Sen june17

Page 1

JUNE 2017 ISSUE 388

PLUG AND PLAY!

l Review: Panasonic i-Pro Extreme l Case Study: Hikvision Makes the Grade l Hc3 Plus Installs Bosch at 1 Market St l The Interview: Andrew Bowden, Bosch l News Report: SecTech Camera Shootout l Monitoring: Mobile Device Security l Special Report: Installing Access Control l Selecting Plug and Play Video Solutions l Cyber Security: Leveraging Public Networks l Scenes From SecTech Roadshow 2017

PP 100001158

SEM0617_1cover.indd 1

1/06/2017 5:03 pm


Hills_VisionAd_APAC_210x297mm.indd 1 SEM0617_2.indd 2

2017-05-31 3:39 pm PM 1/06/2017 2:22


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS J U NE 201 7 ISSUE 388

By John Adams

WHAT WE LEARNED AT SECTECH ROADSHOW ITH SecTech Roadshow under our belts, it’s well worth considering preSecurity 2017 trends as we start to think about which products and technologies are most likely to rattle the cage at the year’s big show at Darling Harbour late July. Given what we saw at SecTech, there’s plenty going on in the access control market. Access control is becoming the electronic security industry’s golden child, with lovely new product coming from all directions and the established players releasing excellent new solutions and upgrades in their own right. From the point of view of installers and integrators, the key with access control is to balance maximum performance with ease of installation and competitive price. The best systems offer access control, intrusion detection, automation and CCTV integration, with local and remote mobile management. Alarm systems were another area of interest. What we saw at SecTech tended towards wireless and tended towards cloud. There’s a bias here, because manufacturers and distributors bring their newest stuff on the road but it certainly feels as if the cloud business model is growing. CCTV cameras. They are better than they have ever been, not just in terms of general performance but overall specification. You can get a beautiful bullet camera with an integrated housing, IP66/67, IK10,

W

There’s a growing intensity around electronic security – not as a necessary evil or a grudge purchase but as a suite of connected systems that enhance safety, manage security, inform and escalate response, facilitate investigations and save money.

integrated IR, motorised zoom and re-focus for a seriously affordable price. There are form factors for everything but try to get the best sensors. Some of the best optioned cameras seem to be making do with sensors that are not quite up to snuff – they tend to blur rapid movement even in the late afternoon. IVA – there was a lot of interest in IVA solutions at SecTech. This technology is getting better all the time so if you have an operational demand, make sure you present it to suppliers at Security 2017. It’s not just about basic line-crossing any more so you need to make sure to deliver IVA software the best data stream to chew on. When it comes to IVA, we also saw some face recognition authentication at the roadshow. This is an area where we expect to see more development over the next 5 years. There are challenges with face recognition but there are plenty of advantages, too. Something else that pulled crowds at SecTech was body worn cameras. The interest wasn’t just coming from law enforcement but from end users, and integrators as well. Given the evidence suggests BWC reduces complaints against police and security teams by a huge amount, perhaps this interest is not surprising. Want to reduce the pain of investigation and keep your officers and witnesses out of court wherever possible? BWC will do that for you. It’s a technology whose time really has come. Management software. There’s much more of it and it’s increasingly evolved. Management software is

also layered. There’s something for everyone – enterprise, local, from the access control side, from the surveillance side. Some solutions are better than others but 2017 is a great year to get out and compare the latest and greatest. The buzzword of the moment surrounding management solutions is situational awareness – depending on the application, the ability of a system to deliver status updates in real time is key. Entwined with the development of smarter management systems is the realisation that the technology exists to allow security and risk managers to proactively drive their security solutions to achieve outcomes in an economical way. This applies to smart city applications as much as it applies to transport hubs remotely managing collections and deliveries. And mixed in with all this was strong interest in the security aspects of our increasingly networked solutions. Integrators are definitely concerned enough about network security to arrive early to talk about it – this conversation needs to become a dialogue. But the biggest thing that came out of SecTech Roadshow was the level of interest shown by visitors. There’s a growing intensity around electronic security – not as a necessary evil or a grudge purchase but as a suite of connected systems that enhance safety, manage security, inform and escalate response, facilitate investigations and save money. What we saw at SecTech Roadshow was maturity and it was very pleasing to see. n

se&n 03

SEM0617_3ed.indd 3

2/06/2017 1:54 pm


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM0617_4_5.indd 4

1/06/2017 2:24 pm


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM0617_4_5.indd 5

1/06/2017 2:24 pm


- Extreme compression technology, WiseStream II - Bright colour images in low light environments - The world’s best WDR (150dB) - Accurate stabilisation using gyro sensors - Enhanced video and audio classification analytics Come & experience the Wisenet X series for yourself! Samsung Bar Stand D30

NSW 02 9749 5888 nsw@eos.com.au

SEM0617_6_7.indd 6 X Series A3.indd 1

VIC 03 9544 5633 vic@eos.com.au

EOS Australia Stand D39

WA 08 9249 5911 wa@eos.com.au

QLD 07 3252 9272 qld@eos.com.au

1/06/2017 2:24 pm


Formerly Samsung Techwin SEM0617_6_7.indd 7

1/06/2017 2:24 19/05/2017 2:36:13 PMpm


10

62

22

38: CUSTOMERIZATION

JUNE 17 22: PANASONIC I-PRO EXTREME With a strong feature set, great build quality, impressive specifications, including 60ips, 144dB of WDR and H.265 compression, 45m IR, auto image stabilisation and loads more, Panasonic’s 1080p i-Pro Extreme bullet camera nicely balances features and cost. 28: HIKVISION MAKES THE GRADE Integrator Security & Sound has installed a Hikvision solution for Becker Public School in Minneapolis, Minnesota as part of a security upgrade designed to protect its students, staff, and facilities. 30: TOP OF THE TOWN Integrator HC3 Plus has installed a Bosch IP video surveillance solution at 1 Market Street Sydney for commercial property owner, Investa. The system incorporates a wide range of cameras supported by high-end Cisco network infrastructure.

SEM0617_8cont.indd 8

Bosch’s national sales manager Andrew Bowden is one of the most dynamic things to happen to Bosch in many years. A singularly confident and respected character with intense focus, Bowden espouses a simple and compelling recipe for success – enhance the customer experience, reward the team, enhance the customer experience, make money, enhance the customer experience, have fun. 34: SECTECH CAMERA SHOOTOUT SecTech Roadshow’s big camera shootout gave installers, consultants and end users across the nation plenty to talk about. The shootout stacked the best PTZs (Sydney only), low light and bullet cameras up against each other, with plenty of interesting results. 48: INSTALLING ACCESS CONTROL Not long ago the complexities of installing access control meant it was an area of business closed to installers with less experience. Times have now changed and careful techs who want to branch out are now supported by a range of solutions that combined simplicity of installation with considerable expansion. 54: PLUG AND PRAY! Plug and play video surveillance is a kind of digital Holy Grail and an implicit recognition of the fact end-to-end analogue CCTV solutions have certain key advantages for smaller installers, including simplicity of installation,

1/06/2017 4:57 pm


30

68

28

58

regulars

modest hardware outlays and easy operation.

10 NEWS Latest business, product and technical news from Australia and around the world.

58: INTERNET: NOT JUST FOR FUN Internet connectivity is an important means of delivering business and security value, not just a recreational vehicle and a consummate aggregator of attention.

44: MONITORING Mobile devices are becoming increasingly prevalent as an extension of many electronic security solutions, where they allow end users to remotely manage their systems, as well as receiving alerts and status updates. For installers and monitoring stations, mobile devices can expand risk levels.

62: SECTECH ROADSHOW 2017 SecTech Roadshow 2017 grew again in its third year, with overall attendance up by 20 per cent. Australia’s national security technology roadshow, which took 17 of the industry’s leading distributors and manufacturers on a tour of the state capitals, has cemented itself as a fixture on the industry calendar – check out the full pictorial!

JUNE 2017 ISSUE 388

PLUG AND PLAY!

l Review: Panasonic i-Pro Extreme l Case Study: Hikvision Makes the Grade l Hc3 Plus Installs Bosch at 1 Market St l The Interview: Andrew Bowden, Bosch l News Report: SecTech Camera Shootout l Monitoring: Mobile Device Security l Special Report: Installing Access Control l Selecting Plug and Play Video Solutions l Cyber Security: Leveraging Public Networks l Scenes From SecTech Roadshow 2017

PP 100001158

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

68: EDITOR’S CHOICE What’s new from our manufacturers. 72: HELPDESK Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Contributors Simon Pollak Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: taniasdesign@ optusnet.com.au

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM0617_8cont.indd 9

1/06/2017 4:57 pm


Hills Bolsters Security Business with New BDM Appointments

Q Technology Group Appoints New CEO and MD p,12 Access Control Manufacturer Paxton Ranked in FT1000 p.14 Hills Now Distributing UTC Tecom C4 Open Interface p.16 Canberra Metro Seeking Security Services p.18 Independent Locksmiths & Security Launches Security Vision Networks p.20

NEWS IN BRIEF

COMPILED BY JOHN ADAMS

JUNE 2017

HITACHI SIGNS PARTNERSHIP WITH GEUTEBRUCK PACIFIC, STS AND CAMPUS WATCH

HITACHI Data Systems has formalised new agreements with Geutebruck Pty Ltd, the Australian division of Germany-based Geutebruck and Australian system integrators, Security & Technology Services (STS) and Campus Watch, to co-develop and deliver next-generation solutions, accelerate go-tomarket strategies and open new doors in the fast-growth Australian public safety and

security market. “As Digital Transformation continues to take hold, the public safety and security market in Australia represents a significant opportunity for Hitachi and its solutioncapable partner and alliance ecosystem,” said Phil Teague, industry and alliances solutions director, HDS ANZ. “Combining powerful solutions from HDS and Hitachi Insight Group with the solutions, skills and

capabilities of our partners will help our customers to better manage risk, reduce costs and, most importantly, ensure the safety of people and assets.” Anthony Brooks, CEO of Geutebruck Pacific said that by partnering with HDS, the company can offer clients a powerful solution for video visualization and threat detection that Vlado Damjanovski is fully integrated with the Geutebruck video management platform. “We also see the potential to transform our customers’ businesses beyond security surveillance requirements,” said Brooks. “By jointly leveraging our capabilities, we have the opportunity to support organizations undergoing digital transformation from improving operational processes and enhancing customer experience to developing innovative business models.”

CONSOLIDATED SECURITY MERCHANTS DISTRIBUTING TVT n TVT Digital Technology has announced a partnership with Australian electronic security distributor, Consolidated Security Merchants.

TVT is now supported by Consolidated Security Merchants which is the exclusive distributor for the region. Consolidated Security Merchants have extensive sales, training and technical support facilities around the country and will be working closely with TVT to build the brand in the region . According to CSM’s Wayne Trethowan, TVT is a total solution developer and

manufacturer, offering unique products including full range DVRs and colour cameras, IP cameras and hybrid DVR/NVR,HD AHD/ TVI DVR and cameras, high speed dome cameras, storage/decoding server solution and software solutions such as VMS, cell phone applications, and browser applications. “TVT reinvests more than 10 per cent of its sales turnover into R&D each

year,” Trethowan said. “With more than 300 talented engineers and many years’ experience, TVT is able to deliver to its customers the world’s latest technology and is committed to enhance the security and safety of people’s life and assets. TVT is one of the largest exporters of CCTV in China and has been in the Australian market for more than 5 years with its Truvue brand.”

HILLS STRENGTHENS QUEENSLAND BUSINESS, APPOINTS ARION COLLINS HILLS has announced that Arion Collins has re-joined the company as territory account manager, located out of the Queensland Hendra office. Arion left Hills in March 2016 to join ADT as a business development manager, before taking up a business development management position with SMA Security. Collins has returned to Hills as a territory account manager where he will strengthen the sales team, especially in the access control space. Collins has more than 10 years of experience working in the defence and security industries and has extensive knowledge in the areas of access control, CCTV and intrusion. Bill Sakellariou, head of sales - security, surveillance & IT for Hills, said Collins had a proven track record of expanding territories, increasing revenue, and providing hands-on customer service. “We are pleased to welcome Arion back to the team. He is an expert in the access control market and brings extensive experience to help grow and develop our customer base,” Sakellariou said. “He has a strong background in developing relationships with customers from all sectors, and will add depth to our sales efforts in the Queensland region.”

Arion Collins

Wayne Trethowan

10 se&n

SEM0617_10news.indd 10

1/06/2017 2:31 pm


They They see see a a well well secured, secured, bustling bustling city. city.

You see smart data that helps improve safety, You see smart data that helps improve safety, increase efficiency and reduce costs. increase efficiency and reduce costs. Bosch have always delivered the highest quality, relevant images, most efficient Bosch delivered therequirements highest quality, relevant images, efficientthe bitrateshave withalways the lowest storage and network strain,most and achieve bitrates with the lowest storage requirements and network strain, and achieve the highest standards in data security. Now with built-in video analytics as standard, highest standards in data security. Now with built-in video analytics as standard, our new i Series cameras allow you to interpret data directly at the source and our new iitSeries cameras allow you to interpret data directly therange source and reassign to help make smarter business decisions. See theat new including reassign it to help make smarter business decisions. See the new range including the DINION thermal 8000i and MIC fusion 9000i and ask for a demonstration of our the DINION thermal 8000i MIC fusionmonitoring 9000i andand ask configuration, for a demonstration of our Cloud-based Services thatand allow remote business Cloud-based Services that allow remote monitoring and configuration, business analytics, and much more. analytics, and much more. See us at Security 2017 or find out more at boschsecurity.com.au See us at Security 2017 or find out more at boschsecurity.com.au

Visit B sch onVSistait Bo sch on StandoD at Secur nd D6 Security 2061at ity 20 7 26 - 2 8 July 17 26 IC C S2y8 Ju yly ICC Sydne dney

Intelligent Intelligent Video Analytics Video Analytics

Data Security Data Security

Cloud based Cloud based Services Services Security_Advertisement_A4_Version 1.indd 1 SEM0617_11.indd 1 Security_Advertisement_A4_Version 1.indd 1

26/05/2017 4:47:26 PM 1/06/2017 2:23 pm 26/05/2017 4:47:26 PM


Hills Bolsters Security Business with New BDM Appointments

NEWS

MAT HARRISON JOINS HIKVISION AS SA/NT BDM

JUNE 2017

Q TECHNOLOGY GROUP APPOINTS NEW CEO AND MD n Q TECHNOLOGY Group has appointed Warren Sainsbury as MD and CEO after the resignation of Rob Rosa, who will remain on the board as non-executive director. Sainsbury has more than 19 years’ experience in electrical wholesaling and distribution and most recently grew a distribution business to $A70m in turnover. Sainsbury’s experience

THE QSS TEAM WE HAVE BUILT IS ONE OF THE BEST IN THE INDUSTRY AND I HAVE NO DOUBT THAT UNDER WARREN’S LEADERSHIP, AND SUPPORTED BY NEW PRODUCTS, THE TEAM WILL STRONGLY GROW THE BUSINESS AND ATTAIN THE LEADING POSITION IN THE INDUSTRY.

in recent times has been focused on embracing digitisation and digital strategies, including e-commerce, digital marketing, web strategies and on-line sales portals. With the continuing convergence of security technology, information technology and electrical product supply sectors it has been increasingly apparent to the board of QTG that the future business direction needs to encompass a wider range of customers and services than its historical base. The appointment of Sainsbury is part of the broader company strategy to position QSS as a successful, streamlined, efficient and agile organisations at the forefront of an industry undergoing a convergence trend. Rosa, who remains a significant shareholder in QTG, has spent the last 3.5

years overseeing a complete re-engineering of QSS, including a major overhaul of longstanding supply arrangements, which has seen the introduction of market-leading suppliers including Bosch, BPT, FLIR, NUUO, Senstar and Sunell. Under Rosa’s leadership, the company has consolidated and survived, becoming a leaner and more streamlined business which is capable of meeting the challenges of the market into the future with stability and growth. Rosa said that after 3.5 years in the business and 2.5 years as CEO, he feels now is the right time to hand the business to a new leader focused on executing the company’s plans to unlock the next phase of growth. “The QSS team we have built is one of the best in the industry and I have no doubt that under Warren’s leadership, and supported

Rob Rosa

by new products, the team will strongly grow the business and attain the leading position in the industry.” Rosa told SEN he had no intention of leaving the electronic security industry and after spending time with family he was looking forward to returning to assist steering QTG and to take on a new role in the electronic security industry.

HIKVISION appointed the experienced Mat Harrison to a business development role late April. “Hikvision Australia is pleased to welcome Mat Harrison to the team as SA/ NT business development manager,” said Hikvision’s Daniel Huang. “Mat has previously worked in technical roles for Hills (DAS), Madison Technologies and Video Security Products. With 10 years of industry experience, Mat brings a large understanding of the local SA/NT market. “Hivision’s team works closely with system integrators, and concentrates on relationships within our dealer partner program, making Mat an ideal fit.”

