UNIVERSAL CONNECTORS WITH VIRTUAL RECEIVERS. “While video verification is one strength of Bold – there are other services we’re doing well with – lone worker through an app, as well as the dedicated device SoloSafe managed through the universal connector and GPS tracking – all seamless, all integrated. Those applications previously would have been through multiple third parties. This means high efficiency from an operator’s perspective and from a customer’s standpoint, it means a much higher level or service.” Jeremy Hopfmueller, manager of ARM Security, handled the transition process and he says that from an operational standpoint, there is a lot to like about Bold. “Manitou supports a lot of different technologies that can be integrated directly into media gateways and universal connectors with virtual receivers,” he explains. “This allows us to have a lot of flexibility with video verification, to work with different sub systems and devices our customers have installed – it’s also great at managing traffic reduction. There are action patterns to reduce traffic to allow operators to deal with big events that require priority attendance, priority activation and follow up, rather than just being reactive all the time to the continued comms fails on certain sites. According to Hopfmueller, as well as big things like video verification and GPS tracking, there are smaller pieces of key functionality that make operations smoother by reducing operator error and increasing efficiency, like detailed call lists based on time and day, rather than just reading a page of notes that might be years out of date. “You can also keep an eye on less obvious inputs like weather patterns within the system, so if there’s a major front coming through it allows you to increase your operator capacity to handle the increase in alarm events,” he explains. “But there’s no doubt video verification, alongside the ability to monitor almost anything, is at the heart of this solution. Burns agrees. “When it comes to video verification, when you demonstrate the system for customers with the latest IP cameras with their high resolution and good compression, they immediately see how Manitou operates and they understand the benefits. From our perspective, to have that capability integrated into one monitoring platform – that’s what makes the difference. “If there’s an event, our operators will see an icon flashing alongside it, which tells them video is available and instantly they can see what is

Hopfmueller at the controls

occurring on the site. That’s in comparison to having a security patrol and/or a keyholder attend, which is a minimum of 15-20 minutes – basically you can instantly respond to what is happening on site and make appropriate decisions, relaying relevant information to third parties like the police is very powerful.” A challenge in the past when it came to video verification is that it was a third-party solution that required a separate workstation. “In the past there would be a dial-up system – the alarm would come through and to access video on the site, the operator would have to turn to a thirdparty workstation and dial in then find their way to the right camera to view the scene. It took time and was clunky – the alarm on one screen, the video on another,” Hopfmueller explains. “With Bold Manitou that entire process is instant – operators can see the action pattern, the system is telling them video is available, they click on the icon and are watching video from the site. Depending on the remote surveillance system, you can also undertake a preevent interrogation – if you don’t see anything in the live footage you can go back and grab a 30 second snippet prior to the event and view that to see what’s triggered the alarm.” Being able to remotely manage video surveillance offers access control possibilities, too. “There are customers which don’t want to have to manage after-hours access to buildings so we’ll have the cameras on the gates so we can verify people coming in and out in real time and authorise access,” says Hopfmueller. “The interest in video, particularly video verification, applies to all our customers - it’s SMEs, residential properties, small and large commercial businesses and government organisations.”

40 se&n

SEM0718_38arm.indd 40

28/6/18 2:44 pm


On display at the CSD & Inner Range Stand

Compatible with

SEM0718_41.indd 1

28/6/18 2:10 pm


● Case study

ARM Security

TRANSITION PROCESS For a major control room like ARM Security, the business of changing monitoring platforms is a process that needs to be managed at every step, with both old and new systems running alongside each other. The fact the 2 systems were quite different in almost all their particulars added complications. The existing solution was based on old analogue technology and while it was reliable, could not be integrated with third party platforms – these had to be linked to by operators manually on a separate workstation per platform. Bold Manitou is quite different. Designed root to tip to be open to data inputs it supports automation and integration via what Bold calls the UniversalConnector, which allows integration of data streams from almost any sub system. SMS, email, ODBC database, FTP, TCP, GPRS, RSS, UDP and simple files can be converted into regular signals and carried into Manitou as GPS, video, or audible alarms events. There’s also GPS tracking - a tracking and duress app for smart phones - as well as integration with iView and iMix, which allows video verification to be undertaken using almost any CCTV system, complete with integrated audit trail. Bold also has auto-text, interactive 2-way communication with clients via an app, and a level of automation that means the operator only intervenes when they need to. For instance, alarm events might only appear to the operator when

AT THE START, THE PROJECT PLAN HAD MORE THAN 200 ITEMS ON IT, EACH WITH ITS OWN TIMELINES AND EVERY ITEM WAS TICKED OFF AS WE WENT ALONG.

there is video verification of an event. This means you can manage busy times with fewer operators and operators can dedicate more time to examining verified alarm events, which enhances service levels. Another big strength that was instrumental during the transition process is the fine-grained Bold Genius training package. “Our expectation was that this process would be more painful than it was, but it was reasonably smooth,” Burns explains. “I think the main reason for this was that we were able to run both platforms simultaneously and stagger the migration at a time when our operators were at a level of comfort with the new system.” “With a task this complex, you need a single person managing and it was a benefit to us that Jeremy, who managed the transition, is a very processdriven person and has handled similar migrations for Signature Security. Having a lot of experience, he programmed the transition over 6 months and everything was done to the T. “We were able to step through the transition process while our operators were training on the new system and were able to handle alarm events on a dummy site, and this gave them plenty of opportunity to learn how to manage the system before we migrated any lines across. Even then, it was not a complete cutover but was staggered and that helped because our confidence grew with training and experience.” For Hopfmueller, the success of the transition depended on the team, as much as it did on the plan. “It was about getting a buy-in from all stakeholders - not just from me, but from Merton and Grace, my 2 managers, from all our operators and senior management,” he says. “It was about accepting the decision to make a change, making a plan, then being sure we had covered everything off in order to execute. At the start, the project contained over 200 items, each with its own timeline. Every item was ticked off as we progressed through the journey. “We had weekly meetings and updated the project plan, identifying key areas staff needed support. We leaned hard on resources to drive items on the plan forward. We had challenges with some timelines, but we had support within the business to ensure tasks were completed – we had the mentality this was a process we needed to go hard at for 6 months through to completion. “As part of the transition process, ARM Security had to run its existing platform through port splitters in-line with the new platform, then the operators actioned events in both platforms. Prior to this, we had to pull staff out of the control room during quieter periods and train them using a huge series of Bold training modules – each operator had to finish one module before moving on to the next. This 3-month process positively underpinned the enthusiasm of operators, who went through to supervisory, data entry and management level as well.”

42 se&n

SEM0718_38arm.indd 42

28/6/18 2:44 pm


The Shortest Distance Between Two Points

Your Transmission of Your Audio, Video, Data and Ethernet.

ComNet is Your Solution for Fiber Optic, Copper and Wireless Transmission The transmission products you choose today will affect how well your network performs tomorrow. ComNet offers the most comprehensive line of products designed to solve every transmission challenge.

ComNet solutions are distributed by: ALLGUARD Tel: +61 3 9378 2450 | info@allguard.com.au www.allguard.com.au Learn more about ComNet and our complete line of connectivity and communication network solutions www.comnet.net | +44 1133 076 400 sales-asia@comnet.net

SEM0718_43.indd 1

See you @ Security Expo - Melbourne Stand A14 An ACRE Company | ComNet ‚› Vanderbilt

28/6/18 2:45 pm


● Case study

ARM Security

THE ARM CONTROL ROOM We head into the control room through the man trap. The space is rectangular with the rack at the far end of the room. There’s a video wall with workstations facing and a manager’s desk slightly elevated behind the workstations. It’s a bigger operation than I expected, with multiple fully functional workstations. Fairly typical of monitoring stations, rostering is built around peak event times, with fewer staff when things are quiet – in the middle of today there are 2 operators and a manager. “As part of the upgrade we’ve consolidated and moved all our receivers, recorders and other rackmounted gear into the dedicated network room,” Burns explains. “All that gear used to sit behind the operators and the entire process of moving that equipment, conducted while we continued the business, was a serious challenge and a major but necessary expense.” Each workstation comprises 3 screens but it’s quickly apparent these are all dedicated to the one system with the additional screens employed to display multiple pieces of functionality simultaneously. “Each workstation has Manitou running on it and we generally have Manitou running on the big screen, so operators can see what priority events come in no matter where they are in the control room,” Hopfmueller explains sitting down at the nearest workstation, which only has one monitor awake. “What we’re looking at here is one of our video verification sites – as you can see, one of the benefits of Manitou is that there’s only one screen required and everything the operator needs is contained in that screen. In terms of the process of actioning an alarm event, when the operator picks up the event from the event traffic, the system clearly defines to the operators what the event is and where. “During the process of setting up a client with video verification an alarm zone can be mapped to an adjacent camera so when the operator sees the event they can see the camera with the correct angle of view and can access the action pattern for an event like this single sector zone alarm,” he says. “In this case, we are going to look at the video footage – if we don’t see any disruption to the site we can clear the event. “I click on the icon and it tells me video is available – it’s Zone 8, which you can see is a fence line PE beam. The operator can then go to camera 1 and have a look down the fence line to see if there has been a breach. On this site, the CCTV system has PTZ cameras with pre-set capability and we can use the alarm event to drive the camera to a pre-set, zoom in and zoom out – we can look at footage prior to the event, during the event and after the event, and we can look at different cameras for different angles of view. “In another scenario we can use a camera covering the front gate to zoom in on a truck, check its number plate and if it’s authorised to access the

site, we can open the gate,” Hopfmueller explains. “And everything we are doing when interrogating the site or if an alarm is recorded to the event history we can deliver to the customer in a folder the following day if we need to. In the instance of this PE beam activation, the operator has seen it was a false alarm and can close the event and clear it using their password.” Watching Hopfmueller steer the system is instructive. He never leaves one screen yet has access to events, reporting, video surveillance, mapping and a load of other functionality. In certain ways, it’s like a well-tailored single-site PSIM – everything is right there. Looking at the operators at their workstations, each focused on one screen yet actioning layers of functionality, you can see that compared with multi-platform applications, Bold Manitou reduces the number of touches required from an operator in every part of the monitoring procedure - everything is streamlined. Chatting with control room manager, Merton Glass, I get a sense of the intensity of the process – not only the business of moving and upgrading hardware and software without messing with the reliability of the existing system but the lengthy process of operator training – more than 250 modules needed to be completed before taking ARM Security live with Bold Manitou. “It was exciting when we switched over to the new system,” Glass says. “Getting our first GPS event and seeing it displayed on maps. Another fun part with the video verification was watching operators manage events in real time inside control room software and hearing them say, “Look, I can actually see what’s happening on site!” They got really excited about that.” Something else that is integral to Bold Manitou is traffic reduction – what that means is stripping out all the signals from the event queue that clog more important aspects of operation. Since the system went live, the team has worked hard on its database of signals, so Manitou can manage administrative signals in the background, leaving operators free to

44 se&n

SEM0718_38arm.indd 44

28/6/18 2:45 pm


YOU’RE IN VERY

SECURE COMPANY

SECURITY SOLUTIONS SPECIALISTS PROUDLY SUPPLYING THE FUTURE OF SECURITY TECHNOLOGIES

PEOPLE COUNTING CAMERAS

NUMBER PLATE RECOGNITION

MOBILE CCTV SOLUTIONS

BODY WORN CAMERAS

ACCESS CONTROL / CCTV INTEGRATED SYSTEM

FOR THESE AND OTHER GROUND BREAKING SOLUTIONS CONTACT YOUR LOCAL SEADAN BRANCH. VISIT US AT SECURITY 2018

25-27 July 2018 Melbourne Convention & Exhibition Center

STANDS J39 & G7

YOU’RE IN VERY

SECURE COMPANY SEM0718_45.indd 1

VIC NSW QLD WA ACT

Unit 7, 170 Forster Road, Mt Waverley VIC 3149 Unit 5, 142 James Ruse Drive, Parramatta NSW 2150 15-19 Hudson Road, Albion QLD 4010 Unit 4, 200 Balcatta Road, Balcatta WA 6021 Unit 2, 157-161 Gladstone Street, Fyshwick ACT 2609

1300 366 851 | seadan@seadan.com.au 28/6/18 2:11 pm


● Case study

ARM Security Merton Glass

concentrate on more important events. “That enhanced efficiency gives operators more time to examine events as well,” says Glass. “In the past there would be an alarm event and you’d be straight into the contact list. With Manitou operators think, “What do we have here?” and they have the tools to look at the site and make informed operational decisions with complete audit trails.” At this point, Burns takes a Solo Safe device out of the control room so we can check out the system’s event reporting, video and mapping functionality. “The Solo Safe device reports in .xml and its signals go into our media gateway using an onboard SIM card,” Hopfmueller explains. “As the device is activated you can see the event appear in the queue as a high priority alarm – it can also be labelled as a medical alarm, or a man-down alarm and the system mapping shows you where the customer site is, as well as the location of the device. There’s a help situation and a duress situation – in this case, the icon flashing means there’s mapping available through BoldTrack, which comes into play through Google API. “At this point, the operator picks up the phone, dials the number of the device and there’s a set script – a greeting, self-identification and the operator says they have received a request for assistance from a Solo Safe device, and asks the person if they are ok or if they need assistance. The person might say they have fallen and request an ambulance to their location, as well as asking the operator to obtain additional assistance from another authorised keyholder. If the unit has been activated accidentally, then they request a password and clear the event. Conversely, if it’s a confirmed duress alarm with an incident in process, then we will immediately advise police and if necessary they will dispatch a vehicle.” The strength of the Manitou system, particularly its ability to confirm intrusion by video verification

BOLD MANITOU IS A QUANTUM AHEAD OF OUR PREVIOUS SYSTEM... WE NEEDED A SOLUTION THAT OFFERED US THE POWER AND FLEXIBILITY TO EVOLVE OUR SERVICES NOW AND IN THE FUTURE.

allowing much faster actioning of police response, has come to the attention of WA Police. “We had WA Police look at our system after there was a significant theft of firearms from a store,” explains Burns. “They are very proactive about reducing firearms getting onto the streets and part of that is making sure firearms dealers have the best security possible. What they saw fed into legislation changes relating to standards for security systems for gun dealers – they wanted to include video verification. “We demonstrated what Manitou could provide them for such applications and they could see that if video verification had been in place there would have been a much better chance of catching the offenders. They based their re-write of the standards around video verification, as well as enhancing the way alarm systems are monitored, including dual paths and higher polling rates. We’ve had a lot of success with firearms dealers coming to us in the last 6 months keen to meet the standard that the new legislation requires for licensing.”

CONCLUSION According to SCSI’s Daniel Cananzi, ARM Security has taken advantage of the capabilities of Bold Manitou. “ARM Security is a cautious and deliberate operator and those qualities stood the team in good stead during the process of transitioning the ARM Security control room to Bold Manitou,” Cananzi says. “It’s not easy making such a big change to an alarm monitoring business, but the results were worth the effort. Now the process is complete, the Bold Universal Connector allows tracking of pretty much anything – duress is just one example - you can simply monitor any stream of data from any location with management on one platform and seamless traceability of an event.” Having run 2 systems alongside each other, then switched to Manitou, Burns has a clear opinion about which is better. “Bold Manitou is a quantum ahead of our previous system,” he says. “We needed a solution that offered us the power and flexibility to evolve our services now and in the future. That said, we had operators who had been using our old platform for 15 years and we thought it would be challenging re-training them on Manitou. It ended up being very easy because once they had done the training, they could see the benefits for their own work – the new system is easier to use, more efficient and delivers them vastly more information, faster. “But perhaps the most significant endorsement of Bold Manitou comes from our customers,” Burns says. “We find if we put a client onto Manitou with video verification, we get 2 or 3 new clients referred to us. The initial client recognises the benefits of the system and they’re so pleased with its performance they promote its benefits to others with no encouragement from us.” n

46 se&n

SEM0718_38arm.indd 46

28/6/18 2:45 pm


SEM0718_47.indd 1

28/6/18 2:09 pm


Proudly brought to you by

● Regulars

Alarm monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Future is on Show

Installers, integrators, end users and monitoring service providers will have plenty to think about when they attend Security 2018 Exhibition and Conference at the MCEC in Melbourne, July 25-27. E spend a bit of time trying to second guess market directions in the alarm and monitoring business and a big show like Security 2018 is a great bellwether for industry types. You can see where the money is being invested, where the industry leaders are pushing the business – you can even see the slowcoaches moving to conform with core trends. Something else that’s interesting is that you can see those fringe companies long on MBA-style business planning and short on history throwing themselves at parts of the market they think are a sure thing – in this case that’s likely to be cloud solutions with selfmonitoring but start-ups can be insightful too. Looking at the industry in holistic ways allows them to see opportunities without the inertia of existing technologies and the goad of existing income streams blinding them to inevitable changes, as well as huge opportunities waiting to be picked off. Established companies don’t have the luxury of blind-siding the market but they can learn from dreamers at the bleeding

W

edge, taking advantage of good ideas to fuel the creativity of their own R&D teams and engineers. In my opinion, we’ve been seeing that a lot lately in the electronic security industry, in great part fuelled by the digital heart of many solutions. Once some one comes up with a brilliant idea it only seems to take 12 months before that idea is washing through collective supply chains as manufacturers step-up and distributors bolster their suppliers list to block threats and seize opportunities. The electronic security is mature and being the oldest technology, the alarm and alarm monitoring sector is most mature of all. There are clear trends that are increasingly obvious in the monitoring

market. Video verification – whether optical or thermal. As more monitoring companies move to offer this capability on the back of enhanced infrastructure, improved image quality and bitrates, and better integrated monitoring platforms, you start to wonder why video verification is not ubiquitous. Cameras – especially thermal cameras – are potentially by far the most capable sensors available and interesting and far-reaching core technologies like analytics are only going to push this capability further. Throw deep learning into the mix – essentially that’s the ability for a processing engine to learn from the past to polish its performance in the future – and it starts looking as if the future of alarm monitoring might be the

48 se&n

SEM0718_48monitor.indd 48

29/6/18 12:06 pm


Proudly brought to you by

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

There’s a reason every smart home image on BigStock shows a phone and a key…

future of video monitoring. The smart home trend continues but in many ways it seems security manufacturers and certain competitors have carved out a new market niche in this area. Full blown home automation is a different beast from common wireless smart home solutions we see. Sure, they can do automation but beyond a certain complexity – by this I mean driving smart switches in wall sockets – their capacity for affordable home automation has limitations. Thinking about the alarms market recently, I decided that while a modern wireless smart home system with multiple devices covering PIR, smoke, flood, CO2, reed, vibration, video intercom, camera

and smart switches was obviously more capable than the LED-governed 8-zoner of the past, it’s far more a smarter security and safety system than it is a smart home automation system. This thought was enhanced by reading a market research press release which hailed security as the killer app of smart homes. Fact is, most smart home systems are fundamentally digital security systems – especially when sold in the form most home owners are prepared to pay for. You’re not going to be driving hardwired lights or air conditioning, and the ability to interface with major appliances is limited to the capacity to turn them off by activating that cute little Z-Wave smart switch. Having the fridge order groceries

from Coles? Yeah, but nah. At Galuzzo I get to squeeze the avocadoes. Regardless of the distinction between smarter security systems and automated homes, visitors to Security 2018 are going to see plenty of very nicely developed wireless security and smart…home monitoring solutions. Never have there been so many, so affordable, so functional. For mine, the ability to check in on a home or business premises via an app from any networked location is the best feature of most wireless smart home systems. What about future trends? In our feature on thermal cameras in this issue someone made the pertinent observation that thermal technology is moving in 2 directions – towards higher quality through improved resolution and contrast – and towards lower prices, with lower resolutions and just enough contrast. There are also additional players moving into the market, while existing players leverage technologies to offer enhanced performance across layers of functionality – integrated thermal and optical systems, as well as analytics in one affordable package. Another opportunity pointed out was the fact that in more compact applications, lower resolution thermal cameras can confirm intrusion while giving personal privacy – you can see a person is there but can’t identify them. Using this sort of technology indoors with optical cameras at entries and external locations might just push aside user reluctance to install IP cameras inside their homes – frankly, that’s something I’d be reluctant to do and so would most of you. But in the case of thermal, with its ability to give a guaranteed catch of human intrusion, (and fire) the same reluctance doesn’t apply. The final word on video verification as the gold standard for intrusion detection goes to the WA Police, which recently wrote video verification into legislation governing licensing of firearms dealers in the state. If you want to renew your license, you must have a video verification system installed that’s professionally monitored by a (Grade 1A) security monitoring station. Period. n

se&n 49

SEM0718_48monitor.indd 49

29/6/18 11:53 am


● Product review

AMC

AMC X864 ALARM KIT LSC’s AMC X864 Kit B includes a control panel, touch screen keypad, 3 x Smile 20P pet digital PIRs, internal and external sirens and plenty more. But the best feature is the free AMC MANAGER App.