Mat Harrison

BGWT APPOINTS PAUL AMATO STATE MANAGER FOR SA

MELBOURNE HARDENS UP WITH SIRENS, BOLLARDS, MORE CCTV AFTER TERROR ATTACK n MELBOURNE will spend $A10 million on an emergency public address system, expanded video surveillance and a network of remotely controlled rising bollards to defend against vehicle attacks on pedestrians after 5

people were murdered by a vehicle driver in Bourke St Mall. While details are sketchy at present, the enhancements are being made by the Victorian Government at the request of Victoria Police and they likely build

on pieces of infrastructure already in place. According to the Sunday Herald Sun, the alert system would see speakers installed to enable police to send out mass warnings of impending terror attacks or any other threat to public safety.

Pop-up bollards are another major security upgrade likely in the wake of the Bourke St tragedy and overseas terror attacks, including the recent vehicle attack on Westminster Bridge in London.

BGWT has appointed Paul Amato as state manager for South Australia. “We are very pleased to announce the appointment of Paul Amato as the state manager for BGW Technologies South Australia,” said Robert Meachem, GM for BGW Technologies. Amato joins BGWT with more than years of experience in technical, sales, operational and management roles in the electrical, data, communication and security industry. “Paul’s key roles will be to service customer needs, promote the BGWT value proposition and grow sales for BGW Technologies and our valued suppliers in South Australia,” Meachem said. Paul Amato

12 se&n

SEM0617_10news.indd 12

1/06/2017 2:45 pm


CAMERAS ARE HIDING IN THE BACKGROUND HIKVISION’S NEW “SHADOW SERIES” 1300 319 499 csd.com.au VIC: Mulgrave, Tullamarine NSW: Northmead, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta SEM0617_13.indd 1

1/06/2017 2:24 pm


NEWS JUNE 2017

ACCESS CONTROL MANUFACTURER PAXTON RANKED IN FT1000

MOBOTIX APPOINTS RYAN FAIRCLOUGH APAC SALES DIRECTOR

n PAXTON, a UKbased access control manufacturer of IP access control solutions distributed locally by Security Distributors Australia, has been ranked in the Financial Times FT1000 list of fastest growing companies. The league table, published in cooperation with Statista, lists the 1000 companies in Europe that have achieved the highest percentage growth in revenues between 2012 and 2015. Paxton, which was founded in 1985 by Tony Ratcliffe, now group chairman, employs more than 300 staff and is based in Brighton, East Sussex, with several international sales offices. All products are manufactured locally at the Paxton factory in Eastbourne and exported to over 60 countries worldwide.

n RYAN Fairclough has

The company’s future growth plans include a turnover goal of £100 million by 2020 and this summer it will open a new, 29,000sq ft. Technology Centre alongside its current Brighton head office, further increasing the investment Paxton can make into product development.

Adam Stroud, Paxton MD

been appointed sales director for APAC. In his new role he will head the APAC Sales Team and oversee business development in Australia, New Zealand, South East Asia, Japan, India and China. Fairclough has been with MOBOTIX since 2012, jointly driving business development in Australia and New Zealand with the local sales team. According to Mobotix, as a valuable asset to the company, Fairclough will continue to promote growth throughout the APAC sales channels jointly with local sales teams and partners. “It’s an exciting time for MOBOTIX right now and we’ve laid some solid foundations in the APAC region,” Fairclough said.

“I’m looking forward to building on those, as the company heads in a fresh, new direction.” What Fairclough is alluding to is the opening up of the Mobotix ecosystem, bringing its pioneering product range to a wider market place by turning away from a solely proprietary model. “MOBOTIX is evolving and transitioning to a more customer-centric company, dedicated to opening up the market,” Fairclough said. “The first results of this can be seen with the launch of our new camera line Mx6 with H.264 compression, as well as the release of MxManagementCenter 1.4, bringing further improvements to the intuitive and flexible Mobotix video management software.”

Ryan Fairclough

IT’S AN EXCITING TIME FOR MOBOTIX RIGHT NOW AND WE’VE LAID SOME SOLID FOUNDATIONS IN THE APAC REGION... FAIRCLOUGH SAID. “I’M LOOKING FORWARD TO BUILDING ON THOSE, AS THE COMPANY HEADS IN A FRESH, NEW DIRECTION.

Net2 Entry Touch Smart, Simple Door Entry with a Premium Touch Durable 7” colour touch screen Personalise with multiple theme options Fully compatible with Net2 access control To learn more about Paxton systems, Call Security Distributors Australia on

1300 882 101 or email us at info@securitydistributors.com.au www.securitydistributors.com.au

14 se&n

SEM0617_10news.indd 14

1/06/2017 2:32 pm


Open the door to the future of security management… Party integration

Exclusive to Hills

TecomC4 is a dynamic new open platform software that can be combined with Challenger panels, TruVision CCTV and more to create a powerful security solution with a modern, easy to use interface.

Imagine... • • • •

being able to grant user access control or alarm privileges by simply conferring privileges from a tree structure with exceptions if necessary using a modern, intuitive interface based on industry standards being able to customise reports in real time using a single interface to control and manage CCTV, access or alarm devices across multiple sites

All done with TecomC4

See u s

at

Stand C16

The release of TecomC4 places Hills range of Interlogix products in an even stronger position… Contact Hills to arrange a demo of TecomC4, Challenger security panels or TruVision CCTV.

To learn more about TecomC4 call Hills on 1300 HILLS1 (445 571) or visit interlogix.com.au/tecomc4 T RU ST E D T EC H N O LO GY

SEM0617_15.indd 1

1/06/2017 2:23 pm


NEWS JUNE 2017

MIGRATION OF MONITORED FIRE ALARMS AND LIFT PHONES n AS the NBN network rolls out across Australia, Telstra’s existing fixed line networks are being progressively disconnected and this impacts on fire alarms and lift phones, too. Many clients have monitored fire alarms and lift emergency phones, which will also cease to operate unless they are migrated to an alternate telecommunications network before the disconnection date for their rollout region. Migration does not happen automatically and must be managed by integrators and end users. Monitored fire alarms and lift phones are safetycritical services and there are serious public safety, personal injury and

property damage risks if they fail to operate in an emergency situation. It is important that your clients register their services with NBN (nbn. com.au/fireandlift)

and make early arrangements for their migration by talking to their fire alarm monitoring and/or lift service provider.

HILLS NOW DISTRIBUTING UTC TECOM C4 OPEN INTERFACE n HILLS is distributing UTC’s Tecom C4 integrated open software solution that allows installers and end users to bring multiple systems together in a single interface. C4 is a single interface that allows management of all security systems, access control, intrusion and CCTV, whether locally or remote. Operators can drive and manage all their systems from a single interface, no matter the manufacturer, and there are multiple

reporting options, too. Behind the scenes is an MS SQL database with Open DataBase connectivity. What’s neat about C4 is the huge list of integration drivers that have already been written and the fact new drivers can be written using integrated tools. The simple nature of setup is a bonus, too - SEN recently had a demo of C4 and came away impressed with the system’s combination of simplicity and deep functionality.

Gabriel Daher (left) and David Lenz

NATIONAL MUSEUM OF AUSTRALIA SEEKS ACCESS CONTROL SOLUTION, SECURITY INTEGRATION n THE National Museum of Australia is planning a major upgrade and integration of its electronic security solutions after the recent upgrade of its CCTV solution to full IP. NMA will replace or upgrade its existing Honeywell EBI access control system, Commend intercom system, etc, with a new EACS, intercom system, new ACPs, new card readers, new access smart cards, new/existing

electric strikes, new/ existing electromagnetic locks, etc, with an associated HLI of security systems. The work will include cabling all new equipment, existing equipment (as required), integrating equipment and the NMA supplied headend. The contractor will remove redundant equipment and cabling. They will also integrate the EACS and intercom system with other

NMA security, IT and BMS equipment. The work will include reconfiguration of the display console and monitor layout in the security control room for the EACS workstations and management of the cutover from the existing access control and intercom systems to the new EACS. As part of the process, access control systems at NMA’s Acton and Vicars

Street Mitchell premises shall also be completely upgraded. The existing access control Systems at McEacharn Place and Gladstone Street will be incorporated into the maintenance responsibilities/program of the EACS Upgrade. The National Museum of Australia preserves and interprets Australia’s social history, exploring the key issues, people and events that have shaped the nation. The building has 6600 square metres of exhibition space and is composed of several individual spaces pieced together like a jigsaw puzzle, forming a semicircle around the Garden of Australian Dreams. Designed by architect Howard Raggatt (design architect and design director for the project), the museum building is based on a theme of knotted ropes, symbolically bringing together the stories of Australians. The shape of the main entrance hall continues this theme and the entirely non-symmetrical

complex is designed to not look like a museum, with startling colours and angles, unusual spaces and unpredictable projections and textures. In December 1996 the building of the Museum was announced as the key Centenary of Federation project, and Acton Peninsula was chosen as the site, with funding confirmed in 1997. The National Museum of Australia opened on 11 March 2001. It is home to the National Historical Collection and is one of the nation’s major cultural institutions. Closing date for the tender is June 23, 2017.

THE WORK WILL INCLUDE RECONFIGURATION OF THE DISPLAY CONSOLE AND MONITOR LAYOUT IN THE SECURITY CONTROL ROOM FOR THE EACS WORKSTATIONS AND MANAGEMENT OF THE CUTOVER FROM THE EXISTING ACCESS CONTROL AND INTERCOM SYSTEMS TO THE NEW EACS.

16 se&n

SEM0617_10news.indd 16

1/06/2017 2:32 pm


SEM0617_17.indd 1

1/06/2017 2:23 pm


NEWS JUNE 2017

CASTLEMAINE HEALTH SEEKS GALLAGHER UPGRADE CASTLEMAINE Health has gone to tender with a project to upgrade its access control solution with integrated automation across multiple subsystems. The organisation seeks automated emergency lock down and secure after-hours access to all entrances providing access to Urgent Care, Acute, overnight accommodation on Rehab, mechanical equipment and access to the KeyTel Communications system in the engineering department. This includes data logging and historical information of access to the hospital, for analysis and reference when required. There is an existing Gallagher system that was installed to provide secure access to drug rooms throughout the hospital and aged care

RMIT HAS SOUGHT REPLACEMENT ACCESS CONTROL SOLUTION

buildings. This system is to remain fully operational while the new extension of the Gallagher system is installed. Castlemaine Health delivers a diverse range of inpatient, outpatient and outreach services to the Shire of

Mount Alexander. This also includes provision of assessment, rehabilitation and allied health services to neighbouring shires. With around 660 employees, we provide an extensive range of health services to the community of Castlemaine

and the surrounding region. With a clear regional focus, the Health Service’s role within the Loddon Mallee Region has developed to meet the needs of a growing population. The tender closes on June 9, 2017.

CANBERRA METRO SEEKING SECURITY SERVICES n JOHN Holland has gone to tender on behalf of the Canberra Metro project, a light rail network being constructed from Gungahlin in the North to the City which will commence operation in 2018. Key features of Canberra Metro system include a laid rail distance of 12km,

6-minute peak service with 10-15 minute off peak, 13 stations, 14 light rail vehicles, 24-minute journey time, 2 dedicated wheelchair spaces, Bikes on board and a capacity of more than 200 people per train. The types of goods and services that will be required by Canberra Metro during

construction are broad and include facilities support for cleaning, security and waste management among others. Important for security integrators, Canberra Metro is keen to work with local businesses to understand new innovations, or potential products or services that

will deliver benefits not only during construction but can be carried forward into operation. The current tender does not mention security systems that will certainly be required for carriages and stations, including surveillance solutions and help points, but security integrators should seek more detail in relation to them. Prospective suppliers should contact Canberra Metro directly to promote your product or service by registering your EOI within the Any Opportunities work package. The Canberra Metro consortium, formed by Pacific Partnerships, John Holland, Mitsubishi Corporation, Aberdeen Infrastructure Investments, CPB Contractors, Deutsche Bahn International, CAF and the Bank of Tokyo – Mitsubishi UFJ, Ltd., will design, construct, maintain and operate the project for 20 years. The tender closes December 30, 2017.

ROYAL Melbourne Institute of Technology has sought to replace or upgrade its access control system. The university’s access control demands are considerable – there around 5000 academic staff and 83,000 students and the campus has around 90 buildings. RMIT says it intends to replace and/or upgrade the current RMIT electronic access control system with a warranty and maintenance regime that presents security and value for money to RMIT. Founded in 1887, the City campus began as the Working Men’s College of Melbourne. Its original building is situated on the corner of Bowen Street and La Trobe Street, and the campus has since grown to 87 buildings in 2016. The campus has no perimeter walls. As such, its buildings are contiguous with the surrounding city. Most of its buildings are spread across 6 city blocks covering approximately 720,000 square metres bound by La Trobe Street to the south, Elizabeth Street to the south-east and Swanston Street to the north-east (connected by Franklin Street), Queensberry Street to the north, Lygon Street to the north-west and Russell Street to the south-west.

18 se&n

SEM0617_10news.indd 18

1/06/2017 2:32 pm


SEM0617_19.indd 1

1/06/2017 2:23 pm


NEWS JUNE 2017

FREDON WINS CONTRACT FOR OPERA HOUSE MECHANICAL SERVICES REFURBISHMENT

n FREDON has won the contract to refurbish mechanical services at the iconic Sydney Opera House, including an historic upgrade of the main theatre. The upgrade works are the largest since the Opera House opened in 1973. Laing O’Rourke is the head contractor, and Fredon’s Client Services Group (CSG) will undertake the work. CSG works primarily with pre-existing

structures, specialising in refurbishments, tenancy fitouts, building extensions, central plant upgrades and replacements. “Our retrofitting expertise will come to the fore as we face the challenges of working in and around the tourist crowds, the constraints of plant rooms and spaces that are not necessarily designed with modern equipment in mind,

and the standards of care, fit and finish required for such an iconic building that boasts world heritage status,” said Fredon. The work on the main concert hall will involve co-ordinating with the replacement of 1970’s vintage custom stage machinery, including safely working over cavernous internal voids as high as a multi-story office block. Security solutions will also be upgraded during this overall refurbishment process but SEN has heard no word on that contract at this time. Last year Fredon’s Security Division took out ASIAL’s Excellence Award for Technical Security Solutions - projects over $100,000 for a unified access control and video surveillance system with fixed and wireless duress in an iconic building at Martin Place Sydney occupied by the NSW Department of Premier and Cabinet.

INDEPENDENT LOCKSMITHS & SECURITY LAUNCHES SECURITY VISION NETWORKS n INDEPENDENT Locksmiths & Security has expanded its electronic security division with the launch of Security Vision Networks. According to Ryan McGovern, in 2016 Independent Locksmiths & Security launched a managed security system called secCloud and a high definition CCTV system, secWatch. “This year sees us further develop the electronics division of our business with the launch of Security Vision Networks,” McGovern said. “With Security Vision Networks, we can now offer all our clients a managed security service that specialises in security and IP networks, including design, installation, monitoring and maintenance of security systems for the government, industrial and commercial markets.” Security Vision Networks complete security solutions include: l secCloud managed

security system with swipe card access control, intruder detection and building automation. l secKeyCloud - a web based platform to manage the Cyberlock Electronic MasterKeying System l 24hr remote video monitoring - secWatch Stream live video to your phone or laptop, from high definition cameras, so you can check your property from anywhere, anytime. l Virtual Pulse -remote device management. “We have been offering our clients electronic security systems tailored to their specific needs for the past 15 years,” said McGovern.

Ryan McGovern

TRANSPORTATION SECURITY ADMINISTRATION TAKES BAG CHECKS HIGHER TECH

ALARM.COM NOW INTEGRATES WITH GOOGLE HOME

place certain electronics and other items in a separate bin for screening in an effort to de-clutter baggage.” Depending on the results, the TSA said it may expand the enhanced procedures to other U.S. airports. “As we have said time and again, TSA continuously enhances and adjusts security screening procedures, both seen and unseen, to maintain the highest levels of security,” the statement said. The U.S. Department of Homeland Security, which oversees the TSA, said that the increased security has nothing to do with a recent decision to ban carry-on electronics on U.S.-bound flights from 10 countries in the Middle East and Africa.

n USERS of Alarm. com solutions now have the ability to use voice commands with their Google Home to control their smart security systems. Functions include arm and disarm security systems by speaking to the Google Home device. Users have the option of requiring a 4-digit PIN to disarm the security system. Other abilities include unlocking doors, checking the status of devices, changing the temperature and controlling whole groups of devices such as lights.

n TRANSPORTATION Security Administration in the U.S. is currently testing ‘enhanced security procedures’ for carry-on bags at several airports in the United States, specifically electronic devices larger than a cellphone. The TSA public affairs office said the tighter security screening for luggage in the passenger cabin were being tested at 10 airports in the country. “Over the past year, TSA has been adjusting screening procedures at select U.S. airports on a trial basis in an effort to improve screener performance at the checkpoint,” the agency said in a statement. “Travellers at select test locations may be asked to

“This is not nationwide, nor related to current restrictions on large electronic devices for passengers to the U.S. from 10 overseas airports,”

DHS said in a tweet. TSA emphasized that the new security does not impact which items passengers are allowed to carry on commercial flights.