HILE the AMC X864 I have is hardwired, there’s a wireless option, if you want to go that way. I prefer wired, personally, but how you manage the comms will depend on your preference and the needs and wants of the customer and application. The controller has 8/64 zones expandable to 16/64 and you can stretch things out with zone doubling, even tripling with the optional EOL split line (X412-X824). My first impressions of the system are the general ease of installation – powering up and connecting the keypad are easy to handle and once this is done, getting into the system to tweak zones, areas, groups and all the rest, is highly intuitive.

W

BY J O H N A D A M S

There’s a modularity to programming that makes it deceptively simple and a couple of times I catch myself looking for a more complicated way to move back and forward between menus. Spending time with the hardware, it’s clear this product is well-made, and the Italian design is sweetly executed without being a radical departure from what installers and end users would expect from their security solution. The surface-mount board work is tidy for all components – the sensors as well as the controller. Everything appears to be very nicely done and wires together with no great dramas. In terms of their design specification, AMC X864 Series controllers are designed for building protection to EN 50131, Grade 2, Class 2 approval. The control panel has audio support on board and reporting capability covers, alarm, robbery, tampering and trouble via PSTN dialler, which is onboard (voice call, Contact ID, SIA fsk, etc.), a GPRS/3G module (voice call, SMS, Contact ID, DC09 IP protocol for Contact ID and SIA IP), or the IP1 module (DC09 IP protocol for Contact ID and SIA IP) – that last is the one I’m using and it gives me connection of the panel to the cloud or internet, and facilitates CMS messages, cloud services, app management and the function installers will love most, remote programming. I have 3 sensors in my little system, which are the EN 50131-2-2, GRADE 2-approved Smile20, a digital PIR detector with an analysis system which AMC says considers the 2 most important changes that

50 se&n

SEM0718_50amc.indd 50

28/6/18 5:21 pm


SEM0718_51.indd 1

28/6/18 2:09 pm


● Product review

AMC

may occur during intrusion movement: Speed and intensity. Without knowing anything of processing, firmware, or circuit thresholds involved with positive alarm activation, it’s hard to be sure how the sensor undertakes “simultaneous comparison of these 2 pieces of information to discriminate repetitive movements from intrusion, lowering the percentage of false alarms” but the idea seems sound. When things get hot, which in Australia they will, there’s an entirely digital temperature compensation system, which AMC says guarantees best performance. In terms of core specifications, the Smile20 has internal end of line resistors so you can supervise zones loops, a Fresnel lens with creep zone, a 15-metre depth of field and a 90-degree angle of detection. It’s also calibrated to ensure the circuit won’t go into alarm when confronted with an electrical signal from the pyro that conforms with thermal reflection from a 15kg dog. As well as an internal siren, I have a couple of external siren options to hand – Secor and the Blade 01, the latter of which allows me to control unwanted things like the external siren, which in my narrow street is likely to inflame 30 or 40 households without delivering the sort of police response I’m after. Handling the front of the system is AMC’s new Unika touchscreen keypad with a compact 5-inch screen and an ABS thin cover. Total dimensions are 155mm wide, 100mm high and 18mm deep and I find myself liking the size of Unika. Some keypads are enormous but this one is just about right – perhaps it’s the shallow depth that makes it

WHEN THINGS GET HOT, WHICH IN AUSTRALIA THEY WILL, THERE’S AN ENTIRELY DIGITAL TEMPERATURE COMPENSATION SYSTEM, WHICH AMC SAYS GUARANTEES BEST PERFORMANCE.

seem compact. The capacitive touchscreen likes a firm contact and this builds a little latency into the programming process my first time around but that’s par for the course. If it bothers you there are software-based programming options as well. Specifications of Unika are a 5-inch TFT iconbased display with 480 x 272-pixel resolution, SD card slot for loading images and firmware upgrades – using this slot and the integrated photo frame screensaver, you can have the keypad display your company name and contacts when the system is idling. Especially cool, there’s an NFC reader for recognising smartphones allowing them to be used for arming or disarming the system. Other neat features include a microphone and speaker to drive the vocal memo function and a temperature sensor. Once I’ve got all my cabling done, which turns out to be way easier to manage than I thought it would with a little help from my friends (thanks a bunch, Direct Cable Supplies!), it’s time to drive the system.

DRIVING THE AMC X864 There are a number of options when it comes to programming and driving the AMC X864. Controlling this system is easy using the App AMC MANAGER (iOS/Android) with IP module (which I’m using) and/or a GPRS/3G module. Using either the IP module or 3G/4G, it’s possible to handle programming remotely. The way you add maps or floorplans is via importing system maps functionality. Local programming can also be dealt

52 se&n

SEM0718_50amc.indd 52

29/6/18 11:52 am


ACCESS & POWER INTEGRATION by

– Easily combine Altronix® power and accessories with access controllers from the industry’s leading manufacturers

TROVE ®

SAVES TIME & LABOR ...MAXIMIZING PROFITS

– Trove enclosures with removable backplanes allow you to configure, layout and test prior to on-site installation – Efficient, scalable designs for optimum performance and seamless integration – Pre-assembled kits available in various configurations further reduce overall costs

Altronix® / info@altronix.com / altronix.com / Made in the U.S.A.

8108MP-5_Altronix_Trove_FullPG_Security Electronics and Networks_4.19.18.indd 1 SEM0718_53.indd 1

4/19/18 28/6/18 3:38 2:09 PM pm


● Product review

AMC

with using the keypad and/or PC software and in the early stages, I do a bit of both, with assistance from LSC’s David Latimer. In terms of the keypad, the Unika interface is user-friendly and very simple. You hop in and out of the system forwards and backwards – it’s like the old way of keypad programming but simplified by icons and enhanced by the nature of the menu. I don’t have any trouble programming my 3 zones using Unika and as Latimer points out, there are plenty of installers who love the familiarity and simplicity of keypad programming. You can also manage system programming using a laptop – while I’m blundering around learning the keypad, Latimer opens his laptop and leaps straight into the backend via Windows-based software. From here you can handle things like programming areas and groups, labelling inputs and outputs, setting up linked inputs, adding peripherals and telephones, network setup, events, comms and I can see an arming lock. Something that’s clear to me is there’s way more to the AMC X864 than meets the eye. The other thing is that the Italians do things a little differently – given AMC has been in business for decades, this is a good thing. While I’m clawing away at the 4-core with my fingernails, the unflappable Latimer shows me the system’s free app. In honesty I’m not leaping out of my seat to look at it – the world is full of apps and my eyes aren’t great, even with a big mobile like an iPhone 6 Plus. Once I’ve finished my battle with the last termination screw and I pay attention it’s immediately clear that AMC MANAGER App is a real gem – easy to access and once you’re in, it’s intensely refined. The sweetness of the thing kicks

YOU HOP IN AND OUT OF THE SYSTEM FORWARDS AND BACKWARDS – IT’S LIKE THE OLD WAY OF KEYPAD PROGRAMMING BUT SIMPLIFIED BY ICONS AND ENHANCED BY THE NATURE OF THE MENU.

David Latimer, LSC

off with high quality mapping and the functionality keeps coming. When I’m playing the app on my own mobile later I decide that the app is the most Italian thing about this solution – it’s very well done, indeed. The photographic-quality floorplans seem 3-dimensional and the way the stateful icons are placed into this mapping is great, too. You can see not only zone inputs but outputs that drive things like lighting, too. On a single screen it’s possible to see the status of the whole system, the perimeter, each zone, outputs, the carrier, battery and phone line – that’s just one screen, mind you. AMC’s app is a bit like Shrek. It keeps peeling off in layers. Yet the ability to arm, disarm the system, the perimeter, areas, zones, accessing trouble, seeing inputs and outputs and discerning their state – that’s always right there in front of you. The app drives via the cloud and features arm and disarm of multiple systems, of all system combinations, enable and disable of all programmed outputs, bypass of all zones ready or not ready, importing of graphical maps in which the building is installed, importing and changing icon and photo of zones, events log, push system to show data state and power level of device, HTTPS data send, different sound notifications can be set for different events and the app and maps can work in portrait or in landscape. In short, setting up the AMC X864 has been a pleasure – much simpler than I thought it would be - and I’m looking forward to experimenting with the system’s operational capabilities even further in upcoming issues. n

54 se&n

SEM0718_50amc.indd 54

28/6/18 5:21 pm

n


Find What You’re Looking for Faster Avigilon Appearance Search™ Technology

Avigilon Appearance Search technology is a sophisticated deep learning artificial intelligence search engine that makes searching for video as easy as searching the internet. Initiate a Search for a Person by Physical Description Operators will be able to search for a person of interest by selecting certain specific physical descriptions, including clothing color and gender. Advanced Face Analytics Find an individual across all cameras and sites, even if items such as their clothing change. Quickly Search for a Person or Vehicle of Interest Easily comb through hours of recorded video and group video data to help increase the speed and accuracy of investigations.

avigilon.com/appearance-search | asksales@avigilon.com

© 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, and AVIGILON APPEARANCE SEARCH are trademarks of Avigilon Corporation. Depicted features and functionalities may not be currently available and, if and when available, may not be as depicted. Image has been simulated for illustrative purposes.

SEM0718_55.indd 1

28/6/18 2:09 pm


â—? Special report

Cyber Security

SECURING SECURITY NETWORKS As electronic security solutions become more dependent on network infrastructure, the ability to secure them from cyber security attacks becomes more pressing. The challenge for installers, integrators and end users is embracing the fact that cyber security, like physical security, is an operational imperative that never ends.

56 se&n

SEM0718_56cyber.indd 56

28/6/18 3:12 pm


THE TRUTH IS THAT CYBER SECURITY SYSTEMS THEMSELVES ARE OFTEN BETTER THAN THE HUMANS THAT ARE IMPLEMENTING THEM.