Mike Richardson

20 se&n

SEM0617_10news.indd 20

1/06/2017 2:32 pm


Complete Security Integration...

Download the free TSP App from

www.tyco-tsp.com

Watch

Touch

Detect

Expand Your Offerings to Cover Intrusion, Video and Access Control with One Single Solution A powerfully complete solution - simple to manage and easy to install. All in-one integrated intrusion, video surveillance and access control gives users greater control through one single and easy to use interface, while giving you a simple and quick to install solution to boost your revenue and amplify your business opportunities.

• • •

Kantech access control + Exacq video surveillance + DSC intrusion All managed and accessed from 1 platform - Choice of Kantech or Exacq users Download the app, scan the shopping bag image below and watch a video of how our products integrate together to give you a powerful, complete solution.

For more information or more products from Australia’s largest range of security systems call 1800 685 487 or visit hills.com.au/ branches for your nearest location nationwide.

For more information:

Pacific office 137 McCredie RoadGuildford, NSW 2161, Australia Tel: +612 8717 2000 © 2017 Tyco Security Products. All Rights Reserved.

SEM0617_21.indd 1

1/06/2017 2:23 pm


● Product review

Panasonic

PANASONIC I-PRO EXTREME

With a strong feature set, great build quality, impressive specifications, including 60ips, 144dB of WDR and H.265 compression, 45m IR, auto image stabilisation and loads more, Panasonic’s 1080p i-Pro Extreme bullet camera nicely balances features and cost.

HERE’S a lot to like about Panasonic’s WVT S1531L iPro Extreme Bullet. It has nice build quality, with a combination of metal and silver poly, is very easy to install and has pleasing performance vectors, including a high frame rate that doesn’t blow out the bitrate budget. It’s not the sharpest 1080p bullet camera on the market but contrives to deliver faces and plates when many other bullet cameras can’t thanks to liberal doses of amplification. As tempting as it is to rave on about performance, let’s briefly look at some specifications. Panasonic has

crammed plenty of features into this camera. There’s a touchable titanium dioxide Rain Wash coating, H.265 smart coding (Long GOP, Auto-VIQS, Smart Face Coding), H.264 compatibility and mixed mode streaming, recording and viewing, auto image stabilization, secure communication, up to 4-stream simultaneous H.265/264 encoding, enhanced Super Dynamic 144dB at 30fps (depending on model), ultra-high sensitivity from 0.008 lux to 0.015 in colour mode (depending on model), and built-in IR LED. There’s Intelligent Auto (iA) which is claimed to

22 se&n

SEM0617_22pana.indd 22

1/06/2017 2:33 pm


BY J O H N A D A M S

increase discernibility in low visibility, day/night function with minimum scene illuminations of 0.012 lux in colour and 0.006 lux in monochrome, both at F1.6 and a fairly slow shutter speed the specification doesn’t mention. Smart face coding, or Intelligent Face Compression, provides high picture quality at ‘face best shot area’ while reducing other nonimportant areas to save network bandwidth and disk space. There’s Super Dynamic WDR and BLC, Enhanced Super Dynamic Day/Night, day/night (ICR) and auto back focus/focus assist. The motorised lens is 2.8-10mm (3.6x) with a maximum aperture of F1.6 giving an angle of view between 31-112 degrees. There’s integrated 2-way audio, SD memory card slot, external I/O, vandal resistance to IEC62262 and IK10 and water and dust resistance to IP66 and NEMA 4X. The beast is rugged – it will handle operating temps of -40 to 60C, which is good going. Power is by PoE or 12V DC and the camera weighs in at less than 1kg. Importantly, all the i-PRO Extreme cameras provide a highly secure protection layer and robust authentication to guard against cyber threat with a PC-level IP data security suite via Panasonic Secure Communication technology, and Symantec Device Certificates. This suite includes attack detection, which is good to know. Our hardware at SEN is the same old Dell Opteplex 9020 that needs a video card upgrade (it’s fine with 1080p) and our little Netgear Prosafe GS108P POE switch. There are no cameras on the network and we’re browsing into the camera via onboard software across our 1GB local network.

Some over exposure of bright areas

Faces and plates

DRIVING THE BUS I start out in the back lane looking Nor-West into about 80,000 lux. I notice some internal reflections in these conditions but nothing that impacts on the usefulness of the images. The 2.8-10mm motorised lens has a wide view and the camera has very useful distortion correction to support it. The images are a little soft and there’s some blending in surrounding walls probably due to face priority, which I have activated. Regardless, I have a lot of detail, including faces, deep into the scene. This is a 1080p image stream so though I select my usual focal length of about 5.5mm, digital zoom has the typical limitations. Not so with motorised zoom, which is able to lean in and pick up detail in the potential angle of view – though you need to plan for full zoom during commissioning or you end up with very sharp images of a patch of road devoid of context. As the afternoon moves on I retain plates. There’s a little blooming of brake lights after 4pm, which suggests shutter speed is easing and I notice some blur and tone mapping – these are at the default noise/blur camera settings. It’s winter in Sydney and between 4.30 and about 5.15pm it goes from gloom to almost fully dark. During this time noise increases. I get a wee purple

Distant plates at longer focal lengths

Good colour rendition

se&n 23

SEM0617_22pana.indd 23

1/06/2017 2:33 pm


● Product review

Panasonic IMPORTANTLY, ALL THE I-PRO EXTREME CAMERAS PROVIDE A HIGHLY SECURE PROTECTION LAYER AND ROBUST AUTHENTICATION TO GUARD AGAINST CYBER THREAT...

Faces in the afternoon

And plates

Softer as light falls

Monochrome and wider view

ghost from a streetlamp in the upper half of the image, colour rendition is surprisingly good and the camera renders the night sky much lighter than it appears to the naked eye. The colour temp is true, too, which I like. At about 6pm I push the camera into night mode with IR activated. My noise/blur settings are at default and there’s blur of a figure in the lane. Next day, our street scene challenges the i-Pro bullet in other ways. During the day, this camera has good depth of field, though it tends to overexpose in extreme conditions – in this case we are going from about 8000 lux into 80,000 lux. What the camera seems to do is expose for the shady side of the street – over-exposure is less impactful on situational awareness than dark holes in a scene. In these situations, there’s luminosity of scene highlights – a sort of halo effect around bright objects whether static or moving. Colour rendition remains good with no false colours and chromatic aberrations are extremely well controlled. I can’t see any at all. Getting plates on the street in daylight is achievable, too, and the longer the focal length, the deeper in you can snare them. As the day goes on and the sun moves off the far side of the street, the image becomes composite, zoom and focus are good, though not as quick as the leading bullets. There’s some lens/front window flare and a little bright orange-crimson ghost caused by an internal reflection off the Mag-Fluro coating on the front element. Out front with higher levels of foot traffic on the second day of our test I pay more attention to the play off between ISO and blur. In lower light levels – it’s about 3.15pm now - the way things appear is that when the scene is static, noise levels are very low but introduce a moving vehicle or person of a given size and heavy ISO kicks in immediately – the latency is between 1-2 seconds. The level of ISO is dependent on the position of the slider – are you happier with noise or with blur? Like most of you, I’m happier with noise, so long as there’s a face peering out of it. During the afternoon, I spend quite a lot of time trying to find the right balance between blur and noise on the DNR slider, landing on a setting of 75. This comparatively noisy image in the presence of movement when light levels fall is a bit disarming at first but as night moves in and light levels plunge it becomes clear that for surveillance noise is much better than blur, if compression can manage bitrate – which with this camera it certainly can. In fact, that’s probably a key thing to consider with smart codecs and H.265. Noise is no longer a dirty word. Whenever a particular amount of movement is present in the scene as light falls, ISO mechanisms

24 se&n

SEM0617_22pana.indd 24

1/06/2017 2:34 pm


MORE PRODUCTS, MORE SOLUTIONS, MORE FLIR.

T HE NE W P T-SER IE S HD The most powerful pan tilt security camera systems, available with a cooled or uncooled thermal camera optimized with up to a 12x optical zoom and a 30x HD visible camera. T HE NE W UNI T ED V MS 8.0 Versatile, ease of use performance with tough cyber security, and the largest integration of thermal cameras and third party technologies. Learn More at flir.com/security

SEM0617_25.indd 1

1/06/2017 2:25 pm


● Product review

Panasonic

Colour at 7 lux (foreground) and 7mm

Monchrome

wind up and the stream exhibits global amplification noise. This might seem like the end of the world but as we observed at SecTech, it’s not if you can get a plate or a walking face that’s court admissible. In gloomy conditions on Bellevue St, the i-Pro Extreme bullet starts to operationally outperform some illustrious competition simply through its capacity to snare a face inside 20m with the minimum of motion blur by turbo-charging ISO and controlling bitrate. There’s a point things do get murky, however. As light sinks below 10 lux, blur appears and plates are lost but faces cling onto admissibility in colour down under 7 lux. Thanks to that ISO capability, this camera also gets plates when others can’t – even out to about 20 metres, which surprised me. After 5pm in colour mode, I lose plates at 30-40kmph but faces remain for another 30 minutes until it’s full dark and then the combination of noise and blur erodes them. This said, it’s still possible to get court admissible faces at certain angles to available light, as well as considerable detail of clothing. I switch to night mode first with IR on and then off to get plates – I can get static plates but not moving plates. Blooming is reasonably controlled, too. But faces are still hard to guarantee. The Panasonic i-Pro Extreme bullet is a good camera. It’s designed to offer the maximum performance in the most rugged package at the most competitive price and it balances those conflicting requirements well. n

WDR performance

FEATURES OF THE PANASONIC I-PRO EXTREME BULLET INCLUDE: l

1080p, H.265, 45m IR

l

Auto-VIQS, Smart Face Coding

l

Rain Wash Coating

l

Intelligent Auto (iA)

l

2 .8-10mm (3.6x) F1.6 Motorised Lens with autofocus

l

Vandal resistant to IEC62262 and IK10

l

W ater and dust resistant to IP66 and NEMA 4X f

l

S uper Dynamic WDR of 144dB.

26 se&n

SEM0617_22pana.indd 26

1/06/2017 2:34 pm


SEM0617_27.indd 1

1/06/2017 2:25 pm


● Case study

Becker Public School

HIKVISION MAKES THE GRADE Integrator Security & Sound has installed a Hikvision solution for Becker Public School in Minneapolis, Minnesota as part of a security upgrade designed to protect its students, staff, and facilities. ECKER Public School needed a complete electronic security upgrade and contracted local integration business Security & Sound to handle the work. According to Phil Otto, CFO of Security & Sound, the company’s engineers proposed using a multiple-phase installation with Hikvision surveillance cameras to complete the system. Otto says the first stage of execution improved visibility around exterior entries, while the second stage saw upgrades to interior areas with IP cameras and expanded coverage of hallways and rooms. Challenges to this project included finding cameras that were both durable and unobtrusive, selecting vandal-resistant products for outdoor areas, and securing zero-light areas at night with infrared cameras. “As with most schools, the Becker School District had concerns about their parking lot surveillance coverage and video capabilities after dark,” Otto says. “We recommended Hikvision’s DarkFighter line of PTZ cameras in key outdoor areas where evening lighting was an issue but colour video was desired. Hikvision’s DS-2DF8223I-AEL 1080p PTZ camera was chosen to cover the parking lots due to its colour lux rating of 0.002 and built-in tour and auto tracking features. The camera’s low light capabilities coupled with the ambient light from the parking lot allow the camera to stay in full colour at all times regardless of cloud cover or inclement weather.”

B

AS WITH MOST SCHOOLS, THE BECKER SCHOOL DISTRICT HAD CONCERNS ABOUT THEIR PARKING LOT SURVEILLANCE COVERAGE AND VIDEO CAPABILITIES AFTER DARK.

Like most school districts around the country, officials at Becker Public Schools in Minneapolis were horrified by what occurred at Sandy Hook Elementary in December 2012. Almost immediately after the incident, the district began a multi-step security upgrade. They started with locks and intercoms and later turned their attention to the aging video surveillance system. “We were really looking to expand our camera system following Sandy Hook,” says Sumre Robinson, network manager for Becker Public Schools. “It wasn’t necessarily to increase the numbers of cameras, but to eventually be able to provide access to the cameras to police in an emergency situation.” Robinson also wanted to take advantage of the school district’s campus network system and make things simpler for the principals and other staff that would be using the cameras. “We were looking for internal end user simplicity,” she says. “We wanted our principals, building and grounds directors to be able to easily find what they were looking for without necessarily reaching out to the tech department. We were trying to make them more self-sufficient.” The school district already had a number of cameras, ranging from analogue (many of which were beginning to fail) to IP cameras from another manufacturer. But Otto and the Security & Sound team felt the Hikvision cameras would give the district not only the best coverage, but also the best range of choices that fit within the budget. “One of the issues commonly found in budgetconscious school district facilities is the lights go out after events and school activities have ended,” Otto says. “We needed a camera line that would not only fit the budget but also provide a crisp image in complete darkness. Hikvision had several IP cameras to choose from that required no light to operate and provide a clear image utilizing built-in IR. There were also a number of design challenges both indoor and outdoor that required a small form factor, vandal-resistant dome cameras, bullet and PTZ cameras. Hikvision has a full range of IP cameras in each of the categories we were looking at.” According to Robinson, the Hikvision cameras were not only better for the budget, they were better cameras than even the newer ones the school district had before. “It is incredible the difference in the clarity,” she says. “And we were able to add more cameras than we originally planned because the camera cost was far less than we were expecting.” n

28 se&n

SEM0617_28hik.indd 28

1/06/2017 2:34 pm


Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Toll Free: 1300 557 450 (Australia only) Email: salesau@hikvision.com

SEM0617_29.indd 1

1/06/2017 2:38 pm


â—? Case study

1 Market Street

TOP OF THE TOWN Integrator HC3 Plus has installed a Bosch IP video surveillance solution at 1 Market Street Sydney for commercial property owner, Investa. The system incorporates a wide range of cameras supported by high-end Cisco network infrastructure.

30 se&n

SEM0617_30market.indd 30

1/06/2017 2:37 pm


BY J O H N A D A M S

UMBER 1 Market Street is a prominent A-grade commercial office tower, located adjacent to Darling Harbour and a stone’s throw from the vibrant centre of the Sydney CBD. Late last year, Investa’s management decided to upgrade the aging analogue camera system. Investa is an $A10 billion plus commercial property owner and manager of more than 40 office buildings nationally, with 17 of these located in the Sydney CBD so the company undertook a full tender process and after careful consideration, integrator H3C PLUS, headed by Nicholas Churchill and Jonathan Hughes, won the project. A number of factors influenced Investa to award the project to H3C PLUS, key considerations being the need to invest in cabling and quality all-round cameras that performed well during day and night. As part of the scope of works, H3C PLUS replaced the analogue coax cable and installed a 12-core multi-mode optic fibre backbone, running from the basement to the roof of the 33-storey building. There were 3 nodes (Basement, Level 6 and Level 33) created with a rack and UPS at each location. All cameras were cabled via a new Cat-6 cable to the respective node. H3C Plus also installed 3 workstation locations for the security room,

N

Rooftop cameras overlook Darling Harbour and Sydney City CBD

WE CHOSE BOSCH CAMERAS FOR THEIR PERFORMANCE IN DIFFERENT LIGHT CONDITIONS AND THE QUALITY IMAGES THEY PRODUCE.

Outdoor IR FLEXIDOME IP 1080p cameras on the cafe’s balcony IR FLEXIDOME IP 1080p cameras are located throughout the lobby and near the lift towers

building manager’s office and the concierge desk at ground level. When it comes to the camera installation, outdoor AUTODOME PTZ and FLEXIDOME IR IP 1080p cameras are scattered around the building’s perimeter. There are 33 Bosch 1080p AUTODOME and FLEXIDOME cameras across 4 zones: Building perimeter, car park/dock, general lobbies, and plant room/roof. Another 3 AUTODOME IP 5000 HD 1080p PTZs are located at key vantage points near front and back entrances. These outdoor PTZs feature high-speed PTZ control with 30x optical zoom and accurate colour reproduction in scenes with varying lighting levels, providing identification of people up to 180m without loss of detail. The remainder of the 30 cameras comprise FLEXIDOME IP 5000 HD (outdoor and indoor versions). These feature 1080p resolution for sharp images, IR option (with 15m viewing distance) and an auto zoom/focus lens for quick installation and setup. “We chose Bosch cameras for their performance in different light conditions and the quality images they produce,” says Nicholas. “Their ONVIF compliance also made them compatible with Geutebrück VMS, the platform specified by Investa. With a bit of tweaking optimal integration was achieved.” Apart from technical aspects, aesthetics were also considered. The previous installation left large

se&n 31

SEM0617_30market.indd 31

1/06/2017 2:37 pm


● Case study

1 Market Street

Jonathan Hughes (left) and Nicholas Churchill from H3C PLUS

the new fibre backbone which future proofs the building’s IP communications capabilities.” Meanwhile, the Investa management team said they were pleased with the quality of the solution. “We at Investa pride ourselves of being at the forefront of safety and technology,” said Investa. “The innovation brought to the table and the seamless installation was a credit to H3C Plus.” n holes and facade damage in key places around the building. To rectify this, colour-coded plates matching the colour of cameras were used. Jonathan Hughes, who worked closely on the project with Investa from its inception, identified that the facade of the building was of great importance to the owners given the status and location of the building. “The plates covered up previous damage, added to the overall aesthetics of the installation and the owners are pleased with the result,” Hughes said. “The H3C Plus team holistically managed the end to end project with the on-site Investa FM team to ensure key critical cut over dates were achieved. According to Nicholas Churchill, he and Hughes are pleased with the integration. “Overall, Jonathan and I are very happy with the result delivered for 1 Market Street,” Churchill said. “Objectives derived from the security audit and client’s brief were achieved. We are also pleased with the performance of the Bosch cameras. The image quality is impressive. Apart from the deployed CCTV solution, Investa management also welcomed

THE INSTALLATION AT 1 MARKET ST INCLUDES: l

3 Bosch AUTODOME IP 5000 HD PTZ (NEZ-5230)

l

30 x Bosch FLEXIDOME IP 5000 HD (NDI-50022)

l

3 x CISCO Network Switches

l

3 x UPS stations

l

2 50m of 12-core fibre optic cable.

32 se&n

SEM0617_30market.indd 32

1/06/2017 2:37 pm


innerrange.com

INTEGRITI SIFER READERS SIFER is a Multi-Drop RS-485 Smart Card reader boasting end to end AES encrypted communications from the users card right through to the door module. With configurable multi-colour LED indicators SIFER provides instant visual indication of both Security Area and Door status, while its multi-tone speaker sounds access granted, access denied and door open too long tones. This OSDP based reader is competitively priced and sure to be a game changer.

CARDS SIFER Mifare / DESfire EV1 credentials include a flexible range of ISO cards and Fobs consisting of: • Pre-Programmed ready-to-use stock credentials • User-Programmable credentials using the SIFER Card Programming station • Custom Programmed credentials programmed to order by the Inner Range factory

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM0617_33.indd 1

T: 1300 319 499

W: csd.com.au

1/06/2017 2:25 pm


● Special report

SecTech shootout

SECTECH CAMERA SHOOTOUT Every time you bolt a bunch of CCTV cameras to a test jig and start playing with the lights, there’s something new to see and we learned plenty at this year’s event. Most importantly we discovered the best cameras are even better than they were last year. ECTECH Camera Shootout was enthralling and challenging in multiple ways. Despite a day of pre-commissioning in Sydney there was still plenty of work required in every city to stay on top of things – in fact wrangling the big group of engineers and technicians was the biggest operational challenge of the event and organisers didn’t get on top of that until Brisbane – this meant a few management-related hiccups along the way. Next year’s pre-commissioning is slated to go for days – we’ll start the tour with an operational system that is locked in place with only minor tweaks allowed.

S

The nature of SecTech’s Camera Shootout is that in order to get a sense of what’s best you need to be in the room and to that end, we don’t list which cameras we thought were best, though there were a number we liked, including a newcomer we’d never seen before. The shootout is subjective in any case, with considerably different test spaces offering variations of reflectance and ambient light. Arguably Melbourne was the toughest for light – we could only get down to 0.7 lux at the face and there was ambient IR in the room (albeit only a small amount with a wide angle of view around 25m from the target) that management refused to turn off. The PTZ group in Sydney attracted a great deal of interest – the cameras tested were the best in the world and the huge venue gave us the opportunity to get a clear sense of which looked best. There’s a dynamism to PTZ tests that’s well worth revisiting. We should point out here that Bosch’s MIC camera didn’t appear in the test group because of IP address contention – we’ll take a look at that camera separately next issue. Every year organisers battle to get uniformity across the contenders. This is partly because each group of engineers has its own ideas – for instance, they may use a wider angle of view to retain maximum aperture in low light (with a subsequent impact on WDR performance). Each year there are

34 se&n

SEM0617_34shootout.indd 34

1/06/2017 4:58 pm


SEM0617_35.indd 1

1/06/2017 2:25 pm


● Special report

SecTech shootout

pleas for organisers to stipulate stricter conformity – the same resolution, the same bitrate, the same frame rate, the same lenses and angles of view. This year, organisers divided the groups not by resolution but by form factor, given form factor is often the governing consideration. There were also cost variations but they were not as considerable as in the past. The disparity in lens prices was less this year, too. Certainly, all contenders are entitled to install quality lenses on full body cameras, even if these are just high end Fujinon lenses, not specialised manufactures. Something else we saw this year was a couple of manufacturers locked in colour, which gave us a clear sense of how long they could retain colour but we didn’t get an idea of how well they’d have done in night mode. This was a shame, according to some delegates. While all the variations tend to suggest an applesto-pears comparison, SecTech Camera Shootout is first and foremost a test of which camera does best in the conditions they are pointed at, regardless of specification and camera settings, with viewers able to decide for themselves on the basis of image quality (sharpness and noise levels), bitrate and motion blur who is robbing Peter to pay Paul. Throw aircraft landing lights into the equation and things get very messy indeed – next year we’ll be adding strobes. The idea is that attendees think about performance, see variables, get a sense of the limitations of the technology and run headlong into the laws of physics (and their sub-laws of signal processing). This was most noticeable in Brisbane, where in a compact and very dark room, we found that while the latest generation of IP CCTV cameras are very good, they are cannot (Sony’s VB770 notwithstanding), see in the dark. For a number of years, surveillance camera choice has been predicated on low cost, even if silly angles of view on 1080p domes have robbed image streams of what little sharpness they had left after burrowing through a couple of millimetres of low quality smoked plexiglass. Camera demos like SecTech’s Camera Shootout don’t only start a conversation about image quality, they allow vistors to see whether or not the emperor is wearing any clothes. What’s at the heart of this discussion is raw camera performance in challenging conditions – gloomy or night time applications under sub-10 lux where so many incidents take place and where movement – even at walking pace - headlight flare and poor camera positioning can render CCTV

THE PTZ GROUP IN SYDNEY ATTRACTED A GREAT DEAL OF INTEREST – THE CAMERAS TESTED WERE THE BEST IN THE WORLD AND THE HUGE VENUE GAVE US THE OPPORTUNITY TO GET A CLEAR SENSE OF WHICH LOOKED BEST.

systems not useless but certainly very much less capable than they ought to be. We saw some interesting developments at SecTech. Perhaps the biggest one for me was the realisation that improvements in compression are liberating ISO – lots of ISO – and that amplification is certain to be one of the key areas of development in the future. It’s not surprising, given that ISO is such a big deal in DSLRs – the difference in quality between early digital cameras with sub-1000 levels of ISO and the latest cameras with up over 20,000 is enormous. In low light applications, you either spool up ISO or slow down the shutter and if there’s movement in a scene, the latter option is the end of face recognition and the death of recognisable license plates. Camera performance in the presence of IR when in night mode was almost uniformly excellent this year with many cameras showing great contrast with the Vivotek 48W array we were using on the test jig. In the presence of IR, shutter speeds are normalised, too, and with a couple of cameras we got almost perfect delineation of Ronnie’s chest bars. SecTech Roadshow got great support from the Hills and Genetec teams this year, often under serious duress from ravening hordes of technicians intent on making one very last crossmy-heart-and-hope-to-die tweak to an obscure slider. The Hills team in Melbourne copped the worst of this, with talk of code being written under the jig during setup and general fiddling leading to delays that cost a vital dummy run. Many thanks to all the engineers involved in keeping the wheels turning – it was much appreciated. Thanks too, to the techs from manufacturers and distributors who re-built the test jig in 5 cities – it’s a big job and it’s a team effort – well done to everyone who took part. Of course, the biggest thanks of all go out to the installers, consultants and end users who came along to see the show. We’re looking forward to showing you folks even bigger and better things next year! n

36 se&n

SEM0617_34shootout.indd 36

1/06/2017 4:58 pm


SEM0617_37.indd 1

1/06/2017 2:25 pm


● Regulars

The Interview

Customerization Bosch’s national sales manager Andrew Bowden is one of the most dynamic things to happen to Bosch in many years. A singularly confident and respected character with intense focus, Bowden espouses a simple and compelling recipe for success – enhance the customer experience, reward the team, enhance the customer experience, make money, enhance the customer experience, have fun.

Q: How did you get into the electronic security industry, Andrew – what’s your one-paragraph background? A: I was something of a rebel in school, left early and returned to higher education later in life when I had a clearer sense of the directions I wanted to take. When I first joined the security industry with no experience whatsoever, I was an installer working for a company that looked after predominately government sites and correctional facilities. It was a grassroots and high-quality entry into the industry and I liked it a lot. After learning installations through and through, I

38 se&n

SEM0617_38interview.indd 38

1/06/2017 2:39 pm


ANDREW BOWDEN WITH JOHN ADAMS

IF WE ARE CONSISTENT, RELIABLE AND PROVIDE THE RIGHT PRODUCT AT THE RIGHT TIME TO THE CUSTOMER, AND DO IT EVERY TIME THEY PLACE AN ORDER, WHY WOULD CUSTOMERS GO ANYWHERE ELSE?

where I was and wasn’t really interested but as I heard more about the role it grabbed my attention and seemed a good fit for me and for Bosch. My forte is fine-tuning business process and enhancing customer satisfaction and I wanted to be sure that was what was required. I am more of a long-term strategy guy than short term tactics. I could see that while the business had immense depth and strength, there was room for improvement in key areas, particularly customer experience. There was some personal uncertainty coming back to corporate but the Bosch support structure is great and there’s lots of scope to put a stamp on the business on behalf of our loyal customers.

moved to Hills and managed several branches, which gave considerable insight. Frankly, I thought after 10 years there I had a good grasp of the industry but when you leave and go back to the integration side, you realise other distributors do things differently and it gives you an opportunity to see the business in a more nuanced light. Q: After 10 years at Hills, then 3 years on the other side with a high end electronic security integrator, what brought you back to the distribution side of the business? A: When I was approached out of the blue for the role at Bosch, I was happy

Q: What will be your core areas of focus over the next couple of years? A: Bosch people are some of the best in the industry and future success will be built on our team. We have finalised and implemented our strategies to fine-tune the teams’ focus to achieve that success. There are 2 objectives; to make sure we have the best possible customer experience for all our customers and to meet our financial goals. During the process of speaking with clients, a lot of former customers have reached out to say they love the product and now the processes to support them are in place they are keen to be on board with us. We have just had the best Q1 in many years, exceeding my anticipated growth by over 20 per cent in addition to our sales pipeline now having enough momentum to achieve several months of targets. How will we improve customer experience? What I have principally been focusing on is our channels. Quite simply, I believe we can do this better. Currently we have around 16 ANZ distributors – and we are going through the process of refining the

product groups so each has its place in the market by offering individual valueadd, with access to products based on experience, capability and the types of customers they service. The idea is that I only want those capable of supporting our high-end security solutions to have access to those solutions – this ensures the products are not devalued, discourages market saturation and we can whole-heartedly support all our channels going forward. Watch this space. The other thing I have been working on is our project pricing process. We have had a process in the past but again, it could be done better. We have made some changes to ensure it’s the best it can be. What we are trying to achieve there is to ensure that our integrator and installer partners are properly and consistently rewarded for their loyalty to the brand and not penalised or favoured by purchasing directly from Bosch or through one of our distributors. We need to create loyalty – a lot of users love the product but may not have liked the way we’ve done things over the years and we need to get their confidence back. That’s my challenge, to come in and get these areas to where they should be to increase our market share through 2017, into 2018 and beyond. In a nutshell, the way I see things is that doing something at 80-90 per cent effort is not good enough – we need to be 95 per cent consistently. If we are consistent, reliable and provide the right product at the right time to the customer, and do it every time they place an order, why would customers go anywhere else? To this end we will be putting into place the best strategies to ensure that we do the right thing by our customers and I believe this will continue to deliver double digit growth. We have the best product but we have needed to implement some

se&n 39

SEM0617_38interview.indd 39

1/06/2017 2:39 pm


● Regulars

The Interview applications so integrators are working with many different brands and need to know them all. Of course, this puts pressure on technicians – there’s a requirement to be a generalist – to know all the Tier 1 products but ultimately it means you know a small amount amount about many things and nothing in real depth. While working in the integration business, we certainly tried to use what we believed was the best of class generalist solution so as to ensure we had the best possible knowledge of the products we were installing. This practise also meant we did not need to depend on supplier support.

MY COMMITMENT TO OUR TEAM AND THE BUSINESS IS THAT WE ARE GOING TO SEE DOUBLE-DIGIT GROWTH AND IF WE DON’T I WILL CONSIDER I HAVE FAILED TO ACHIEVE MY OUTCOMES. new strategies to improve the customer experience and we are doing that with customer feedback to date proving that we have been successful. Q: You’ve mentioned Bosch’s product – the brand has a great name all the way across its product range – professional and consumer. Given the company has that side so well covered, isn’t it really about getting strategy right? A: That’s quite right. Recently at a sales conference I saw some of the new technologies we are working with based on where technology is going and what our competitors are working on and it opened my eyes up to the capabilities Bosch has globally as a business and the internal synergies it leverages. Something that came out of that experience was the importance of the Bosch build quality combined with its functionality – it’s something all the global team is focused on. Bosch product is never going to be the cheapest but it will last longer than many other products and in

the end the total cost of ownership will be considerably less than that of competitors. Exceeding HALT (Highly accelerated life time) testing is part of Bosch DNA; getting a product to market is DNA for many of our competitors. As an example, we had an end user ring us this week – they had around 200 Bosch analogue cameras installed 8-9 years ago and were only now having failures. This customer wanted to upgrade to IP cameras and they wanted Bosch IP cameras, as performance was so much more reliable than the other Tier 1 products they had installed in other sites. I think this fundamental high quality applies across all Bosch products and in the electronic security business it applies to access control, to intrusion and to CCTV. We hear this from integrators and from end users and that means a lot to me. As a business, we need to ensure we continue to deliver this performance in the future and right now we need to ensure we introduce processes that best leverage our undoubted strengths. Q: How hard is it to build brand quality in this era of open systems? Is it still possible in the old way? A: There are many products out there and trying to encourage loyalty to the one brand is a difficult thing, especially when products are specified into

Q: Do you think installers, integrators, consultants and end users want to know they have suppliers squarely in their corner? A: Yes, they do want that confidence and that’s a key part of the Bosch business moving forward. I travel multiple times per month to different states across Australia to meet key customers and distributors; not only to see existing customers but to speak with customers we may have let down in the past. It’s my goal to win back every past customer by showing them how we can add value to their business. Those who know me know that I take customer feedback seriously both positive and negative – if we have not done it well I want to know about it as this becomes the vehicle to move us forward and make necessary improvements along the way. Q: What do you think the team needs to do to ensure success? A: We have great product so we need to do the rest well. We need to market well, we need customer focus – in sales, technical, customer support, logistics, purchasing - in every aspect of the business. You must be goal-driven and we need to be at the top of our game. There’s increased competition and many companies are having a go but they’re not capitalising and taking over the market. In my opinion, if we are not focussed on doing that, I don’t want to be part of it. My commitment to our team and the business is that we are going to see double-digit growth and if we don’t I will consider I have failed to achieve my outcomes. Q: Your intense focus on best practise

40 se&n

SEM0617_38interview.indd 40

1/06/2017 2:39 pm


Open platform. Complete flexibility. Exclusive to Hills

Facility and security management in a single interface TecomC4 offers complete flexibility based on site requirements, including an easy-to-manage menu structure. An integrated software platform that provides a multi-user solution, TecomC4 allows a user to interface to key business functions such as CCTV, intrusion and access control, all from a single interface.

Learn more at interlogix.com.au

Visit us on our UTC stand at Booth C18

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security. Š 2017 United Technologies Corporation, Inc. All rights reserved.