CCORDING to James Layton of Bosch Security Systems, poor cyber security and the risk of cyber-attacks is one of the least understood and largest threats against electronic security systems. “There are really 2 key facets to consider when talking about the risks that these elements place on security systems,” Layton explains. “First is that fact that modern security systems are built around the understanding and requirements that the data collected and stored by the device is maintained to a certain degree of integrity. We have systems in place to ensure that camera footage is time-stamped, watermarked, and free from digital modification, to use an example. Some cyber-attacks are designed around the intention

A

of compromising the integrity of this data, if not the data itself. Even an attack which fails to remove the data itself, may alter it in such a way that it is no longer considered contemporaneous and would therefore be inadmissible in a legal hearing. “The other point to consider is that electronic security systems are often tied at a high level to other operational functions. Many systems run concurrently on corporate networks and are accessed by high-risk users such as management, human resources, and local security. Some cyber security attacks target not the system itself, but other network or corporate resources that can be accessed past a poorly defended electronic security system, such as confidential files, and potentially banking or billing records.” According to Layton, the biggest cyber security threat today is poorly informed, or lazy users. “Humans generally seek comfort and convenience, and too many of us are given to using the same password for multiple systems, or not paying attention to the exact email we are responding to, or the exact file extension we are opening,” Layton says. “It’s truly amazing how unsophisticated some successful cyber-attacks have been. Many have been built around the concept of social engineering – for example an email that elicits a response because of an emotionally-charged message like “final warning”, and often looks like an official document from an organisation known to the victim. “The truth is that cyber security systems themselves are often better than the humans that are implementing them. But they can only be effective if the user follows best practice guidelines, remains informed of developments within that technology spectrum, and engages in the iterative nature of cyber safety.” When it comes to the key steps installers and end users should take to secure a CCTV solution, an access control solution, or an integrated solution from cyber security threats, Layton says the best way forward is to engage with the cyber security defences of the system in question. “Manufacturers have long been aware of the risks associated with cyber security,” he explains. “Failure to protect a system may not just result in loss of the function of that system, but potentially compromise other key end-user systems that will incur substantial costs. For this reason, most top tier products in the security market already include strong cyber security elements including data encryption, multiple form factor authentication, etc. “What installers and users need to do is ensure that these systems are properly utilised. This starts with identifying common security failures such as overused and unchanging passwords, and establishing corporate systems that require operators to work under more secure guidelines. The other often forgotten component is that a functional security system requires regular updates

se&n 57

SEM0718_56cyber.indd 57

28/6/18 3:12 pm


● Special report

Cyber Security

as the shape of the risk environment is always in flux and there are always new threats around the corner. “Finally, in a market where there is always a drive to save a little money, we need to be careful that what we are not paying for with cash, we are paying for with risk. There’s no shortage of cheap security systems available in the world that would potentially fail to meet even the most basic cyber security check.” Layton agrees cyber security is a process and that procedures must be put in place to manage that process – you can never stop and say “we’re secure now, we don’t have to do this anymore”. “Like a real virus, cyber threats are constantly evolving, and new exploits are regularly being found in software previously thought to be secure,” Layton says. “The only way to truly have the peace of mind that your security system has the lowest level of threat, is to ensure that you have a system in place to deploy iterative updates to the product. It’s something of a conundrum for many people in our industry – some installers may be loath to always install the latest firmware for a product on the basis that they feel it may be untested, or subject to bugs, yet to deliberately hold a system back to a prior version will begin to increase the risk of a successful cyber-attack. “These sorts of issues have existed in the information technology market for decades, and here technicians have learned to regularly seek updates – few IT installers would use the firmware that comes on a disc in the box with a new piece of hardware, most would go straight to the website for the latest version.” Some users think it’s viable to disconnect systems from the internet then assume they are protected but Layton is not completely convinced. “Physical separation is often a very effective way of increasing security… I mean how can a person break in to a house that has no windows and no doors?” he asks. “It’s not the be all and end all of course, but this methodology is likely to make your system much less easy to compromise and thus the attacker is going to move on to the next system. After all, most cyber-attacks are opportunistic, not targeted. “That said, just like the house with no windows and no doors, an electronic security system that is completely disconnected from the outside world is going to have other major limitations. Most users these days expect to have remote access to their security systems – through apps for example, or to be able to link disparate systems across multiple geographic locations – things that are entirely impossible when a system is physically isolated. “You’re basically getting into a situation where managing the risk is starting to invalidate the value of the system. It’s far better, in my opinion, to have a system with connectivity working to its full potential, while at the same time actively and

MOBILE DEVICES THESE DAYS INCLUDE SOME OF THE HIGHEST LEVEL OF DATA SECURITY TECHNOLOGY INCORPORATED INTO THEIR DESIGN.

consistently managing cyber security threats, than to have a limited, standalone solution.” According to Layton, cyber security should be part of any installation and ongoing maintenance agreement, and represents an opportunity for enterprising integrators. “In our industry, we basically sell peace of mind products - you install them, and you hope that you are never in a situation where you have to use them,” he says. “Cyber security is no different. A well-maintained and secure system should never give you the impression that its integrity has been tested. Just as we sell the benefits of a system that is designed to mitigate the risk of physical penetration of a secure environment, we need to also sell the benefits of a system that protects itself from electronic and data penetration. “From the point of view of installers and integrators, there’s a need to sell the customer on the activities that they need to engage in to ensure this protection, and to get involved in the ongoing service of maintaining this level of protection. There is certainly a commercial opportunity involved in the active maintenance of electronic security systems to ensure that they continue to limit the risk to the end user. Everybody buys a car under the expectation that it will require regular preventative maintenance that will also incur a cost – the same logic needs to apply to our industry in light of cyber threats.” According to Layton, mobile device security might be less of an issue than many fear. “It’s not uncommon to look at a mobile device and assume that it presents a much larger level of risk,” he explains. “These devices usually exist outside of the secure environment; they are highly portable, and thus easily stolen or misplaced; and we spend a lot of time using these devices in our daily lives. The truth is, however, that mobile device manufacturers are not blind to the risks created by their devices. Mobile devices these days include some of the highest levels of data security technology incorporated into their design. Consider, for example, that the iPhone series of products has had biometric verification of some kind included in the last 4 generations of product – something that is still relatively uncommon in physical security installations. “Ultimately, we need to apply the same rules across all device types. If the passcode for your mobile phone is less secure than the password for your electronic security system, and that phone has access to the system, then yes, you are creating additional risk through that mobile device. However, if you use the same level of risk management with your mobile devices as you do with the security technology itself, then the mobile device becomes just one more weapon in your security arsenal and doesn’t compromise your system. n

58 se&n

SEM0718_56cyber.indd 58

29/6/18 11:50 am


MAXIMUS RANGE FULL RANGE OF EXPLOSION-PROOF CAMERAS, R E A D Y T O U S E F O R CORROSIVE AND HAZARDOUS ENVIRONMENTS

VIDEO SECURITY P R O D U C T S www.videotec.com hksales@videotec.com Made in Italy since 1986

SEM0718_59.indd 1

28/6/18 2:09 pm


● New product

Pelco

TRAFFIC REPORT Pelco VideoXpert offers traffic managers a wide array of tools to reduce congestion and accidents, including the ability to sense when traffic slows to a crawl and notify a traffic manager a section of road is congested or gridlocked, allowing measures to be taken to improve the situation.

ELCO VideoXpert traffic management applications are contributing to safer, cleaner and faster traffic systems. According to Pelco, while roads are larger and busier, and cars are faster than they were in the early days of the automobile, they are also now safer and more efficient – the latter is important, given the cost of fossil fuels and the impact releasing vast amounts of carbon dioxide into the atmosphere has on climate systems. While alternative sources of fuel are undoubtedly the end-game, reducing the amount of time cars spend idling in traffic could also significantly decrease emissions. Congestion is one issue; however, we haven’t made much progress on this statistic as the average American now spends 42 hours a year stuck in traffic, roughly double what they endured in the early 1980s. But for Australian cities the figures are far worse – back in 2015 GPS firm TomTom undertook a study with its widely used mapping devices and discovered that Sydney drivers are spending 96 hours a year sitting stationary in traffic. The study showed that for every 30 minutes a driver spent behind the wheel they spent another 24 minutes in gridlock and things are worse in 2018. The time spent in gridlock in Sydney is now 27 minutes per half hour of driving. According to Pelco, the good news is that the tools to make transportation even safer, cleaner and faster are now at our disposal. Cities are making major strides by leveraging smart systems that help move vehicles through intersections more efficiently. For instance, traffic signals have traditionally behaved according to a preprogrammed schedule that is based on trends observed by traffic managers. Today, traffic signals that are equipped with video cameras and sensors behave based on real-time traffic conditions to maximize the movement of cars.

P

State-of-the-art video surveillance solutions, like Pelco’s VideoXpert, offer traffic managers a wide array of tools to reduce congestion and accidents. One of its many features includes the ability to sense when traffic slows to a crawl and notify authorities when a section of road that is congested, allowing traffic managers to consider what measures can be taken to improve the situation. VideoXpert will also issue a Traffic Gridlock Alarm when it detects that cars are at a standstill or a Wrong Way Driver Alarm when it detects a vehicle driving against traffic on a one-way street. In addition to being immediately alerted to the most pressing issues in the area, traffic managers using VideoXpert get the clearest, most comprehensive picture of the street scene possible. Pelco’s Optera panoramic cameras can capture an entire intersection in a single frame. Due to a recent global alliance with IBM, Pelco’s solutions can now be powered with IBM’s Intelligent Video Analytics suite, which translates live and recorded video into searchable data, from license plate numbers to types of vehicles. This means that not only is the traffic manager getting the full picture in real-time, but all the necessary footage is available for a rapid review or investigation by law enforcement, litigators, or insurers. Instantaneous alerts allow traffic managers to respond more quickly to accidents, ensuring that ambulances are on the way as soon as possible. Perhaps more importantly, it empowers traffic managers to foresee problems and prevent their worst consequences. The long-term results will be a smoother drive, cleaner air, fewer accidents and more lives saved. n

60 se&n

SEM0718_60xpert.indd 60

28/6/18 2:16 pm


Introducing

EZITAG is a new inn identify and Prema for each location/p

EZITAG

Simply use a DCS Perma or tick your room location eg ENT FOYER STUDY Jack location (Data Cable

EZITAG is a new innovative idea to identify and Premark your DCS cable FREE EZITAG: ENTRY FOYER STUDY LOUNGEfor BR1each BR2 location/point. Simply use a DCS Permanent Marker to circle or tick your room location (Security Cable) – eg ENT FOYER STUDY BR1 BR2 GAR, or your Jack location (Data Cable) – eg D1 D2 D3 D4 D5.

EZITAG: ENTRY FOYER STUDY LOUNGE BR1 BR2

FREE

EZITAG is available on all our Security and data cable products both in 100m rolls EZITAG is available on all our Security andboxes. data cable and 305m products both in 100m rolls and 305m boxes.

www.directcables.com.au www.directcables.com.au 1300 CBL GUY 1300 CBL GUY (1300 225 489)

(1300 225 489) D I S TRI BU TO R S

DCS FP AD_JUL18.indd 61

29/6/18 11:16 am


â—? Special report

Thermal cameras

APPLYING THERMAL CAMERAS Thermal cameras continue to make headway into the electronic security space, driven by falling prices and the capability to feed intelligent video surveillance solutions intrusion detection events virtually free of false alarms. But while thermal has great power, it needs to be installed thoughtfully to ensure operational outcomes are met.