SEM0617_41.indd 1 TecomC4Ad_June2017.indd 1

1/06/2017 2:25 12/05/2017 1:06pm pm


● Regulars

The Interview

PAY FOR PERFORMANCE IS A DRIVER BECAUSE IT’S LIFE ENHANCING FOR TEAM MEMBERS, AS WELL AS SERVING TO SET A BENCHMARK FOR OTHERS TO EXCEED.

is invigorating to hear from the point of view of a small business person. What’s been the response from the team? A: Whenever you make changes, some people may disagree with you. Some people may be afraid of losing something – maybe they won’t have the same authority, or will have to learn something new. But in this dynamic industry, if you are not continually changing and adapting, you will not achieve the goals of customer satisfaction and meeting targets. Business is simple – do the right thing by your customers, do the right thing by your team and do it profitably and enjoy doing it. Your team needs to be tight, have common goals and a willingness to succeed at every opportunity – there is no space for passengers in business. We are putting in new incentive schemes so that the team gets rewarded for their efforts – in my experience, incentives work. Pay for performance is a driver because it’s life enhancing for team members, as well as serving to set a benchmark for others to exceed. Business needs to be give and take. If the team is doing the right thing by the business, I will do everything in my power to ensure they are rewarded. We have great products, a good bunch of people, we will be increasingly customer-centric, we can’t lose.

Q: What do you think integrators should focus on to best serve their own customers? A: Spend the time up front to find out what your customers’ expectations are – do they have a requirement for pedestrian or high-end video, do they want IVA, integrated CCTV and access control – select the best solution and then take it to the client. And don’t be afraid to customise based on operational performance. I saw an order recently where an integrator customer ordered 6 different types of cameras for a single medium-sized project – that’s unusual and shows that integrators are being very thoughtful. Increasingly end users are wanting this. They want operational outcomes that will defend their applications and expedite their investigations. Security is real, it’s not a meaningless add-on. Q: Tell us about the Sony technological alliance – how is that working? A: When it comes to the Sony alliance, the way that works is Sony continues to go out through its existing distributors – we process orders and look after distribution and Sony still has its own sales and marketing teams whom are now Bosch employees. Operationally, we share space and are focused on merging distribution systems at the back end. Certainly, the long-term goal is to have a collaborative approach on a technical front, allowing Bosch to use the front end of the camera for which Sony is renowned and develop the back of the camera with analytics and bit rate management that Sony can capitalise on – it’s like a partnership to further progress both businesses. Q: What trends are you seeing in the market? A: The biggest trend I have noticed over the past 18 months when it comes to government and infrastructure projects is that some of the lower cost manufacturers are getting into jobs at a much lower price point. End users have been asking: do we need to go to the top end, or are we prepared to install something that is merely good enough to meet the bare minimum specification? The issue is that many customers don’t realise and therefore cannot value the additional features and development that Tier 1 products have had. Conversely, in the last 6 months there’s also a demand for high

performance. For a long time, people have been content to just install a dome camera in every location but there is definitely a trend back to full body cameras and quality lenses for specific applications. This is all about performance. There’s no point installing a large CCTV system then half blinding it by using cameras that fundamentally fail to meet the operational specification and requirement. Q: What new products does Bosch have in the pipeline that you can tell us about? A: We have loads of new products – there are new things with intrusion such as the cloud based app and an additional touchscreen although CCTV is going to be the biggest area for new products. I’ve seen the roadmap and our product suite will look a lot different late 2017 moving into 2018 – the higher specifications of our best products will find their way into the lower-spec products, and we will introduce an ultra-high spec for products at the top end. Our MIC ruggedized PTZ continues to dominate the market segments it is targeted at due to its superior performance and with the soon to be released technology advancements plus enhanced optional integrated thermal imaging, it will open up even more doors for Bosch. Q: What would you like to say to Bosch customers? A: We’ve implemented new customercentric processes, we have a dedicated manager looking after all of our distribution channels, we have a dedicated major projects resource and a national footprint of account managers assisting distributors, and end users and consultants. We are a lot more targeted than we have ever been and we are available at any time to work with integrators and end users who love the Bosch product. I openly encourage feedback and want to hear from our customers and industry. Bosch is the third largest electronic security manufacturer globally, it is justifiably renowned for German engineering and for high build quality – Bosch also contributes 90 per cent of its profits to charitable works and now has just shy of 400,000 employees. Whichever way you turn it, the future is looking extremely positive for Bosch and its customers. n

42 se&n

SEM0617_38interview.indd 42

1/06/2017 2:40 pm


See the

BIG picture

FE8181V FE8391-V FE9382-EHV FE8182

FE9181-H FE9381-EHV

FE8180

Optimise your security budget Reduce your camera licensing and see more for less with the Vivotek range of fisheye cameras. Equipped with a fisheye lens for 180° panoramic view (wall mounted) or 360° surround view (with ceiling, floor or table mount), one single fisheye camera’s coverage area is equivalent to 4 CCTV cameras, meaning you can reduce your camera licensing and optimise your security installation budget. With a host of value added functions, Vivotek fisheye cameras are the perfect surveillance solution for large open spaces, airports, shopping malls and retail stores.

To see how Hills can help with your Vivotek requirements, call 1300 HILLS1 or visit hills.com.au/branches T RU ST E D T EC H N O LO GY

SEM0617_43.indd 1

1/06/2017 2:25 pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Mobile Device Security Mobile devices are becoming increasingly prevalent as an extension of many electronic security solutions, where they allow end users to remotely manage their systems, as well as receiving alerts and status updates. For installers and monitoring stations, mobile devices can expand risk levels. T SecTech Roadshow’s panel session ‘Securing Networked Security Devices’ a question the panel put to installers and integrators was how many of them were deploying mobile devices and in many cities, the response was that for many end users, remote mobile management is a key attraction of the latest solutions. Something else we spoke about at SecTech was the need to secure mobile devices and, generally speaking, the multi-authentication functions of higher end mobile device – fingerprint biometrics – as well as password protection of security applications were considered enough security to ensure adequate protection. While these observations are certainly true, installers, integrators and end users, too, should take it upon themselves to get on top of mobile security and not just keep up with the latest threats and defences but foster a culture of caution when it comes to any device that serves as a portal for security solutions. Importantly, the challenges faced by electronic security people are global – that means procedures, tactics and intelligence must be shared. As an example of the difficulties

A

of managing thousands of largely uncontrolled mobile devices across majhor organisations of all kinds, a month or so ago the Department of Homeland Security released its Study on Mobile Device Security in which it highlighted the difficulties of securing wireless networks and mobile devices that may threaten government agencies and called for an ongoing process to meet the problem. Systems managed by DHS include the Office of Personnel Management, the Defense, Treasury, Veterans Affairs, and Health and Human Services Departments, and the report acknowledged that these hold significant amounts of sensitive but unclassed information, whose compromise could adversely impact the organization’s operations, assets or individuals, and hold tremendous amounts of personally identifiable information (PII) that could potentially be used to compromise citizen financial wellbeing, privacy or identity. According to the DHS, mobile cybersecurity threats “require a security approach that differs substantially from the protections developed for desktop workstations largely because mobile devices are exposed to a distinct set of threats, frequently operate outside of

enterprise protections and have evolved independently of desktop architectures.” DHS called for standards for reporting and information sharing on cybersecurity threats and said the agency should coordinate mobility adoption across the government, with mobile devices assessed as part of DHS’s evaluation of mobile network infrastructure vulnerabilities. “Special care must be taken in the use of these devices because the default level of security is optimized for consumer ease of use, which is not appropriate for federal employees,” said DHS. “The stakes for government users are high and government mobile devices represent an avenue to attack back-end systems containing data on millions of Americans, in addition to sensitive information relevant to government functions.

44 se&n

SEM0617_44monitor.indd 44

1/06/2017 4:56 pm


SPECIAL CARE MUST BE TAKEN IN THE USE OF THESE DEVICES BECAUSE THE DEFAULT LEVEL OF SECURITY IS OPTIMIZED FOR CONSUMER EASE OF USE, WHICH IS NOT APPROPRIATE FOR FEDERAL EMPLOYEES.

“Threats to government users of mobile devices include the same threats that target consumers, for example, call interception and monitoring, user location tracking, attackers seeking financial gain through banking fraud, social engineering, ransomware, identity theft, or theft of the device, services, or any sensitive data,” DHS said. “This puts at risk not just mobile device users, but the carriers themselves as well as other infrastructure providers. Government users may be subject to additional threats simply because they are government employees.” Threats the report highlighted include the mobile device technology stack (mobile operating systems and lower level device components); mobile applications; mobile networks (e.g., cellular, Wi-Fi, Bluetooth) and services

provided by network operators; device physical access; and enterprise mobile services and infrastructure, including mobile device management, enterprise mobile app stores and mobile application management.

RESPONDING TO MOBILE VULNERABILITIES DHS recommends a new framework for mobile device security based on existing standards that would include mobile application security, enterprise mobility management, mobile device security and cellular network security, the report says. Adoption of baseline standards — such as those defined in National Information Assurance Partnership (NIAP) mobile Protection Profiles, the European Union Agency for Network and Information Security and

others — can enhance security. Mobile apps purchased or developed by the government should be “evaluated against the Protection Profile for Application Software and the Requirements for Vetting Mobile Apps.” Further, the DHS says, the government “should select mobile devices and enterprise mobility management products that have been evaluated to meet a minimum level of security, e.g., the NIAP Product Compliant List or other government approved product lists. NIAP approved products must be considered in the context of the environment of use, including appropriate risk analysis and system accreditation requirements.” DHS recommends that Federal Information Security Modernization Act metrics should be enhanced to focus on securing mobile devices through

se&n 45

SEM0617_44monitor.indd 45

1/06/2017 4:56 pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

the Federal CIO Council’s Mobile Technology Tiger Team. Additionally, the report says the Continuous Diagnostics and Mitigation (CDM) program should address the security of mobile devices and applications with capabilities to be at parity with other network devices (e.g., workstations and servers). The CDM program allows agencies to identify cybersecurity risks on an ongoing basis, then prioritize the risks based upon how severe they might be in an effort to let cybersecurity personnel mitigate the most significant problems first. Further, the DHS says the National Protection and Programs Directorate’s definition of critical infrastructure should be amended to include mobile

IMPORTANTLY, THE CHALLENGES FACED BY ELECTRONIC SECURITY PEOPLE ARE GLOBAL – THAT MEANS PROCEDURES, TACTICS AND INTELLIGENCE MUST BE SHARED.

network infrastructure. DHS says its Science and Technology Homeland Security Advanced Research Projects Agency Cyber Security Division “should continue its work in Mobile Application Security to enable the secure use of mobile applications for government use. This effort includes continued collaboration with NIAP to automate Mobile Application Security testing.” DHS recommends new research and development programs “to secure mobile network infrastructure and address current and emerging challenges impeding mobile technology.” “DHS should develop a new program in advanced defensive security tools and methods for addressing mobile malware and vulnerabilities that spans applied research through operations, including new ways to handle Common Vulnerabilities and Exposures (CVE) generation for mobile.”

PRACTICAL MEASURES For installers needing to advise end users and end users needing to advise staff of best practise in mobile device security, there are a number of considerations.

For a start, 2-step authentication is vital. If a device has biometric authentication, use it. And use a 6-digit code as well. We spoke at SecTech about the challenge of managing passwords and at a personal level, services like iCloud Keychain allows users to have challenging passwords or pass phrases without the challenge of remembering them or using the same password for everything. You can use Keychain, 1Password, Lastpass, DataVault or other dedicated password managers to deliver security audits, alerts, teams, token support, and more. Something else to consider is how easy staff make it to access key functions through always open interfaces like iOS Control Center. Not only the torch but the ability to activate Airline Mode and deactivate tracking is accessible. And Notification Centre lets owners see incoming messages but displays them for others to see. Siri and Android comparable voice assistants are a functional risk, too, if included on a lock screen. Other things worth considering include VPN tunnelling in public places, and denying apps the ability to track a phone’s location. n

46 se&n

SEM0617_44monitor.indd 46

1/06/2017 4:56 pm

IMPO BY EL GLOB TACT SHAR


1

Receive alarm notifications and control your alarm system like never before - anywhere at any time. SkyCommand delivers alarm notifications and the freedom to control security areas, lights, heating/cooling and door access. Features: - Instant notifications for alarm events to your mobile phone - Arm and disarm your security system remotely - Supports multiple sites and security areas - Remotely turn on and off locks and appliances - Notification and event history - App pin entry and lock Utilising T4000 high-level integration to an Integriti, Inception or Concept system, SkyCommand provides powerful control over door access, security and automation.

Available now on:

Third party alarms systems can also be controlled using the output on a T4000 via a key-switch input on any third party alarm panel.

Multiple Sites

Easy Access

Multiple Areas

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM0617_47.indd 1

Simple Control

T: 1300 319 499

Notifications

W: csd.com.au

1/06/2017 2:25 pm


â—? Special report

Access control

INSTALLING ACCESS CONTROL

Not long ago the complexities of installing access control meant it was an area of business closed to installers with less experience. Times have now changed and careful techs who want to branch out are now supported by a range of solutions that combine simplicity of installation with considerable expansion.

48 se&n

SEM0617_48 access.indd 48

1/06/2017 3:18 pm


BY J O H N A D A M S

OMETHING easy to forget when it comes to access control is the lateral nature of the beast. Because solutions are modular, they are constrained only by the capacity of management solutions and the intrepidity of installers. What this means for installation teams making the jump into access is that they can start easy and go hard. According to Chris Fitzpatrick of CS Technologies, access control is certainly now open to dedicated alarm installers thanks to simplification of installation, setup and commissioning processes. “A lot of smaller systems can be supplied with certain default information such as 24-hour access, several pre-set time zones, including access times per day, days of the week,” Fitzpatrick says. “This means that to a considerable extent, access control can be almost a matter of plug and play.” Fitzpatrick says there are a number of key things installers should bear in mind when installing an access control solution to ensure core operational requirements are met, “Typically, the access control system either works with the existing alarm system or is fully integrated with the alarm system,” he explains. “Most access control systems now have full integration, so it is relatively easy to design an integrated system that can provide access control, alarm isolation, both partial or full, and have corridors through the system if required where the alarm system is isolated for a period to allow access to a tenant’s location such as self-storage or lift security in a multistorey building. Getting this integration right is vital for many customers. “The greatest challenge for access control is the locking and unlocking of the door/doors. This depends on the type and makeup of the doors/ doors. This is by far the most challenging aspect of supplying and installing the access control system. Is the door to be alarmed for forced door or door open too long? is the door automatic, is the door in the path of exit for the fire system and needs a fire trip to unlock in the event of a fire alarm?” “You need to get the type of locking device correct in relation to the door and the health and safety aspect of allowing free exit for users in the event of a fire or other emergency. And in some cases, the health and safety considerations will override the security aspect – for instance, allowing people to leave lift lobbies in the event of a fire alarm and having to install break glass switches in the lobby that override the access control to allow access to fire stairs.” When it comes to selecting Weigand, RS-485, IP, or some combination of these controller-reader comms technologies, Fitzpatrick says this should be governed by the requirements of the application. “Any quality access control system should be a fully distributed system with the controller retaining the full programmed memory for the group of doors

S

THE GREATEST CHALLENGE FOR ACCESS CONTROL IS THE LOCKING AND UNLOCKING OF THE DOOR/DOORS. THIS DEPENDS ON THE TYPE AND MAKEUP OF THE DOORS/DOORS. Chris Fitzpatrick

it is controlling, for instance, names, credentials, time zones, current time and a reasonable capacity for transaction logs,” he says. “Any of these methods is fine as the only need to communicate with the controller would be to download transactions or add or delete user information.” It’s often argued that the cost of access control per door has decreased significantly over the past 5 years but Fitzpatrick is not convinced. “Many manufactures would argue yes, but the actual per door cost greatly depends on whether you are looking at the hardware cost or the fully installed cost i.e. cost of the locking device, installing the locking device, the controller and power supply and battery back,” he explains. “Also, this depends on the type of control equipment used. If the nonfully distributed controllers are used then yes, the cost for control equipment is cheaper, but if comms is lost the door access is useless.” When selecting an access control solution, what should integrators be looking for? “This depends on the location and number of doors involved,” Fitzpatrick explains. “If in a multistory complex, then decisions have to made as to how people get in and out of the building and how they travel to their particular floor. Furthermore, if the building is secure, how do visitors and couriers gain entry. There may be a need for intercom override facilities in the access control system to allow entry but not compromise the access restrictions of the building. “On the other hand, if these doors only apply to

se&n 49

SEM0617_48 access.indd 49

1/06/2017 3:18 pm


● Special report

Access control

EVERY END USER IS UNIQUE SO IT REALLY COMES DOWN TO HAVING A CLEAR UNDERSTANDING OF HOW THEY WISH TO USE THE SYSTEM AND BEING ABLE TO OFFER THEM ADDED FEATURES THAT WILL MAKE THEIR LIVES EASIER. James Robertson

one company, the main consideration would be to design a system that would not greatly restrict the personnel at the site and meets all health and safety requirements of the site.” When it comes to key add-ons end users most desire with their access control solutions – things like CCTV, lift control, mobile management, automation, etc, Fitzpatrick says most customers require the integration of CCTV as well as existing alarm systems when installing access control. He argues that a good access control system should have an interface facility to CCTV so that operators can use one platform to view and interrogate the systems. Over at ICT, James Robertson agrees access control is available to a larger group of installers than it used to be. “I think so certainly,” he says. “And in our market the end user expects that access and alarm is an integrated solution – being able to arm or disarm the alarm when entering or exiting a door when entering a building adds convenience to the end user. It also ensures no one forgets to turn the alarm on when rushing out the door.” Most installers are well across the needs of intrusion detection solutions. They know that an alarm system must be capable of detecting intrusion events and reporting alarm events. But comparatively, what are the key things installers should bear in mind when installing an access

control solution to ensure core operational requirements are met? “I think those core things come down to understanding what the end user wants to achieve – what is paramount is understanding the level of security they want and knowing this allows you to ensure you put the right solution,” Robertson says. “Do they want just pin access, or card and pin or biometrics? This can be further extended to reporting capabilities and user management - do customers wish to be able to handle this themselves? We see more and more end users look for a system they can manage themselves.” When it comes to the greatest physical challenges of access control installations – those aspects of hardware and cable infrastructure installers need to stay on top of at all times, Robertson points at application. “Definitely the environment,” he argues. “If the site is existing, there can be many challenging factors, such as the ability to get cables to a door. And some sites may have a great existing infrastructure over an IP network. Understanding what is already there in the case of an existing site can help an installer greatly when it comes to tailoring a solution that delivers a result that meets budget and performs to the customer’s expectations.” The most challenging aspect of access control system outside the physical pressures are meeting end user requirements. “Setting the system up for the end user is the big thing,” Robertson says. “Every end user is unique so it really comes down to having a clear understanding of how they wish to use the system and being able to offer them added features that will make their lives easier – not just operationally, but in terms of system operation, too.” “Along with great features, the key to look for is a product that is simple to integrate with and effortless to extend,” he says. “Customer requirements will change over the years so choosing a system that will continue to grow with them ensures your customer is happy for the long term. A key aspect of this flexibility is choosing a system that offers an integration protocol that is widely known – in the example of ICT this is SOAP protocol.” Over at Hills, Joanna Burke agrees with the others that access control now open to dedicated alarm installers thanks to simplification of installation, setup and commissioning processes. “Yes - a feature of the intrusion/access market over the last decade has been the permeation of an access control component into smaller installations, usually as an extension of an intrusion system,” says Burke. “Providing the client requirements do not demand more complex features, like anti-passback, region counting, interlocking, etc, the availability and progress of simple access/intrusion machines has made this sort of installation work available to historically dedicated alarm installers.”

50 se&n

SEM0617_48 access.indd 50

1/06/2017 3:19 pm


7542MP-4_Altronix_NetWaySpectrumAd_Security Electronics and Networks.pdf

1

4/12/17

10:15 AM

®

SPECTRUM

FIBER SOLUTIONS Altronix’s new NetWay Spectrum series takes fiber and power to a new level. Indoor and outdoor models include hardened Ethernet PoE switches and multi-port media converters with or without integral power. Units can be deployed with conventional single or multi-mode fiber...or composite cable which combines fiber with copper to simultaneously deliver power and data. Go further with NetWay Spectrum from Altronix.

MADE IN THE U.S.A. & BACKED BY A LIFETIME WARRANTY

altronix.com – info@altronix.com

SEM0617_51.indd 1

1/06/2017 2:25 pm


● Special report

Access control

When it comes to the key things installers should bear in mind when installing an access control solution to ensure core operational requirements are met, Burke argues that level of security of the card technology (like iClass, SEOS) is more important than ever before. “End-users are also more focused on how to grow and integrate an access control system into other building management or video platforms, for the improvement of: operating procedures, reporting, real-time management, post-event investigation and centralised monitoring,” she says. For Burke, the aspects of hardware and cable infrastructure must installers need to stay on top of open opportunities for the application of clever technology. “Installers still face the practical challenges of not always being able to cable to every door that requires access control,” she says. “We are lucky to have some great wireless door locking products in market now that not only look great but that have features such as ‘data on card’, which in turn, fully integrates into wonderful access control platforms such as Tecom, Genetec and Kantech.” When it comes to the most challenging aspect of installing an access control system, Burke thinks of correct product selection, as well as physical installation. “From an electronic access/security installer’s perspective the installation of locks requires a level of expertise, not only in the physical installation, but also in the system design,” she argues. “Best-fit for the application (risk reduction), dedicated/backed up power supply, and fire safety regulations must all be considered.” Choice between Weigand, RS-485, IP, or some combination of these controller-reader comms technologies is an interesting topic, according to Burke. “Each of these technologies has various strengths and weaknesses,” she says. “This highlights the importance of a proper risk assessment to the end user, and that should never be underestimated.” When it comes to cost per door, Burke breaks ranks with the others and argues there has been a decrease in cost over the past 5 years and she puts this down to multiple factors, including the profound penetration of wireless solutions into challenging and complex built environments. “Access control has definitely decreased in cost per door over the past 5 years - this is due to efficiencies with smarter door controllers, stronger software development, and unification of systems,” she says. “Separate to the electronics of the system, the global access control market has seen the cost of door hardware reduce with wireless solutions, and more efficient installation techniques.” Product selection needs to meet the end user requirement, according to Burke.

ACCESS CONTROL HAS DEFINITELY DECREASED IN COST PER DOOR OVER THE PAST 5 YEARS - THIS IS DUE TO EFFICIENCIES WITH SMARTER DOOR CONTROLLERS, STRONGER SOFTWARE DEVELOPMENT, AND UNIFICATION OF SYSTEMS. Joanna Burke

“With the right risk assessment and an understanding of how the end-user wants to manage their physical security, the integrator should be making decisions based on: ease of use, future system expansion and the types of integrations required,” she says. “Some end-users may have existing infrastructure and or systems they wish to keep in the short-term, and there are many products that can work in such a situation. “If an entirely new system is required, understanding the end-user’s true security risks is the only way to ensure the right product is installed. Meanwhile, in the enterprise space, access to third party system integrations, high level lift integrations, low level redundancy and scalability can be critical. At the other end of the scale a simple system should feature intrusion and access in one box, as well as automation and simplicity of operation. Programming and installation are also paramount.” Trish Thompson, product strategist at Gallagher says a focus on simplicity and usability is definitely redefining the required skillset for installers keen on breaking into access control. “While some customers have needs which still require installers to have a thorough understanding of access control, networking and the flexibility inherent in a product, many can now utilise access control products which are largely plug and play and can lead the installer through the more challenging aspects of the installation,” Thompson explains. “Some of the latest cloud solutions are able to

52 se&n

SEM0617_48 access.indd 52

1/06/2017 3:19 pm


minimise the need for IT knowledge which does make access control accessible to a new breed of installers who do not need to be as IT savvy as their predecessors. The product itself now takes care of networking and cyber security issues.” According to Thompson, the key things installers should bear in mind when installing an access control solution to ensure core operational requirements are met include things like workflow to manage access privileges and remove potential for human error, and simple credential issuance process and hardware that carries out reliable and fast access decisions at the door. “The biggest physical challenge in access control is it is quite often considered a secondary building service, and a building or doorway design has not allowed for it,” Thompson says. “When security and access control is not considered during the initial phases of building then cable access ways are not considered and proper support structures are not allowed for. “The challenge then, is to install field devices without compromising the aesthetics of the building and the standard working practices of installed devices. The designers need to be educated and a security company or consultant involved in the initial design and build phase to ensure an allowance is made for access control and security. This can significantly reduce physical challenges of any form of installation. Education and preparation is key. “Another significant challenge is often the management and co-ordination of the IT infrastructure needed to support the access control system,” she explains. “For example, securely onboarding controllers within a customer’s network, or installing and upgrading servers, databases and applications while meeting a customer’s internal timelines and the management and security needs for their network can require a significant amount of communication.” When it comes to comms choice, Thompson doesn’t hesitate. “Wiegand is easily compromised and no longer meets modern benchmarks for an access control system,” she says. “It offers only a basic level of access control and as such is not a recommended choice. RS-485 is the best choice for a communication technology from reader to controller as it is dedicated and provides the high level of reliability and security needed for access control applications while still enabling more than just the exchange of card data and the access decision. It can also support a much richer user experience at the door and while cost been fairly steady over that period, the capability of the hardware has definitely improved. We are now seeing very high speed, encrypted RS485 links that support a much richer user experience at the door and provide the ability to remotely upgrade reader

WHEN SECURITY AND ACCESS CONTROL IS NOT CONSIDERED DURING THE INITIAL PHASES OF BUILDING THEN CABLE ACCESS WAYS ARE NOT CONSIDERED AND PROPER SUPPORT STRUCTURES ARE NOT ALLOWED FOR. Trish Thompson

firmware, all in a very secure manner.” Thompson says that when selecting an access control solution, integrators should look for what their customer’s need. “Combined access control and intrusion is a basic need, as these 2 areas have always had a significant overlap but the selection of product will always depend on the customer’s specific needs and situation and that should always be the starting point,” she says. “The primary factors I would look for today are the ability for the system to grow with you and the design of the customer experience – for instance, has it been thoughtfully designed for ease of use? Along with this, I’d look for a solution that is open to integration with other business and security systems as this is where real business benefit and operational efficiencies can often be gained. “Favoured add-ons also depend on the customer, their needs and how they want to operate,” Thompson says. “We are seeing an increase in the need and desire for mobility with actionable information and control through smartphones for a workforce that is increasingly on the move. This is joining forces with an increasing need, especially in high risk industries, for the access control system to enforce business policy at the door, becoming, in effect, an integral part of a company’s workforce safety management program and duty of care towards staff.” n

se&n 53

SEM0617_48 access.indd 53

1/06/2017 3:19 pm


● Special report

CCTV

PLUG AND PRAY!

Plug and play video surveillance is a kind of digital Holy Grail and an implicit recognition that end-to-end analogue CCTV solutions have certain key advantages for smaller installers, including simplicity of installation, modest hardware outlays and easy operation. AN plug and play IP solutions match the fundamental simplicity of analogue? It’s an interesting question because there are some real variables. For PnP to match analogue it must be very inexpensive. Yet even the most basic and affordable PnP CCTV solutions – think DVR and 4 cameras – offer the end user search functionalities that traditional analogue can never match. And just to shove a broomstick through the spokes, there’s also digital analogue, which offers analogue simplicity with digital resolution delivering improved searching via digital zoom. According to David Pettigrew, national sales & marketing manager CCTV Division at Seadan Security and Electronics, DVR/NVR-based surveillance systems can be truly plug and play. “Plug and Play is now possible for smaller CCTV systems due to the increasing capabilities of technology and the experience manufacturers have in simplifying the installation requirements,” Pettigrew says. “An inexperienced installer can be up and running with an unknown system in as little as 15 minutes with the right products. Conversely, that same inexperience can land an installer in a lot of trouble if the plug and play settings don’t work for an installation. In short, it’s mostly there and for larger systems it won’t take manufacturers much longer to implement true plug and play capabilities in their equipment.” According to Pettigrew, if he was looking to ensure the network security of a plug and play CCTV solution, there are several aspects that would need to be considered. “You need to defend multiple communications paths – from cameras to recorder, from cameras to viewing devices, from recorder to viewing devices,

C

PLUG AND PLAY CAN BE USED FOR LARGER SITES, BUT THE USE OF PLUG AND PLAY IS ALWAYS SECONDARY TO SELECTING THE RIGHT EQUIPMENT FOR THE JOB. Andrew Pettigrew

remote connections and any other equipment on the network. According to Pettigrew, the golden formula for designing a system applies in most circumstances, including DVRs and NVRs. Broadly, this formula would stipulate that cameras don’t share networking with anything they don’t have to – ideally, they run on their own network. That recorders can attach to the camera network and may also have access to larger networks and the internet. Operators that only work internally should use appropriate headend software so they can see both the cameras and the recorder/s. “Remote connections such as those done via the internet can be done most securely with a

54 se&n

SEM0617_54cctv.indd 54

1/06/2017 2:59 pm


BY J O H N A D A M S

VPN and secondly via a peer-to-peer (P2P) type setup,” Pettigrew says. “Using port forwarding is a risk because it exposes the equipment directly to the internet and the horrors that lurk there. Other equipment on the network should be kept to a minimum – leave CCTV to its own devices and maybe connect up alarm and access control equipment where necessary. VLANs are very helpful here.” Also important, according to Pettigrew, is use of the right network switches – typical IT network switches might have the bandwidth to handle the data load but they lack the packet switching rate in a lot of cases. “CCTV requires both a high packet switching

Dahua’s XVR – as easy as analogue and way more powerful.

rate and a reliable bandwidth allocation,” Pettigrew explains. “Never use more than 80 per cent of a network’s bandwidth. And use long passwords – in fact use pass phrases for devices connected to the network. Passwords are too easy to defeat with modern computing power and the only effective way to combat that is with sheer size – so use phrases when doing the password setups. Finally, use cryptography whenever possible, especially for remote connections – this is why VPNs are useful.” According to Pettigrew, cost is an important factor with plug and play. “Cost is important in the PnP segment, which employs predominately low camera count systems for small installations,” he explains. “We prefer

se&n 55

SEM0617_54cctv.indd 55

1/06/2017 2:41 pm


● Special report

CCTV

USING PORT FORWARDING IS A RISK BECAUSE IT EXPOSES THE EQUIPMENT DIRECTLY TO THE INTERNET AND THE HORRORS THAT LURK THERE. Andrew Pettigrew

to work closely with our customers on higher performance / featured systems to ensure their customers get the features & performance they need. It’s important to say that plug and play is an installation feature, not a security feature and the 2 should not be confused.” Something installers may wonder is whether plug and play can be used to support much larger sites with hundreds of cameras, or whether it should only apply to smaller solutions. “Plug and play can be used for larger sites, but the use of plug and play is always secondary to selecting the right equipment for the job,” Pettigrew says. “Plug and play should, where possible, apply to small solutions, as well as applying a simple network topology. “Large CCTV systems are always diverse in their requirements and their network architecture, as well as the transmission mediums used across the site. We commonly have CAT5/6 infrastructure, and / or legacy coaxial systems (RG59/RG6/RG11) and/or fibre cabling across these sites. Indeed, not a plugand-play environment and is still an engineered solution.” According to Pettigrew, strengths vs weaknesses is a moot way of looking at it plug and play video surveillance systems. “Any particular piece of equipment will have strengths and weaknesses compared to another – no 2 are the same,” he argues. “Plug and play in enterprise scenarios or domestic and light commercial is quicker to install if the underlying network can facilitate the use of plug and play. In short, the selection of plug and play is nothing to do with scale and more to do with ease of installation. “PnP can be extremely helpful or can be a hindrance, depending on how it is implemented. It should never be allowed to compromise the

operation of the system itself and is a secondary concern when selecting equipment.” According to Pettigrew, Seadan has plenty of PnP systems for installers to choose from. “When it comes to our CCTV equipment, we have 4/8/16/24 channel PoE NVR’s offering easy install, 3MP and 4MP motorised zoom bullet, dome and cyclops cameras and easy setup via GUI and remote app,” he says. “There are similar solutions available for coaxial systems using HDCVI technology and we can federate all these systems together using a VMS server for enterprise expandability.” At Honeywell Fire & Security, product marketing manager Anurag Mitra says DVRs and NVRs are plug and play in terms of connecting the cameras and setting up remote access. “This said, the most important part is doing the right recording setups as the reason for installing this system is creating useful evidence not simply having a live feed,” Mitra explains. “Sound understanding of surveillance systems is required, whether the system is plug and play or not. When it comes to securing DVR and NVR-based CCTV solutions, Mitra says the fundamentals are the key. “Installers should make sure that the passwords are complex and use HTTPS communication if available,” he explains. “Ensure that passwords are updated regularly and use a reliable and trustworthy DYNDNS server. If there are only a few users, then IP filtering can be used effectively to restrict access to the desired group.” When it comes to balancing performance and cost, Mitra says plug and play has no direct relevance to camera performance and quality, and is mainly relevant for installers and customers looking for systems which are easier to deal with. Mitra says plug and play can support larger sites with hundreds of cameras but that’s often not the best use of the technology. “Plug and play can be deployed to larger sites if there are desired VMS features and integrations are available,” Mitra says. “But in my opinion, plug and play is more suited for small to medium size projects. There is a clear positioning and applications for both plug and play solutions and complex integrated platforms, I don’t see a need to directly compare them to explore weaknesses of one solution versus the other. “Plug and play solutions are fit for purpose in small medium business and residential segment where they not only make life easier for the installer but are an easy system to maintain for residential and small medium business customers,” Mitra explains. “When it comes to critical infrastructure and large commercial projects where the security and building management subjects work closely, the application demands a system capable of integrating various practices together allowing better control and management. For these reasons enterprise video systems have their place.” According to Mitra, there are a number of key