62 se&n

SEM0718_62thermal.indd 62

28/6/18 3:31 pm


BY J O H N A D A M S

HEN you’re serious about securing large sites against intrusion, thermal is a wonderful tool. Well installed and commissioned, it offers the ability to detect human or vehicle intrusion over hundreds, even thousands of metres, providing huge depth of field across wide angles of view with comparatively paltry power, installation and network demands. Thermal intrusion events can then be used to alert security staff, drive optical camera pre-sets and set in motion a response chain based on certainties. Especially good, thermal camera performance is not impacted by levels of light, smoke, dust or fog. It’s even possible to discern intruders hiding in bush. All these strengths make the technology ideal for perimeter defence of massive high value sites like ports, solar farms, power stations, and multifarious industrial and defence applications. This power can be accessed on smaller sites, too. It’s especially valuable for security managers who need a solution able to provide a virtual single zone of protection for a long boundary backing onto public access space. And thermal works brilliantly when integrated into smaller security and surveillance solutions, where its compact data streams provide almost flawless detection of intrusion, especially when installed in concert with a quality analytics application. In smaller applications, thermal is just as useful when you want to drive optical camera pre-sets, initiate recording or drive outputs for external lighting or pre-corded PA announcements. According to Tom Kinkade of FLIR distributor, Sektor, the fundamental operational capabilities of thermal cameras are built around its capacity to produce images outside the visible spectrum by creating images of a subject based on the infrared radiation emitted. “The benefit is that contrast delivery is totally different to the visible spectrum, highlighting details that could be missed due to lighting, obscuration or camouflage,” Kinkade explains. “In a thermal image, a human target is usually the brightest ‘light source’ in the scene making them visible at far greater distances than in the visible spectrum – it’s a bit like looking at oncoming headlights on a long country road, you can see them from a long way off.” In Kinkade’s opinion, the perfect applications for thermal cameras are vast – they include but are not limited to security applications. “There are many scientific and efficiency driven applications for thermal cameras,” he explains. “In the security vertical, we see thermal cameras being used for perimeter surveillance and critical asset monitoring in end use cases, where constant situational awareness is missioncritical. Long-range cooled-core thermal cameras provide outstanding long-range threat assessment capabilities in very large sites such as airports, military bases, seaports and borders.

W

THE BENEFIT IS THAT CONTRAST DELIVERY IS TOTALLY DIFFERENT TO THE VISIBLE SPECTRUM, HIGHLIGHTING DETAILS THAT COULD BE MISSED DUE TO LIGHTING, OBSCURATION OR CAMOUFLAGE.

“We have seen great success in deploying IVA on thermal cameras due to the stability of image contrast, particularly useful in PIDs applications. As a FLIR distributor, our go-to product for perimeter applications is the FC-Series-ID incorporating embedded, rule-driven intrusion detection analytics with best-in-breed thermal imagers. We achieve outstanding performance in autonomously detecting and classifying human and vehicular targets at more than 500m.” Thermal cameras also have a role to play inside. “Thermal imagers are widely used in retail people counting applications and in the security segment there are some unique cases for indoor deployment,” says Kinkade. “We have had some instances where VIP/celebrity customers want areas on their property monitored for security, but they don’t want identifiable footage to be recorded for privacy reasons. Fire escapes are another novel use case in which thermal imagers may be used to detect the presence of people through smoke.” When installing thermal cameras, Kinkade says installers should familiarise themselves with the key performance benchmarks that contribute to a quality image. “These include refresh rates (fps), sensor types (Indium antinomide, Vanadium oxide, amorphous silicon etc.), sensitivity in mK, resolution, lens types and f-numbers,” he explains. “The correct combination of these attributes will determine the quality of thermal image you’re going to produce and the longevity of the device itself. “When it comes to thermal camera resolution, the gold standard for commercial security applications is a native core resolution of 640 x 512 pixels, coupled with thermal sensitivity of usually less than 35mK. 5 years ago, most applications called for 320 x 240 pixels or similar resolutions, but we don’t see that as much these days. At the top end of the thermal market there is increased uptake of true high definition thermal cameras, however, these devices are generally reserved for military or search and rescue use.” When it comes to variables like lens focal length, Kinkade says such decisions need to be application specific. “As a distributor for FLIR Systems we sell many

se&n 63

SEM0718_62thermal.indd 63

28/6/18 3:31 pm


● Special report

Thermal cameras

thermal cameras and I can safely say there is no such thing as a single ideal fixed focal length,” he explains. “The FLIR FC-Series-O/ID cameras come in 17 different lens/resolution combinations because sites come in all shapes and sizes. “It’s also important that installers take time to understand the benefits and limitations of the technology, understand the specifications that will deliver consistently great images and invest in products backed by a reputable and knowledgeable manufacturer of thermal products. Importantly, most thermal cameras from mainstream brands are ONVIF-compliant, so thermal can be used in any application it offers benefits – it’s a natural fit on large sites and lends itself to use in drone monitoring.” Eric Ho at Bosch Security and Safety Systems says thermal cameras are best used in applications where light sources are close to zero and the distance cameras needs to cover is beyond the reach of IR illuminators “Applications includes perimeter protection, tracking of boats on water, surveillance of forested areas prone to fog during certain times of the day/ night,” Ho explains. “However, there are some common applications that would benefit from thermal cameras yet typically never consider it - traffic monitoring, for instance. Typically, only optical cameras are used, however, the glare from the headlights can cause over exposure to some cameras. Where highways or roads are not well lit, it can cause a huge difference between the light from the headlight and the surroundings, making over exposure more serious. “In addition, such low light areas will cause motion blur, which is not good for IVA detection. A thermal camera will not experience any of these problems, allowing IVA to work well. A disadvantage is the lack of colour and other optical details of the vehicle in a thermal image but if the priority is IVA event detection, thermal cameras are a good fit. “Thermal cameras are also useful for internal applications - manufacturing plants would benefit from using thermal cameras to monitor overheating of equipment, while cold rooms for storage of food

SINCE THERMAL CAMERAS RELY SOLELY ON IR ENERGY TO CREATE AN IMAGE, THEY ARE CAPABLE OF OPERATING IN COMPLETE DARKNESS, THROUGH SMOKE, AND ADVERSE WEATHER CONDITIONS...

stuffs are sometimes quite foggy, so if an optical camera is not ideal, a thermal camera is.” According to Ho, there are a number of things surveillance system operators should consider when trying to get the best performance from thermal cameras. “For a start, you need to study and understand the scene 24/7,” Ho explains. “A thermal camera is only good if there is a large enough temperature difference between an object (a person) and the background. For example, on a very hot sunny day, if the floor is made of concrete or metal, the heat generated by the flooring can be close to or higher than a human body. When this happens, the object will not appear to be very visible in a thermal image. A body of water like a lake can reflect heat radiation - when a person walks along it, the person’s heat signature will be reflected on the water surface. To a thermal camera, this may signify it is a person. “Glass or reflective surfaces also reflect heat radiation, similar to water. If someone walks behind a glass wall, the thermal camera will not be able to detect it. Lastly, dark-coloured objects can absorb heat radiation, so a black object will look hotter at night as it absorbed more radiation from the surroundings during the day. Knowing these limitations helps installers decide how to deploy thermal cameras at the right locations. Something else, thermal cameras do not see through anything (not even paper), a misconception many people have.” According to Ho, thermal camera resolution has not really improved greatly in the last 5 years. “The highest resolution for video systems is currently only at 640 x 480 pixels, but compared to 320x480 resolution, it provides more details,” he says. “For a perimeter protection application, you benefit from the higher resolution as it will provide more details and the ability to detect further and combined with IVA, performance is more reliable. “Bosch is one of the very few manufacturers that implement IVA into thermal cameras. Without IVA, a thermal camera needs to be monitored 24/7 - with IVA, the camera monitors the scene for the customer

64 se&n

SEM0718_62thermal.indd 64

28/6/18 3:32 pm


24/7 and you can still apply forensic search on the recording to find footage in seconds – that’s especially useful in perimeter security applications. “When it comes to thermal cameras and drones, this technology is still quite new and there are safety concerns which limit drones flying freely in many applications. Typical drone flight times of less than 30 minutes (non-military grade), are also not practical for many security applications.” According to John Distelzweig of FLIR Systems, thermal cameras detect the thermal infrared radiation that is emitted or reflected from all objects and surfaces. “Since thermal cameras rely solely on IR energy to create an image, they are capable of operating in complete darkness, through smoke, and adverse weather conditions, such as snow and light rain,” Distelzweig explains. “This makes thermal security cameras extremely useful in detecting intruders along perimeters, even more so when combined with video analytics. A person’s body heat will typically stand in contrast with their environment. This makes thermal imaging very effective at detecting humans, particularly at night, when visible cameras have challenges or require additional illumination. “From a security perspective, operators can quickly spot and track intruders in any light and most weather conditions. In fact, a thermal camera can even see the heat of a person hiding in light foliage or deep shadows created by sunlight. In addition, while a visible camera might cover distances of 50 to 120 metres at night, thermal cameras can reliably detect heat sources at distances up to 6 times farther,

requiring fewer cameras and reducing the total cost of ownership. According to Distelzweig, any application involving perimeter intrusion detection can benefit from thermal. “Thermal imaging has become more affordable and widespread in recent years,” he explains. “Professionals and first-responders who didn’t have access to thermal imaging in the past are now able to benefit from its many uses. In addition, small to medium-sized companies can now afford thermal security cameras, such as the FLIR Saros, that are equipped with cost-effective, miniature thermal cameras. “This opens the thermal security camera market to such operations at construction sites, car dealerships, public parks, and storage facilities that might have previously considered thermal cameras out of reach. Also, when combined with smart analytics that can classify objects, a thermal camera can greatly reduce false alarms by distinguishing between vehicles or humans, which might pose a threat, and innocuous targets, such as roaming animals.” According to Distelzweig, the most important consideration for installers is achieving full coverage of the perimeter of interest. “In addition, for installations with multiple cameras, the fields of view of cameras should overlap in order to remove all dead zones in which a camera cannot see a target head-to-toe,” he explains. “When is comes to internal applications, because thermal cameras can see through smoke, they are effective with security systems, such as in banks, that disperse smoke to disorient or deter intruders. Security and law enforcement officials can easily see the whereabouts of intruders using thermal, even in black-out conditions. Thermal cameras are also useful indoors as sensors that can trigger alarms when they detect heat, while also providing visual verification of the presence of intruders.” When it comes to thermal camera resolution, Distelzweig argues there have been improvements over the last 5 years. “Arguably, the most significant breakthrough in the last five years has been the development of micro thermal imagers, such as the FLIR Lepton, which is smaller than a U.S. dime (Aussie 5 cent piece),” he says. “The development of Lepton led directly to the FLIR One, a small thermal imager that attaches to the bottom of smartphones. While the resolution of such a small imager may not be large (currently 160 x 120 pixels), the outputs of these imagers—as in the case of the FLIR Saros—can be stitched together to create a larger thermal image. For example, the FLIR Saros contains 2 Lepton imagers that combine to create a thermal image with a resolution of 320 x 120 pixels.” According to Distelzweig, another installation consideration is focal length. “When considering focal length, installers need to consider the trade-off between detection distances