56 se&n

SEM0617_54cctv.indd 56

1/06/2017 2:41 pm


features installers should check off when they are selecting PnP solutions. “Key specifications to look for include security features like https support and AES encryption for ensuring the security of the security system,” he says. “Storage capacity, appropriate inputs and availability of storage expansion ports like ESATA come in handy when the system or recording requirement grows. It is also very important to understand the recording frame rates and resolutions, availability of watermarking features and inter-operability with wide range of cameras are some of the more important aspects to review while selecting a plug and play system.” Over at EOS, Andrew Cho says the question of whether DVR/NVR-based surveillance systems are truly plug and play, depends on the system but he says PnP applies to the majority of NVRs with builtin PoE support a complete plug and play feature-set, including the new XRN series. If looking to ensure the network security of a plug and play CCTV solution, first of all, Cho says installers need to ensure that they change the default password on the NVR. “The default password for some brands is very easy to find online,” explains Cho. “However, some brands, such as WISENET, force installers to set a unique password during initial installation with multiple combinations to minimise the risk. Secondly, it is important to use a reputable brand without any known cyber vulnerability issue. Lastly, ensure the camera network is separated from the external network to reduce the risk. According to Cho, most plug and play systems are targeted for small to medium-sized installation

PLUG AND PLAY CAN BE DEPLOYED TO LARGER SITES IF THERE ARE DESIRED VMS FEATURES AND INTEGRATIONS ARE AVAILABLE... BUT IN MY OPINION, PLUG AND PLAY IS MORE SUITED FOR SMALL TO MEDIUM SIZE PROJECTS. Anurag Mitra

THE GREATEST STRENGTH OF THE PLUG AND PLAY SYSTEM IS EASE OF INSTALLATION AND THE MAIN WEAKNESS WOULD BE THE LEVEL OF REDUNDANCY. Andrew Cho

where the cost is a sensitive matter. This is a combination of cost effective recorder as well as the camera. However, if required the end-user must consider using superior cameras even if it costs more to ensure they achieve their expectation. For this reason, the WISENET XRN series NVR supports up to 4K resolution with 4K output and has a recorder based de-warping feature for highresolution fisheye cameras. For Cho, the use of PnP comes down to end user requirement and system design. “The majority of large sites with hundreds of cameras have centrally managed designs with high redundancy and it is wiser to have the right system to suit those design,” says Cho. “Most plug and play systems are designed for small to medium-sized installations and the recorders may not be suitable. But systems like XRN-3010 or PRN-4011, which is a 64-channel NVR, still support many features to make larger installations almost like plug and play.” “The greatest strength of the plug and play system is ease of installation and the main weakness would be the level of redundancy,” Cho says. “As most plug and play systems are designed to be costeffective, it is very hard to incorporate a high-level of redundancy, such as fail-over or hardware-based RAID. “Having said that, some plug and play system, including our XRN series, do provide high-level redundancy features such as auto recovery back-up - a feature which restores the video image from the camera SD card to the NVR storage upon a network disconnection between the camera and the NVR. Other features installers should value highly include built-in PoE availability, maximum resolution a solution can support, level of redundancy, H.265 compatibility and maximum bandwidth size.” n

se&n 57

SEM0617_54cctv.indd 57

1/06/2017 2:41 pm


● Special report

Cyber security

INTERNET: NOT JUST FOR FUN

Internet connectivity is an important means of delivering business and security value, not just a recreational vehicle and a consummate aggregator of attention.

HERE’S a common belief in the security industry that remote access, internet connection, and external connections are bad; and in the wake of the Mirai bot net and near daily IoT security warnings, it’s not all that surprising that we want to keep security systems air gapped. While unarguably well intentioned, this line of thinking will have physical and electronic security providers relegated to the realm of tin foil hat wearers, as businesses and users continue to demand more and more efficiency from their systems. Does that mean that we should plug everything in, open everything up, and embrace a fully connected ecosystem – certainly not. It’s all about benefit and risk.

T

58 se&n

SEM0617_58cyber.indd 58

1/06/2017 3:20 pm


BY S I M O N P O L L A K

In the realm of operational security, technology is a force multiplier, or a means to an end rather than an end in and of itself. CCTV cameras allow a single guard to view many areas at once as well as providing evidence after the fact. Access control systems allow for the policing of access in restricted areas without requiring the physical presence of a guard. Intrusion detection systems allow for the monitoring of one or many sites without needing any human presence. Why are we so averse to connecting these systems to the internet? Let’s begin by reviewing a few facts about the current state of play. We’ve been connecting alarm systems to phone lines and remotely programming them for years. While they may require some special software, it’s usually authenticated based on a device serial number of 4-digit code with no rate limiting or alerting on failed login attempts, and poor if any logging. The industry is using Ethernet and GPRS alarm communication devices more and more frequently; usually on dialler capture and without any back-up path. These systems send their messages across the internet to a bank of computers, many parts of which may be vulnerable. Security systems using Ethernet devices (cameras, door controllers, card readers etc) are put onto poorly secured IT networks, often installed by the integrator and left on factory default settings. Many monitoring stations and control rooms are remotely accessible, so have the potential to act as a gateway from the outside world into the security networks. When you consider the above, the security industry may not be as secure or as isolated as it likes to think it is. Why would we want to have our systems remotely accessible? In many cases, connected systems can provide a real benefit. Sending push alarms notifications and video to guards in the field allows them to be more efficient and respond more rapidly. Remote diagnosis and servicing allows integrators to service systems more rapidly, hopefully at lower cost to the client. There are many legacy practices in the security industry that don’t add value yet we tolerate them. Late to close events on alarm systems still rely on an operator to call the site and get a stand down password to authorise someone who is already on site to work later. This could easily be replaced by an app (suitably secured) with a push notification allowing a user to extend the closing time by another hour. We can all argue for the status quo and that current ways of thinking, working, and deploying security are still the best. However, individuals and organisations will continue to seek additional features and functionality, and lower total cost of ownership – if we don’t deliver that, someone else will. So how do we go about connecting our systems? As with all security measures, there’s a secure way and a non-secure way. Plugging in something

MANY MONITORING STATIONS AND CONTROL ROOMS ARE REMOTELY ACCESSIBLE, SO HAVE THE POTENTIAL TO ACT AS A GATEWAY FROM THE OUTSIDE WORLD INTO THE SECURITY NETWORKS.

you bought on eBay then port forwarding your router is not secure and will most likely have your system get pwned. Deploying enterprise grade equipment behind a firewall with robust security controls including as an update and patching process, can deliver security and functionality with limited risk of compromise. If the remote functionality becomes mission critical, redundancy needs to be considered as well. How to suitably secure systems is one of the challenges the security industry is finally making headway with. There are some excellent hardening guides from assorted vendors. I would also suggest reading some of the critical infrastructure hardening guides such as The SANS Institute’s Critical Control System Vulnerabilities Demonstrated - And What to Do About Them. Integrators who work on network connected or server based security systems should ensure they understand how to suitably secure these systems. Finally, it’s time that manufacturers produced systems that configure themselves to the highest security levels rather than the lowest. There’s no good reason that a video management system shouldn’t set a complex password and configure SSL tunnelling when adding a camera. With global players, such as Amazon, Google, and Apple seeking to increase their foothold into the connected building ecosystem, industries who cling to isolated technologies risk losing relevance. * The views expressed in this article are those of the author only and do not represent those of any organisation, or necessarily reflect the position or policies or any organisation or entity. Simon Pollak is a security professional with more than 25 years’ experience in physical and cyber security, smart buildings and automation systems. A licensed security consultant and CISSP, he holds a Masters of Cyber Security and a Masters of Business Administration (Technology). Simon contributes to SEN discussing all things cyber and converged security. Follow him on https:// twitter.com/SimonPollak or https://au.linkedin.com/in/simonpollak

se&n 59

SEM0617_58cyber.indd 59

1/06/2017 3:20 pm


● Special report

Alarms

PASSIVE AGGRESSIVE Passive infrared sensors are the mainstay of volumetric intrusion detection because they are simple, reliable and affordable and when thoughtfully installed, they offer high levels of security, too. IRs are designed to be installed indoors (unless microprocessor-controlled and waterproofed) to cover moderately broad open areas and longish corridors as well as very small spaces. They’re also ideal for use when factors like noise, inanimate movement and vibration won’t permit the use of microwave alternatives. PIRs can be masked against known IRE sources, are small in size, have the ability to be recessed or flush mounted, and are sold in 360-degree ceiling mount variations. Infrared detection devices can also be used when there are large areas of glass forming a boundary to the target area. Used in such an environment they won’t detect anything on the other side of the glass in the way microwaves and ultrasonics certainly will. Successful use of passive infrared detection demands a stable IRE environment so as soon as you get into the installation environment look around and make certain there are no heaters or powerful lights in the room likely to generate excessive infrared energy levels. PIRS can’t be located facing unfiltered sunlight and nor should they be used anywhere there will be sudden temperature changes on surfaces within the target area. Exposure to glass surfaces should be space divisions in office or home environments - not perimeter glass - unless a veranda keeps direct sun off. Other potential problems with PIRs include humidity, unsuppressed electrical equipment that could cause interference (this includes things like fluorescent lights), and dirt and dust in the environment. You can effectively seal PIRs and conformal coat their boards if you’re installing them in tough environments like bathrooms, garages or covered ways. Another mistake is to install PIRs in environments in which cats, dogs, birds and flying insects are present, unless the sensors have been specifically designed to resist these false alarm signals through sensitivity adjustments, microprocessor control or lens design. In the past, pet immunity meant keeping the IRE sensitivity above knee or thigh level with lens design, creating what was called a pet alley. This was effective up to a point, especially with small dogs, but climbing animals like cats and smaller, more energetic dogs are likely to leap onto lounge chairs or tables causing false alarms. Before the sensor goes in, you also need to know the layout of the sensor’s zones - these are defined by lens

P

MOST MODERN SENSORS HAVE ANTI-MASKING BUT THE CHEAPER ONES WILL BE DEVOID OF THIS FEATURE AND VULNERABLE TO MASKING BY ANYTHING FROM STICKY TAPE TO BLU-TAC.

design. Always check the specification sheet before installation and ascertain the sensor’s strengths and weaknesses. Using the wrong lens will lessen a PIR’s effectiveness. Some sensors will be supplied with a choice of lens and others will endeavour through their design to offer of both broad coverage and longer range patterns. There are 6 primary lens patterns - and these can be applied generally to both fresnel lens types and mirror optics: l Long range, dual zone, narrow coverage lenses are used to monitor narrow corridors with crossing points to protect long rows or windows l Long range, multizone, narrow coverage lenses are designed for use with long corridors without crossings in which intruders will move towards or away from the sensor l Multizone curtain lenses are mounted on ceilings above entrance doors or in glazed areas. They’re a detection fence from floor to ceiling and any intrusion through them will generate an alarm l Broad multizone, wide angle or volumetric: These lens types are the most common found. They are more sensitive to movement across a protected space at right angles to their radial zones. They’re ideal for smaller spaces in domestic homes and small offices l Ceiling mount PIRs have 2-zone, 360-degree coverage, with conical zone arrangement arrayed in two circumference lengths. These sensors are ideal for use in offices that have large numbers of partitions between waist and shoulder height. Multiple installations generally employ overlapping pools of detection. If possible, the PIR should be installed so it positions the maximum number of zones at right angles to what is the most likely track of an intruder. Passive infrared sensors are far more sensitive to changes between live and dead zones and live and live zones, than they are to changes within these zones. A typical PIR is designed to activate if a certain number of zones are breached in a given direction at a given speed, so install the sensor in a way that will allow it to pick up the most likely line of an intruder’s passage. If the PIR you’re installing has no anti-masking feature, make sure it’s positioned so an intruder will have a hard time reaching it to mask it. Most modern sensors have anti-masking but the cheaper ones will be devoid of this feature and vulnerable to masking by anything from sticky tape to Blu-Tac. Smart sensors will alarm if they think they’re being deceived in this way. Look for creep zones, too. These lookdown zones are achieved by clever lens design and they make it much harder to approach a PIR from beneath. n

60 se&n

SEM0617_60alarms.indd 60

1/06/2017 4:59 pm


FASTER. SMARTER. STRONGER.

AN ARA DISTRIBUTION COMPANY

ENTERPRISE LEVEL ACCESS CONTROL at your fingertips…

WHY INSTALLERS PREFER

ProtegeGX

• Easy integration with a wide range of third party systems. • The open technology focus provides a comprehensive access control and security solution. • The ability to synchronise data between systems. • No SMAs means no ongoing fees and charges.

At ISCS we believe the key to great software is doing all the hard thinking up-front so you don’t have to. SIMPLE TO INTEGRATE

EASY TO OPERATE

EFFORTLESS TO EXTEND

ICT’s custom integration tools give you the freedom to utilise your own experts to create custom integrations and tailor a solution that meets your needs.

ProtegeGX offers an intuitive and user friendly interface with graphical floor plans and highly customisable status pages for controlling and monitoring the system.

The modular design and scalable licensing model makes ProtegeGX suitable for everyone – from small single door systems right through to large multinational corporations.

ISCS is the exclusive Australian distributor of ProtegeGX

Talk to us today to discover how an ICT ProtegeGX solution can benefit your organisation.

SEM0617_61.indd 1 DR092_dist_fp_press ad_r3.indd 1

1300 111 010 www.iscs.com.au

1/06/2017 2:24 pm 29/5/17 1:33 pm


● Special report

SecTech 2017

SECTECH ROADSHOW

SecTech Roadshow – 17 Exhibitors, 5 Cities, 1758 Attendees!

Sydney

n

SecTech started with a bang at Randwick Racecourse in Sydney with the tour’s biggest crowd pouring in to see the latest solutions as well as the 36 cameras in 3 groups on the test jig.

62 se&n

SEM617_62sectech.indd 62

1/06/2017 4:57 pm


Brisbane

n

Brisbane people also turned out in increased numbers to check out the latest electronic security solutions, attend the session panel and check out the Camera Shootout!

se&n 63

SEM617_62sectech.indd 63

1/06/2017 4:57 pm


â—? Special report

SecTech 2017

Melbourne

n

SecTech Melbourne was another big success with far greater numbers than last year. Victorians poured in to check out all the next gear and a great day was enjoyed by all.

64 se&n

SEM617_62sectech.indd 64

1/06/2017 4:58 pm


Adelaide

n

There wasn’t a hurricane in Adelaide this year and over the course of the day a good crowd turned out, starting with the camera shootout and building as the drinks began to flow. Business was being done during pack-up in South Australia – it was great to see!

se&n 65

SEM617_62sectech.indd 65

1/06/2017 4:58 pm


● Special report

SecTech 2017

Perth

n

It’s always a joy to visit Western Australia and the sandgropers didn’t disappoint – the day started with a big turn-out for the session panel and grew strongly from there, peaking after the Camera Shootout, with plenty of great conversations going on until pack-up at 6pm.

66 se&n

SEM617_62sectech.indd 66

1/06/2017 4:58 pm


Shootout

n

SecTech’s Camera Shootout is always highly informative and this year was no exception. The PTZ test in Sydney was a great success with many people wishing we’d taken it on tour. There were a couple of new angles introduced after the excellent Brisbane shootout, with WDR challenges expanded considerably – food for thought for next year!

se&n 67

SEM617_62sectech.indd 67

1/06/2017 4:58 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

ONSSI INTEGRATES OCULARIS 5.3 AND S2 NETBOX l ONSSI has announced a new integration between Ocularis 5.3 and S2 Security’s NetBox software Version 4.9.08 to allow users to bring Ocularis video and events into the S2 NetBox platform. S2 NetBox series products are full-featured, web-based enterprise access control and event monitoring systems capable of supporting up to 7,000 portals, according to the company. Core features include person record and cardholder management, event and alarm monitoring, threat level escalation and reporting, with no software to install. The latest release of Ocularis 5 features an improved user experience with extended mobile capabilities, including the ability to stream live video via a mobile device to Ocularis, and the ability to track mobile operators’ physical locations using GPS mapping. Distributor: BGW Technologies Contact: +61 2 9674 4255

ICT RELEASES NEW, RUGGED TSEC READER COVERS l ICT’S tSec readers are designed to withstand the harshest environments and ICT says its new vandal-resistant covers are ideal for locations where a card reader may be exposed to damage, including corridors, parking buildings, correctional facilities, and other public places. Highly resistant to impact, such as a swing from a hammer or a baseball bat, the robust construction provides greater durability and protection against vandalism and malicious damage. The flush design also serves as an anti-ligature measure for an additional level of safety. Please note that the existing keypad variations of the tSec range don’t operate correctly with these new vandal resistant covers. If you wish to use a tSec keypad reader with capacitive touch keypad, you will need a specific model (available as a kit including both card reader and cover), which will be available shortly.