se&n 65

SEM0718_62thermal.indd 65

28/6/18 3:32 pm


● Special report

Thermal cameras

and the width of the scene,” he says. “Larger focal lengths increase the magnification of objects in the field, while smaller focal lengths present a wider field of view. In most cases, the best practice is to define the minimal requirement for scene width and choose the largest available focal length to meet the width criteria. The FLIR FC-Series O and FC-Series ID cameras offer 17 lens options to optimize the FOV and distances. “Thermal imaging provides more stark contrast in wider and harsh conditions compared to visible sensors. This allows any video analytic to perform more reliably in complex outdoor situations. All FLIR cameras are ONVIF conformant and certified integrations are completed for all leading VMS platforms. Finally, the FLIR Native API allows 3rd party integrators and VMS companies to develop sophisticated integrations which take advantage of sophisticated alarm and slew to event capabilities.” Distelzweigs’ tip for surveillance system operators in getting the best from thermal is to bear in mind that including a combination of fixed and PTZ thermal cameras with analytics can provide optimal wide area coverage of facilities. “Fixed cameras positioned along fence lines and borders can initially detect potential intruders crossing their fields of view,” he explains. “With additional functionality provided by FLIR United VMS, for example, the fixed camera can then handoff a target to a PTZ thermal camera that will lock onto and track the intruder’s movements. Distelzweig argues drones and thermal cameras are a natural fit for monitoring large, high security sites. “Yes, absolutely,” he says. “With further integration of radar into perimeter systems and slew-to-cue camera functionality, dispatching a drone equipped with thermal to further investigate intrusions is a great way to improve tracking capabilities. Combine this with the drone system integration of FLIR Cameleon command and control software and you can quickly monitor any security concern from the air.” Axis sales engineer, Oshana Jouna says there are 2 main types of thermal cameras available. “The first is the classic thermal camera - this is used to generate images based on thermal or heat radiation for detection or monitoring purposes,”

AXIS HAS LAUNCHED NEW THERMAL CAMERAS THAT ARE DISCREET WITH LOWER COST MAKING IT POSSIBLE TO USE THERMAL CAMERAS IN RETAILS AND HEALTHCARE APPLICATIONS.

Jouna explains. “The sensor used in the classic thermal camera detects thermal radiation emitted from objects and people. It is insensitive to light levels, darkness and other challenging conditions. The second is a specialized thermal temperature alarm camera - this is used as a remote surfacetemperature measuring device. The technology used in a temperature alarm camera allows the camera to detect the heat radiation and measure the temperature as well. “A classic thermal camera is generally used to detect people, objects and incidents. It outperforms visual cameras in complete darkness and difficult conditions such as smoke, haze, dust and light fog. As they do not need floodlights, they also reduce light pollution and lower energy consumption. Thermal cameras are typically utilized for security purposes, such as perimeter protection around industrial sites, airports, power plants, and other critical areas. Their detection capabilities also make them a valuable tool, for example, in search and rescue operations. “Meanwhile, a thermal temperature alarm camera is generally utilized in a wide range of application areas where there is a need for temperature monitoring. One common utilization is to monitor critical electrical equipment, e.g., transformers, electrical sub-stations. The purpose of the camera is to predict failures and locate problem areas. A temperature alarm camera is well suited for predicting failures since it can indicate certain problem areas that are not yet visible to the normal human eyes.” Jouna says that while thermal cameras are typically used in industrial applications, the potential of the technology is much greater – the cameras don’t just have great catch performance, they can also protect privacy. “Axis has launched new thermal cameras that are discreet with lower cost making it possible to use thermal cameras in retail and healthcare applications,” he explains. “The new Axis thermal cameras can be used as a sensor to avoid compromising privacy, for example schools and care homes – thermal imaging detects incidents without revealing personal details of the people in the image. Together with analytics, the thermal camera can trigger alerts or alarms in response to patient or resident falls, allowing staff to take immediate action.

66 se&n

SEM0718_62thermal.indd 66

28/6/18 3:32 pm


Thermal cameras can also be used in facilities that store chemicals or liquid products of different viscosity and temperature. This is useful to estimate the content of the silo or containers to ensure that no liquid is leaking.” Jouna says that when installing a thermal network camera, there are some things to consider. “To achieve the best results when detecting people, the temperature of the background of the monitored object should be as even as possible, and it should be colder or warmer than a typical intruder that may appear in the scene,” he explains. “In this instance, the intruder will stand out from the background. There should be a free line of sight from the camera to the region of interest, without anything disturbing or blocking the view. The scene should have one or a few easy recognizable objects, for example, a chimney against the sky or a building. A chimney in use will be warm, and a building is almost always leaking some indoor heat. “Make sure that the scene does not contain any tree branches, flags or similar that move into and out of the scene when it is windy. The camera should be mounted as firmly as possible, and clear and sharp edges should be kept at a distance from the intended scene. A sharp edge just outside the scene may trigger a false motion alarm if the camera sways in the wind and moves the viewed scene over the edge. Since the camera is moving, it will interpret the changed image as movement in the scene, even though nothing but the camera has moved. Thermal cameras with support for electronic image stabilization are less affected by vibration. However,

Tom Kinkade, Sektor

Axis lens chart

these factors should still be considered when installing a thermal camera, to optimize camera performance.” Jouna says that when it comes to focal length, this will depend on the application. “For protecting a large fence perimeter, the ideal focal length is typically 60mm,” he explains. “This will offer an accurate detection range for human at a distance of 1833 metres using a thermal camera with VGA resolution (640 x 480p). The main objective for perimeter protection is to detect a threat or an actual intrusion at the earliest possible stage. In the first line of defence, thermal cameras are deployed. Modern thermal cameras are very sensitive and accurate; they are unrivalled when it comes to detection. With the aid of the edge-based analytics, you greatly reduce the cost for false or nuisance alarms. “Axis thermal network cameras are well suited for perimeter and area protection, such as virtual fences, providing discreet and cost-effective detection, as well as enhancing building security and emergency management. The built-in intelligence of the camera, together with added video analytics, creates a solution where the video surveillance system automatically performs an analysis of the captured video. Thermal network cameras help distribute this analysis to other cameras in the IP system, leading to improved efficiency and scalability. Generally, thermal cameras from the well-known manufactures are integrated with all the common VMS platforms and for the less common VMS platforms ONVIF can be used. We can confidently say thermal cameras are very well integrated with most VMS platforms nowadays.” According to Jouna, a classic thermal camera is generally not used indoors. “However, if installed indoors, thermal cameras can be a useful tool for a search-and-rescue operation in cases such as when a building is filled with smoke,” he says. “Normal visual cameras will be unable to see beyond the smoke. However, the thermal cameras will be able to see heat radiation generated by people, thereby, giving visualization of whether anyone is still in the premises or not.

se&n 67

SEM0718_62thermal.indd 67

28/6/18 3:32 pm


● Special report

Thermal cameras

“One other possible application is for supermarkets, that can also be applied to areas with cold storage. Thermal cameras are placed near checkout counters to see if customers have any cold items (chilled or frozen food items) on their body. This way, staff members will be able to detect customers who are trying to shoplift cold items by placing it inside their loose clothing. Thermal cameras will be able to pick up the temperature difference between the cold item and the body.” Jouna explains that thermal camera resolution is a product of the nature of thermal sensors. “Since a thermal camera is detecting light of another wave length than optical cameras, it needs to have larger pixels,” he says. “Thermal cameras typically use 25 µm or 17µm pixel size sensors. The sensor would have to be too large to have mega pixel resolutions. It would also be very expensive to manufacture with the technology used today. In addition, larger sensors would mean larger lenses which would increase the price even more. Therefore, over the last 5 years thermal camera video resolution has not seen big improvements, unlike the visual camera race to HD resolutions. “However, newer generation thermal sensors do have higher resolution in bits. Furthermore, recent technologies have improved the contrast of thermal readings. Thermal cameras can detect smaller differences in temperature. Recent advanced technology implemented in thermal cameras is the local contrast enhancement. This enhancement helps the camera distinguish objects, such as humans, from the background even when the temperature difference is very small.” Jouna says there are key considerations with thermal that ensure the best possible performance. “It is important to take the environmental considerations into account when calculating the detection range,” he explains. “Ideally a thermal camera requires a temperature difference of 2C between the targeted object and the background. The 2 most important environmental factors that affect the image of an object in the camera are absorption and scattering. They reduce the thermal radiation that reaches the camera, thereby reducing the distance at which the camera can detect an

THE 2 MOST IMPORTANT ENVIRONMENTAL FACTORS THAT AFFECT THE IMAGE OF AN OBJECT IN THE CAMERA ARE ABSORPTION AND SCATTERING.

object. Scattering has a greater effect on the loss of thermal energy than absorption. “Water vapor (H2O) and carbon dioxide (CO2) in the air are the primary causes of absorption. During absorption, the heat radiated from the object is absorbed by water vapor and carbon dioxide and loses some of its energy before reaching the camera. The water vapor content of the air affects image quality even in sunny and clear weather, when the water vapor content can be high. When the water vapor content is low, less thermal radiation is absorbed by the water molecules, allowing more thermal radiation to reach the thermal camera. This results in better image quality compared to a day when the water vapor content is higher. “When it comes to scattering, the thermal radiation from the object is dispersed when it hits particles in the air. The loss of radiation is directly related to the size and concentration of the particles, droplets or crystals, that constitute polluting, condensing or precipitating conditions such as fog, smog, haze, rain or snow.” Jouna argues that thermal cameras will play a big part in drone-related technology and he says this can be broken into 2 parts. “Firstly, thermal cameras installed onboard drones,” he explains. “We have a number of technology partners already investigating the possibility of integrating thermal cameras with drones especially after the launch of light weight thermal camera from Axis. This includes applications where drones are used in inspecting bridges and large buildings.” According to Jouna, thermal cameras can also detect and track drones. “Over the past 10 years the popularity and accessibility of drones have increased considerably,” he says. “This will increase the number of accidents and unauthorised operations. We believe thermal cameras with wide angle field of view combined with accurate and reliable analytics will be a great tool to track drones and control visual cameras with high zoom levels and resolution to provide visual images. There are a number of analytics out in the market that are already using thermal cameras in detecting/tracking drones.” For Cecil Nie, pre-sales product manager, Hikvision Oceania, the fundamental operational capabilities of thermal cameras include behaviour analysis algorithms based on deep learning, temperature exception alarms and fire detection alarms. “Perfect applications for thermal cameras include perimeter protection, fire prevention, hunting, etc, but thanks to the capability to detect fire and smoke, thermal could work effectively for indoor fire prevention in various scenarios including warehouse, super markets,” Nie says. “Compared with smoke detectors and heat detectors, thermal cameras could trigger pre-alarm before outbreaks of fire, as well as offering visible images for fire source identification. In applications like warehouse fire prevention, thermal cameras