HIKVISION RELEASES ECONOMY RANGE OF PTZS l HIKVISION Economy PTZ range is comprised of compact indoor and outdoor network cameras with endless 360 degrees’ pan, tilt and zoom capabilities. They are available in 2MP or 3MP variants with up to 30x optical zoom. The featured HIK-2DE4A220IWDE is a very compact 2MP PTZ camera, with 20x optical zoom that is perfect to cover indoor areas at a very economical price point. The small design and compact footprint has minimal impact on the aesthetics and architectural features of a building. For a complete product listing and features set visit csd.com.au or contact your local CSD branch. Distributor: Central Security Distribution Contact: 1300 319 499

Distributor: ICT Technologies Contact: +61 02 8916 6367

68 se&n

SEM0617_68prods.indd 68

1/06/2017 3:21 pm


CREATING THE FUTURE OF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.

• No “Per Seat” Licensing In System Pricing

DSX Access Systems, Inc.

• LAN/WAN Compatible

• Alarm Text Message/ E-Mail Notification

• Smart Card and Biometric Integration

• Hot Swap Redundant Communication Server

• Unlimited Access Levels Per Cardholder

• High Level Elevator Control Interface

• Integrated Photo ID Badging • Backup SQL Server

• Backwards Compatible Architecture

www.dsxinc.com

• Integrated Wireless Locksets

DSX CORPORATE HEADQUARTERS | 10731 Rockwall Road | Dallas, TX USA 75238 | 214.553.6140 | sales@dsxinc.com SEADAN SECURITY & ELECTRONICS | Unit 7, 170 Forster Road | Mt Waverley, VIC, 3149 | (03) 9263-0111 | seadanvic@seadan.com.au | www.seadan.com.au

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

SEM0617_69.indd 1

1/06/2017 2:26 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

GALLAGHER LAUNCHES CLASS 5 INTRUDER ALARM SYSTEM l GALLAGHER has released a Class 5-compliant cabinet and power supply. Combined with the recently released Gallagher Class 5 End-of-Line Module (ELM), Gallagher now provides an AS/NZS 2201 Class 5-compliant intruder alarm system from the one manufacturer. High value and sensitive assets are routinely protected by intruder alarm systems using 3-4 state analogue monitoring to detect sensor tampering. Gallagher has recently demonstrated that sites using this protection can be susceptible to sophisticated attacks, rendering these assets unprotected. Gallagher’s Class 5 solution is capable of protecting high value assets and IP from such attacks. Gallagher’s new Class 5 Cabinet implements additional security features beyond standard security cabinet functionality. Secure bi-locking ensures tightly controlled access into the Class 5 Cabinet, with a built-in vibration sensor for early detection of attempts to penetrate the cabinet. In addition, the new Class 5 Power Supply meets stringent standards for battery recharge times, and is equipped with mains fail, low battery and battery disconnected alarm functions. Gallagher’s Class 5 Intruder Alarm System has been verified by an independent test laboratory, ensuring a high level of confidence of compliance to the most stringent level of the AS/NZS 2201 Intruder Alarm System standard. Additional endorsement is in progress with IANZ (International Accreditation New Zealand), New Zealand’s premier accreditation body and full signatory member of ILAC (International Laboratory Accreditation Cooperation). Distributor: Gallagher Contact: +61 2 9412 4477

UTC TECOMC4 INTEGRATED MANAGEMENT PLATFORM l UTC recently launched TecomC4 – an integrated management software platform that allows a user to interface key business functions such as CCTV, intrusion and access control, all from a single interface. TecomC4 offers complete flexibility based on site requirements and with an easy-to-manage menu structure, this security management solution is a true example of how the UTC innovation teams are moving forward. Security2017 is an excellent chance to visit the UTC stand and see how forwardthinking the Tecom portfolio has become. Along with the improved Tecom portfolio of software and Challenger10 hardware, TruVision CCTV and Lenel access control portfolios will also be showcased.

SEE HIKVISION EASYIP, PANOVU, BLAZER EXPRESS AT SECURITY 2017 l HIKVISION will present its latest IP products, including the EasyIP 3.0 range, as well as thermal cameras, PanoVu panoramic camera, explosion-proof cameras and Blazer Express NVR at Security 2017. The third generation of EasyIP provides image resolution of up to 8MP, accordingly, a series of 4K IP cameras with varifocal lens will be demonstrated at Hikvision’s SecTech booth. Empowered with Hikvision’s H.265+ in-house smart codec, user will have the peace of mind for its high-quality image transmission and storage, as the new encoding technology enables over 50 per cent reducing (compared to standard H.265) the amount of required bandwidth, storage and associated costs. Distributor: Central Security Distribution Contact: 1300 319 499

UTC – Booth C18 Distributor: Interlogix Contact: 1300 361 479

70 se&n

SEM0617_68prods.indd 70

1/06/2017 3:21 pm


SUPREMA AND NETDIGITAL SHOWCASING LATEST TECH AT SECURITY 2017 l SUPREMA and NetDigital will partner to showcase the latest in biometric technologies at Security 2017 Exhibition & Conference in Sydney. Visit Suprema at Stand J18 during this year’s Security Exhibition to see the latest innovations from Suprema, a global leader in biometrics and securities technology. The Suprema stand will feature representatives from Suprema Korea, as well as their Australian distribution partner, NetDigital Security, to provide live demonstrations on next-gen Suprema products including FaceStation 2; a smart facial recognition terminal with IR-based image analysis; BioEntry W2, a multi-RFID reading, IP67-rated, vandal-proof fingerprint reader and BioStar 2, a powerful new biometric access control software. Distributor: NetDigital Security Contact: +61 8 8371 4166

GENETEC ADDS OFF-STREET PARKING ENFORCEMENT TO SECURITY CENTER l GENETEC reports that the latest version of its AutoVu Free-Flow off-street parking management solution will now be offered within Genetec Security Center, the company’s unified security platform that combines video surveillance, access control and automatic license plate recognition (ALPR). Free-Flow is designed to help increase parking enforcement efficiency by providing a real-time inventory of vehicles parked illegally in monitored parking lots, according to the company. “Free-Flow provides parking officers a real-time view of how many vehicles are in parking lots across all their facilities, and how many are parked illegally. With these precise details of where and when violations are taking place, parking managers know where to dispatch officers to ensure higher compliance,” says Charles Pitman, product marketing manager at Genetec. Now as a part of Security Center, parking managers will be able to monitor occupancy and violations across all their parking lots, directly from one location. Genetec Plan Manager provides an added interactive and graphical mapping application, allowing operators to visualize and manage environments. With Plan Manager and Free-Flow in Security Center, parking lot owners will now be able to dynamically navigate and oversee a large number of properties via their installed ALPR and associated video surveillance cameras for real-time, correlative coverage, according to the company.

INNER RANGE RELEASES V17 OF INTEGRITI l MAY 2017 sees the release of Integriti V17 by Inner Range. This new update to the Integriti system introduces significant new capabilities for both the Integriti Controller and Integriti Pro Software. The V17 controller firmware will provide support for the new OSDP to Wiegand converter, APERIO keypads on the Intelligent Access Controller (IAC), an Aiphone comms task allowing integration with an Aiphone GT analog intercom systems and support for the Inovonics RF interface module. V17 Integriti Pro Management Software introduces Schematic Element Operator Validation and Time Period Overrides. For more information contact your local CSD branch. Distributor: Central Security Distribution Contact: 1300 319 499

Distributor: Hills Contact: 1800 685 487

se&n 71

SEM0617_68prods.indd 71

1/06/2017 3:21 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: I’m interested in using structural sensors that will report attacks against a key building to our gate house. While it’s easy enough to get information from suppliers in relation to available product, getting a feel for proper application is a bit harder for us in the planning stages – what does SEN recommend we focus on? A: Physical structure is key. Any structural attack sensor needs to be permanently fixed to a structural concrete or masonry wall or floor. Any metal or metal clad structure that can vibrate through the movement of heavy transport, or expand in the sun, is not going to make a great base for structural attack sensors. It’s also vital that each sensor’s coverage will be directly related to the density and the stiffness of the base to which it’s fixed. Something to note is that you should never attach sensors to a structure that might shift when exposed to regular activities that occur on the site, including the movement or operation of plants or heavy mobile machinery, or the vibration of plumbing, etc. The only way to get this right is conduct a field test. Much of the sound vibration on a site is going to be undetectable by hearing or feel. Even if a surface seems ideal for the application of structural sensors, you

Our panel of experts answers your questions.

will need to make sure that the structure will actually transmit vibration signals – it may not. A vibration that occurs as an intruder attempts to get through an external wall may need to travel through that wall and down its surface before getting to a sensor. Remember that things like flex joints and mortar joints are going to attenuate the signal significantly. In terms of wall-mounted installation, sensors should be placed at intervals of about 6m about 1.5m above the floor level (it is possible to install structural sensors on floors). If there’s a problem with transmission of vibration from the source to the sensor, install a steel channel along a wall, with regular fixings (every 1.5m) to ensure a good vibration path. The structural attack sensors are then mounted inside the steel channel. Q: After reading about Help Desk in SEN last month in which a university was seeking to enhance the ability of its surveillance solution to provide association between individuals in video streams I started thinking about story as it applies to photographic planning and whether or not this has a place in system design and application. What does SEN think? A: We think story does apply to CCTV applications and not only to video streams but to potential still frames, too. For instance, in a recent case that depended on CCTV footage, a woman was walking through a crowded railway station in the UK and passed a man she later accused of penetrative sexual assault. The case went to court and the decision came down to

a handful of consecutive video frames – essentially stills – which showed the pair passing each other at normal walking pace and making no physical contact whatever. Importantly, digital zoom was required to drill into the frames, losing resolution, but the context of the moment was retained and the case thrown from court. Any incident involving fleeting contact between 2 people, such as a robbery or assault, will see investigators depending on the context they are able to glean from a handful of images that most clearly show identity and best express the ‘story’ moment. A single image may be all that is available to you and context will be everything. You can enhance context with wider angles of view and higher mounting heights but this comes at the expense of resolution. In response, you can increase the number of cameras in an area to increase the system’s overall ability to resolve a scene or use higher resolution cameras. The image below is a crop from a 4K camera delivering a 65-degree angle of view with the closest subject at 13m and the furthest at 40m from the lens. Even at this relatively wide angle, there’s compression but the high mounting height and street furniture helps assessment of depth of field. It’s important to consider potential vulnerabilities and potential access points when selecting a camera view. For instance, cameras viewing a public ATM might be positioned to offer face recognition around the machine, as well as the approaches and/or exits from the area around the machine. This coverage would allow investigators to see a perpetrator

Depth of field a real strength

72 se&n

SEM0617_72help.indd 72

1/06/2017 3:21 pm


need to work in layers. Multiple entrances to reduce flow volumes in every space, integrated blast barriers along narrow approaches to contain blast and shrapnel. Bag checks in areas with multiple blast barriers, or transit through explosives detection units, which are expensive. Explosive-making material, fuses, actuators, detonators must be managed at the distribution and retail level and attempts to obtain them monitored and responded to.

waiting and watching the ATM for some minutes before the attack, the attack itself and the perpetrator then running through a nearby exit into a carpark, where external and LPR cameras can take up the trail. This rule of story applies to operators in retail outlets and public surveillance applications who are following an event with a PTZ in real time. Don’t zoom too closely but allow sufficient angle of view to expose unfolding events and the people around events. Getting the angle of view right is something of a juggling act. While wider angles of view are best for context in open areas, you can achieve similar results with longer focal lengths and elevated mounting positions when cameras are at appropriately long distances from target areas. The challenge with longer focal lengths is compression, which makes objects that are metres apart appear to be adjacent to each other. This applies as much to the long end of PTZ teles as it does to the long end of varifocal lenses – and the longer the focal length the greater the association compression will apply to objects in a scene. To get around this, include objects in the scene at measured depths of field, even if they are simply bands of paint on nearby walls, or existing structures – shrubs, benches, window frames, paving patterns – that the security team can measure up. Q: After the vehicle attack on Westminster Bridge SEN had a query in Help Desk about technology that might mitigate threats and among other ideas, offered the reasonable

suggestion of an accelerated application of advanced forward collision avoidance technology (FCAT) to all new vehicles. After reading this I thought such FCAT tech could probably be enhanced in sensitivity and possibly integrated with GPS in order to disconnect accelerator and apply brakes in situations like Westminster Bridge and the more recent attack in New York’s Times Square. In the latter attack, the driver turned right across multiple lanes at relatively slow speed, before mounting the pavement of Seventh Avenue and accelerating into pedestrians so hard that when the car finally struck bollards at Broadway Plaza, it was nearly thrown upside down. Applying this global technology-based thinking to the Manchester attack, in which 22 people were murdered by a nail bomb and 60 wounded, many severely, what would you suggest might be the best way to defend space within and leading into public access venues? A: Tough question with expensive answers. In short, no easy answer. A modern motor vehicle is already a computerised machine with considerable potential for autonomous disconnection of drive— by-wire acceleration and application of braking systems – gently or aggressively depending on circumstances. With people moving through empty space on foot the paradigm is completely different. Short of smart devices with integrated explosives detection and Taser capability (it sounds silly but it’s the human equivalent of vehicle detection of risk and immobilisation), you

Q: What should we look for in access control readers? There are so many that it seems price is the only variable. A: What you’re looking for is long term reliability, read range, FIPS compliance, security of communications between reader and card and reader and controller, vandal resistance, self-generated EMI suppression, low current draw and weather resistance (you should favour IP ratings with IP67 being best outside). Also pay attention to replacement warranty and look for impact resistance, potted electronics, and audible and visual indication of operation to make for easier use. You should be purchasing a brand that has a history, a supply and support base and a future. Low cost brands being brought in this year by a start-up wholesaler are not going to cut it on bigger commercial or industrial sites and they will cruel your reputation as a quality integrator. Read range is something to think about, too. Most low cost prox cards need actual contact while better brands may support their claimed read range – the bigger the read range the easier a card can be to use, all other things being equal. With all electronic security solutions, think TCO. n

se&n 73

SEM0617_72help.indd 73

1/06/2017 3:21 pm


JUNE 2017 ISSUE 388

PLUG AND PLAY!

l Review: Panasonic i-Pro Extreme l Case Study: Hikvision Makes the Grade l Hc3 Plus Installs Bosch at 1 Market St l The Interview: Andrew Bowden, Bosch l News Report: SecTech Camera Shootout l Monitoring: Mobile Device Security l Special Report: Installing Access Control l Selecting Plug and Play Video Solutions l Cyber Security: Leveraging Public Networks l Scenes From SecTech Roadshow 2017

PP 100001158

+

events 2017 Security Conference and Exhibition Date: July 2017 Venue: Sydney Convention and Exhibition Centre, Darling Harbour Contact: +61 3 9261 4500 Next year we’re heading back to Sydney to the brand new International Convention Centre in Darling Harbour and the anticipation is palpable! Our whole team is looking forward to reuniting the industry in sunny Sydney, we look forward to seeing you there in 2017.

SECURITY & GOVERNMENT EXPO

SECURITY & GOVERNMENT EXPO

+

Security and Government Expo 2017

Date: November 2017 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with space for 20 companies to promote their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

Smart Summit Asia

=

Date: November 30 - December 1 Venue: Suntect, Singapore Contact: el: +44 (0) 330 3353900 The Smart Summit is a 2 day conference and exhibition covering the Internet of Things (IoT) ecosystem and its impact on the digital society. With 4 in-depth event tracks and over 80 leading speakers, no other IoT event covers the Smart Home, Smart Cities and Industrial Internet of Things in as much detail.

DAILY, WEEKLY, MONTHLY.

SEM0617_74events.indd 74

1/06/2017 5:37 pm


SEM0617_x.indd 1

1/06/2017 9:41 am


Powerful web based controller, powered by smart devices.

IN

AU

Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone.

Security Alarm

Access Control

Automation

STRA

L

With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate. For more information simply scan the QR code or visit innerrange.com.

No Software Required

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM0617_76.indd 1

IGNED

IA

S DE

Multiple Devices

Easy Setup with Checklist Prompting

T: 1300 319 499

Send IP Alarms via the Multipath-IP Network

W: csd.com.au

1/06/2017 2:26 pm


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.