68 se&n

SEM0718_62thermal.indd 68

28/6/18 3:32 pm


Cecil Nie, Hikvision

NEW HANWHA CAMERAS MAKE THERMAL ACCESSIBLE

could detect temperature change within a far bigger area compared with traditional fire or smoke detectors.” When it comes to installing thermal cameras, Nie says there are considerations particular to the technology. “Because thermal cameras are widely used for long-range detection, both the height and angle need to be strictly calculated before installation. Otherwise, thermal may not reach all the targets as designed,” he says. “When it comes to focal length I’d be thinking 7mm for indoor use to cover wide angles and short distances, while 25mm for external uses would reach targets as far away as 300m. In perimeter detection applications 50mm lens thermal camera can easily detect human intrusion from 500m away. “Resolution is a consideration, too. The resolution of thermal cameras has been improved, with higher resolution up to 640 x 512 pixels offering more details for target identification, while lower resolutions, like 160 x 120 pixels, bring thermal to an affordable level. Care is also required during commissioning. In perimeter applications it’s recommended to undertake calibration with size filtering and pixel size filtering to reduce false alarms and improve alarm event accuracy.” Nie says he is looking forward to the ongoing development of analytics and deep learning in concert with thermal camera technology. “It is believed that once the best combination schemes are discovered, the algorithm can be optimized continuously through massive data samples and training, and may show better application effect,” he argues. “Optimizing the existing schemes will improve the user experience, so that thermal cameras can serve more applications and fields. Integration is no problem either, with thermal cameras. For example, Hikvision thermal cameras have been integrated with common VMS, including Milestone, Mirasys, Seetec, ONSSI, Axxonsoft, etc. And all our thermal cameras are fully integrated with Hikvision recorders and the HikCentral platform.” n

n One of a number of companies expanding thermal from the mil-spec end of the market, Hanwha Techwin’s newly introduced Wisenet thermal cameras (TNO-4030T,4040T,4041T,4050T,4051T) support 30fps per second with a resolution of 640 x 480 pixels. These Wisenet thermal cameras provide clear image quality and correct the haze of image edges or objects when seen from a long distance, which are prevalent problems in conventional thermal cameras. Users can choose an optimal lens size (13mm, 19mm, 35mm) according to the monitoring environment. Hanwha says the thermal cameras’ key operational ability is detecting objects in pitch dark environments by capturing infrared radiation from the objects and creating an electric image. “Because it is not affected by weather conditions, it yields meaningful monitoring of objects or people even in extreme weather, such as heavy rain or snow or micro dust,” Hanwha says. “For such reasons, thermal cameras are adopted as optimal solutions not only for monitoring military border line and outer zones of urban and city area, but also for monitoring forest fires since it can activate alarms when temperatures reach a certain point. “Indoor installation of thermal cameras is also useful in tunnels since it activates rapid responses in the event of power failures or fires, and in rooms where many machines and devices are connected through wires. Airports can also use thermal cameras to monitor human temperature to detect infection of diseases like MERS and influenza.”

se&n 69

SEM0718_62thermal.indd 69

28/6/18 3:32 pm


● Regulars

Products

Editor’s choice INNER RANGE RELEASES NEW PRISMAX KEYPAD l INNER Range PrismaX Keypad boasts a full-colour LCD display, with large clear text and icon-driven menus for easy end user control of the Integriti security system. Just some of the functions supported include monitoring and acknowledging alarms and events, arming/disarming, unlocking/locking doors, controlling automation functions and isolating zones. The 8 dual-colour status LEDs can be used to display the armed/disarmed state of areas or for other intruder, access control or automation purposes. An in-built temperature sensor displays the room temperature and can also be integrated into the system for building automation control. A SIFER reader kit is also available for the PrismaX Keypad as an add-on option. With this kit fitted the PrismaX keypad can also be used as a card reader for access control for doors or for high security card and PIN dual-credential authentication, or card login access to the keypad’s menus. Distributor: Central Security Distribution Phone 1300 319 499

BGW TECHNOLOGIES DISTRIBUTING QOLSYS INTERACTIVE SECURITY & CONNECTED HOME PLATFORM l BGW Technologies is now distributing the Qolsys interactive

security and connected home platform in Australia after signing a distribution agreement with Qolsys Inc. “BGW Technologies will add value to Qolsys product via comprehensive training, technical support, warranty, marketing and having inventory in all our branches nationally”, said BGW Technologies Stanley El Komala, senior product manager, intrusion. The Qolsys product takes advantage of the full range of DSC RF 433Mhz wireless devices, Z-Wave Plus devices and Alarm.com’s interactive platform, which is underpinned by a 7-inch touch screen user interface. The product also includes LTE, weather widget, built in glass break, 5MP panel camera, Bluetooth disarm, dual path connectivity, photo frame feature, integrated how to use videos and loads more. Distributor: BGW Technologies Contact: +61 2 9674 4255

What’s new in the industry.

VIVOTEK 180 AND 360-DEGREE CAMERAS FROM CSM l BUILDING on the strategy of ‘See More in Smarter Ways’, VIVOTEK will showcase its leading 180-degree and 360-degree network cameras at SensaTek’s booth #J28 at Security 2018. The solution includes the newly-released MS9390-HV dual 4MP wide-angle multi-sensor dome camera and the MS8391EV four 3MP multiple-sensor camera. These professional day and night outdoor 180-degree cameras can maximize the field of view and reduce the total number of cameras required, helping to save both the cost and time spent on total installation and maintenance. Also showcased will be the FE9391-EV outdoor 12-megapixel 360-degree panomorph fisheye camera, which is armed with Trend Micro’s anti-intrusion software enabling users to enjoy higher levels of network security. It includes VIVOTEK’s selfdeveloped deep learning technology and crowd detection, which can count the number of people and indicate any selected zone that exceeds an ideal threshold. Distributor: SensaTek Contact: 1300 560 026

SONY SNC-HMX70 360-DEGREE HEMISPHERIC l SONY’S new SNC-HMX70 camera is a discrete, easy to fit IP network camera that delivers an all-round 360-degree hemispheric view, ensuring full situational awareness. The camera’s fixed lens, high-resolution 12-megapixel image quality and wide 92dB dynamic range assures that crucial image details are captured, even in extremely challenging light conditions. The hemispheric image can be dewarped using VMS software or the camera’s own edge dewarping function that provides 3 simultaneous views. As part of Sony Video Security’s partnership with Bosch, the SNC-HMX70 features on-board video analytics, which provides reliable object detection, loitering, object counting, route detection and other features. The camera is suitable for a wide range of indoor surveillance applications including large retail, airports, warehouses and casinos. Distributor: Bosch Security Systems Contact: 1300 026 724

70 se&n

SEM0718_70prods.indd 70

29/6/18 11:48 am


CSM HID LOCATION SERVICES AND CONDITION MONITORING, BY BLUVISION l HID Location Services is a real-time, scalable loT ecosystem.

Helping you achieve operational efficiency, a smarter building and an optimal workplace through location services, accurate and visible item management, equipment performance focusing on profit or loss and equipment health, which can predict failure and provide alerts. HID Location services enabled by Bluvision, addresses workplace optimisation answering a growing market need for accurate, real-time location awareness and analysis of your workplace. The system combines the power of Bluetooth LowEnergy (BLE), Wi-Fi, and cloud-based technologies to provide a seamless user experience inside and outside of the workspace. If you need any information, please contact your local CSM sales branch and we can organise an initial meeting. E:sales@csmerchants.com.au Distributor: Consolidated Security Merchants Contact: 1300 663 904

FLIR RELEASING NEW SAROS FAMILY l FLIR will publicly launch new cameras under the name Saros this year, which include a thermal sensor, analytics and an optical sensor. “Saros is really a product that was created to target that mainstream perimeter protection market directly, by combining a lot of technologies into a single, unified device. Everything is fully integrated, everything works together,” said Brian Karas, FLIR’s director of vertical market development. “Integrators don’t have to worry about choosing the right compatible equipment and synchronizing a thermal camera field of view and an optical camera field of view and bolting all of this stuff to the wall of a building.” According to Karas, FLIR has solutions that fit larger applications, like prisons or airports, but those products are not well-suited for the SMB space. What led to the creation of Saros is engineers have combined lower cost, lower resolution thermal sensors with in-house analytics algorithms, and added an optical sensor as well. Distributor: FLIR Systems Contact: +61 3 9550 2800

DELL EMC SERVERS FOR MILESTONE & AXXON l CSD is excited to have been recently appointed a Dell distributor which allows the team to provide enterprise grade servers for surveillance and integrated security solutions. Dell EMC provide industry leading hardware and essential, critical infrastructure for organizations to build a secure and reliable platform for protecting their most important assets. CSD has specified a range of Dell EMC servers and workstations to compliment the Milestone, Axxon and Inner Range product lines, which utilises Dell’s extensive range of reliable enterprise grade hardware that all comes with a 3-year, ProSupport warranty. This new partnership with Dell EMC enables CSD to provide a complete, professional range of enterprise CCTV and reliable, secure server options for fully integrated access, security and surveillance solutions that are deployed in conjunction with the Inner Range Integriti building management solution. Distributor: Central Security Distribution Contact: 1300 319 499

HIKVISION ENTERPRISE CAMERAS l HIKVISION has just released its new 5-line range of enterprise

network cameras into the Australian market. This series has 2MP, 4MP and 8MP high resolution variants and has been designed to supersede the current range of 4-line cameras. The 2MP and 4MP line are powered by the advanced technologies of Darkfighter and Lightfighter, these cameras offer ultra-low light and extreme light compensation together in one camera. Supporting H.265 and H.265+ compression, these new cameras decrease the load on networking infrastructure and reduce storage requirements. Supports 12 smart detection features including; line crossing detection, intrusion detection, region entry detection, region exit detection, scene change detection, audio anomaly detection, defocus detection, face detection and many more these cameras are the perfect addition to any enterprise CCTV solution installed in harsh lighting environments or requiring video analytics at the edge. Distributor: Central Security Distribution Contact: 1300 319 499

MOBOTIX RELEASES NEW MOVE ONVIF CAMERA RANGE l MOBOTIX has unveiled its new MOBOTIX MOVE line of cameras at IFSEC in London, the first ONVIF G compliant MOBOTIX series, able to deliver 3 H.264 streams at the same time. The MOBOTIX MOVE series consists of 4 models and is also the first MOBOTIX camera series offered with the latest market standard features such as motorized varifocal lenses, integrated IR illumination and Wide Dynamic Range functionality. “We listened and the MOBOTIX MOVE series is our response to requests from integrators and installers who asked for standard products when it comes to tenders where the specification requires features like PTZ, varifocal lenses and WDR.” explains Thomas Lausten, chief executive officer of MOBOTIX. “MOBOTIX MOVE products are specified and tested by MOBOTIX in Germany and manufactured under supervision,” he said. “Our customers can be sure that we won’t lose our product DNA and all MOBOTIX MOVE branded devices are delivered and supported according to the same high-quality standards our customers expect.” Distributor: Mobotix Contact: +61 2 8507 2000

se&n 71

SEM0718_70prods.indd 71

28/6/18 3:13 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: We have a system mounted on a pole exposed to weather – there are ventilation holes in the box at the bottom but being near the coast we still have issues with salty night mist getting in and then drying into crystals during the day and attracting moisture when it rains. We’ve not had any issues with boards yet but the terminations, which are obviously low- quality metal are beginning to corrode. Without going full IP67, are there any suggestions you could give that might alleviate our problem? A: Salt air and salt water eat metal things – they’ll get 316L to bleed rust after a couple of months of full exposure. Your cables are copper but electrical terminations can be aluminium or metal alloys and if mild steel or stainless termination screws are used, there will be galvanic corrosion. The worst combinations of metals are probably aluminium and stainless steel – left to their own devices, the stainless will turn the aluminium into powder. Your boards may already be conformal coated and if not, they ought to be. You can’t attempt this with the controllers in the box, however. It’s something you need to build into a replacement and maintenance schedule. Protecting aluminium and stainless contact points can be handled with simple techniques like painting screws with Loctite (let it dry completely before screwing in) or by using plastic spacers between termination surfaces but these

Our panel of experts answers your questions.

fixes will be tedious and may not be applicable for delicate termination strips. To protect exposed terminations in existing applications, we’d be breaking out the Vaseline. In challenging marine environments, a thin layer of Vaseline is an electrical termination’s best friend. It has a melting point of around 37 degrees C so try to give the box some additional shade if it’s located in the open, don’t overdo the application and check to see if it’s melting and pooling at the bottom of the housing. While Vaseline is insoluble in water and chemically inert, its fumes can burn when heated to a liquid and supplied with a wick and naked flame, so screen vents to make sure the housing can’t collect wind-blown organic matter. Q: I enjoyed SecTech Camera Shootout recently and it was pleasing to see the improvement in camera performance from the cameras on test. At the same time, we seem to see end users with more and more tiny cameras – toy cameras. Do such cameras really represent the future of video surveillance? We’re trying to see the bottom in the race to the bottom but there seems no end to how low prices and build quality can go. A: This is something everyone in the CCTV industry thinks about – installers, manufacturers and distributors. Will the surveillance cameras of the future all be

tiny, have plastic lenses, good enough sensors all tucked up in an IP66 housing with IR support calibrated to the sweet spot of a fixed wide angle 2.8mm lens. It’s hard not to see the interconnect with the smart phone industry, which is locked into 1/3-inch Sony back-side illuminated sensors and fixed plastic lenses, yet still contrives to offer pretty good performance in applications where there is some available light, not too much backlight and where the photographer can use their feet as a motorised zoom. There are some security and home automation applications where this sort of a camera system is applicable – domestic and SMEs where situational awareness is required at shallow depths of field and wider angles of view. Regardless, the performance of a $50 no-name CCTV camera can’t readily be compared to that of a $1000 smart phone. Something to consider is what else is going on in the camera system – not the lens or the ubiquitous Sony sensor but the processor itself. There’s significant variation in the way different image signal processors in CCTV cameras handle the electrical signals their sensors generate – in fact much of the improvement in camera performance in recent years comes down to enhancements in processing. I don’t see any sign of improvements in lens quality – quite the opposite – and that applies to build quality, too. Plenty of famous brands

REGARDLESS, THE PERFORMANCE OF A $50 NO-NAME CCTV CAMERA CAN’T READILY BE COMPARED TO THAT OF A $1000 SMART PHONE.

72 se&n

SEM0718_72help.indd 72

28/6/18 2:16 pm


are cutting corners on hardware and giving back in the processing department. Obviously, if you really want good processing of an excellent data stream generated by an excellent sensor that is served by a quality lens, then there are manufacturers which can give you that across a range of form factors. If you really need moving faces and plates in areas of poor lighting or extreme backlight, then you’ll need more than a camera that’s a sort of optical PIR. It really comes down to customer application and your team’s ability to establish what the customer wants a CCTV system to deliver and to show them how that operational outcome can be attained with available technology. There’s no point over-specifying cameras viewing the foyer, just as there’s no point under-specifying cameras viewing the carpark. But in either case, what the anxious client will want to see their system offering post-event will be static and moving faces and vehicles, preferably with recognisable number plates, in challenging 24-hour lighting conditions. Can low cost cameras from quality CCTV manufacturers

offer this sort of performance? Some can, in some applications, sometimes. If that’s the sort of hit-miss solution you’re going to be installing, make sure it’s the customer who makes the final decision on camera choice. Q: We’re reading more and more about AI, IVA, neural networks, machine learning and most recently, deep learning. What is deep learning when it comes to video surveillance systems? Is it any different to these other acronyms or are they all part of the same thing? A: A good question and a large question. Frankly, labelling in the broader area of AI tends to be ambiguous and opaque. In short, artificial intelligence is an intelligence other than natural intelligence – machine intelligence springs to mind, though I can never help feeling AI should include the biochemical functioning of organic cells. When it comes to machine learning we’re talking about using algorithms to assign data to categories and to use it to decide if a pre-programmed assumption about the

material world is more or less true in this case. Machine learning is code heavy and depends on complex algorithms, as well as data gathered, to make decisions. The concept of neural networks is old, with input data broken up into layers of very small components and compared to expected thresholds to establish a probability vector. In the security industry, that something might be a face or a license plate. However, for a long time, there simply wasn’t enough computer power available to deliver on the promise of neural networks – it took the advent of GPUs to give us that. Deep learning is a label for the latest systems that deliver this sort of neural capability by parsing monstrous amounts of data to tune circuits until they are expert at identifying multifarious sums of data inputs. The more data they process, the more expert they become. It’s worth reading about Andrew Ng’s work on the Google Brain project if you’re keen to know more about deep learning. In 2011, Ng and his team loaded deep learning algorithms onto 16,000 CPUs and had them plough through 10 million YouTube videos. The result was a system with the self-taught ability to recognise cats. More recently, AlphaGo trained itself to expert level by playing Go against itself, over and over and over. Although we are in very early days, it’s hard not to see deep learning-based electronic security solutions that will become better and better at offering situational awareness the longer they are in operation. Further, such intelligence could be shared between systems, and passed from one system to the next during system expansions and upgrades. It’s certain that deep learning will lead to the development of systems that are consistently better than humans at recognising things in the material world. The power of a surveillance solution that could teach itself to recognise faces, gender, gait, mood, and to recognise events that breached its vast collective experience – many people running, gunshots, vehicles where they should not be, outbreaks of fire, groups in conflict, or any variable deliverable by any conceivable sensor input – is best encapsulated in that big little word ‘proactive’. n

se&n 73

SEM0718_72help.indd 73

28/6/18 2:16 pm


CEL

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

EBR

JULY 2018 ISSUE 400

AT I N G

events

400

ISSUES

PP 100001158

DEEP LEARNING

SEM0718_1cover.indd 1

l Convergint Technologies Acquires Integrators Australia l Protective Security Policy Framework Reforms Commence l What to See at Security 2018 Exhibition and Conference l Case Study: Ryalex Installs Mobotix at 489 Anytime Gyms l Case Study: ARM Security Transitions To Bold Manitou l Alarm Monitoring: This Month the Future is on Show l Product Review: AMC X864 Kit B For LSC Security Supplies l Special Report: Cyber Security of Security Networks l New Product: Pelco VideoXpert Releases Traffic Report l Special Report: Applying Thermal Surveillance Cameras

+

28/6/18 2:04 pm

Security 2018 Date: July 25-27 Venue: 2018 Mebourne Convention and Exhibition Centre Contact: +61 3 9261 4662 Security Exhibition brings the largest selection of electronic and physical security suppliers in Australia to one destination for 3 days.

Secutech Thailand

+

Dates: November 8-10, 2018 Venues: Bangkok International Trade and Exhibition Center Contact: +886 2 8729 1099 Secutech Thailand is a premier platform to showcase the latest innovations and build up strategic partnerships with the supply chains of security, smart home and fire and safety products.

SECURITY & GOVERNMENT EXPO

Security and Government Expo 2018

Date: November 2018 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with over 30 companies promoting their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

ISC West

=

Dates: April 9-11, 2019 Venue: Sands Expo, Las Vegas, NV, USA Contact: Outside the US call +1 203 840 5602 or email inquiry@isc.reedexpo.com ISC West is the largest security industry trade show in the U.S. allowing you to network with more than 30,000 security professionals, with technology encompassing everything from access control to unmanned vehicles from more than 1000 manufacturers and distributors.

DAILY, WEEKLY, MONTHLY.

SEM0718_74events.indd 74

28/6/18 5:08 pm


CSM Introducing Honeywell's Premium Range Of Security Cameras

Get Connected With Honeywell IP Solutions It's critical to partner with a leader who can open your world to the power of IP. For a complete IP security solution open your doors to the world's premier security provider. Customers have trusted Honeywell for over 80 years, and you can too with an easy, cost-effective transition from analog to IP. Honeywell's IP solutions include: • A quality professional offering of hybrid+ IP CCTV solutions • A complete selection of recording devices • A robust camera offering, including high definition cameras • A wide range of system components including compatible software, encoders/decoders and keyboards • Highly secure range of encrypted video solutions

SEM0718_75.indd 1

28/6/18 2:09 pm


Come and see

THE WORLD’S BEST BRANDS ALL IN ONE LOCATION Visit Us At Stand E20

SEM0718_76.indd 1

28/6/18 2:09 pm


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.