Sen oct17

Page 1

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

& Networks

OCTOBER 2017 ISSUE 392

WIRELESS ALARMS

PP 100001158

SEM1017_1cover.indd 1

l l l l l l l l l

The Heat of the Moment: Thermal Surveillance Case Study: SES Victoria Installs Salto Genetec Kicks Goal at Cathedral of Rugby Case Study: MS Youngcare, Albany Creek The Interview: Ximen Yan, Uniview Retrospective: Star Casino’s Pit-Cam Applying Cyber Security Best Practice Alarm Monitoring: Operations is the Future ATG Opens Security Distribution in WA

29/9/17 4:56 pm


Hills_VisionAd_APAC_210x297mm.indd 1 SEM1017_2.indd 2

2017-05-31 3:39am PM 29/9/17 10:18


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS O CTO BER 201 7 ISSUE 392

By John Adams

SECURITY MANAGEMENT, ELECTRONIC SECURITY INEXTRICABLY LINKED ECHNOLOGY has long been considered a doubleedged sword for security managers. Since the first serious video surveillance, access control and intrusion detection systems came along, it’s been exceedingly difficult to manage expense over-runs and balance operational outcomes against total cost of ownership. At issue is trying to meld technology with operational procedures in a way that does not obliterate budgets, or task technologies with applications they cannot manage. There’s another issue here, too. It’s always tempting, from the point of view of security managers and providers, to imagine that a little more technology will finally do the job – more cameras, more access control, more barriers – even though the best results might be delivered by the application of design in public areas, by the installation of light, by the dissemination of simplified procedures organisation-wide – something as simple as the creation of a culture of politely challenging strangers with an offer of assistance. But for all this, technology and times are changing. Digital infrastructure, networked security devices and the rapid evolution of smart software applications and simpler, more capable software management solutions, have combined to give security managers more of the one thing they need most. The core of security management is the application and support of thoughtful security procedures, designed to initiate and manage a rolling proactive real time response to every possible threat scenario an organisation might face, from a storm event, to a fire, to an active shooter on site. But creating procedures that follow an event from inception to long term

T

support of traumatised staff and customers is only part of the battle. Your procedures must manage events in real time across the whole of an organisation – for a big university, that might include 10 sites, 5000 staff, 35,000 students and a tiny security team. For a hospital, the overall numbers are smaller but the operational application of procedures is no less challenging. Even a company with 500 staff in 4 locations will have its work cut out managing an unplanned-for emergency. One of the intense frustrations of studying great historical battles is the guesswork involved that inevitably leads to complete failure, regardless of individual courage or group sacrifice. At the Battle of Midway, Vice-Admiral Chūichi Nagumo could not organise a targeted response, instead being forced to gamble everything, multiple times, thanks to a complete lack of reliable intelligence about the strength and location of the forces arrayed against him. By the time he understood the threat, his battle was lost to a U.S. Navy which was reading his signals in real time! For security managers, accurate, real time intelligence is no less vital and it’s on this point that the amalgamation of technology and human skill comes together. The ability to eliminate avenues of threat, the ability to model threats evolving in areas for which a security team has prepared responses, the ability to manage responses in real time through access denial, live surveillance, real time communication with response teams and emergency services, support and protection of customers and staff – this is the face of modern security operations. And at the forefront of these operations is PSIM-style security management, the merging of human and machine through rehearsed procedures in response to expected, managed, and evolving threats. Using the word PSIM when talking about security technology is a risky business – PSIM is expensive and when not customised, is often proprietary,

requiring a security manager to abandon hard-won investments in technology that may have been accrued over decades. As the security manager of Logan Airport in Boston will attest, it’s a fact that the only thing that wins security teams appropriate investment in technology is complete disaster – safe operations serve to argue against spending. But PSIM as a concept is at the core of the story because it’s now possible to approach PSIM-style management using integrated technology to inform well-trained security teams in real time. It’s also possible to install security technology carefully selected for maximum possible benefit – thermal cameras on high risk perimeters with alarm on line-crossing, powered fencing with alarm zones and PTZ and armed emergency response on perimeters whose risk profile cannot tolerate breaches (major airports), barriers that funnel risk to controlled areas with blast mitigation features, hostile vehicle mitigation features, adjacent helo capacity, adjacent medical facilities and a local emergency ops centre that is secure and fully networked (sports arenas). We’re going to Security and Government Expo November 9 at the Realm Hotel in Canberra, an event whose entire reason for being is putting end users in government and corporate together with security technology providers, consultants and integrators with a single focus – to talk operations. SAGE is pointy as a knapped flint – it’s about the ways the latest technologies can be used to facilitate security management procedures with greatest economy and the best possible operational outcomes. Video surveillance, access control, vehicle mitigation, intelligent video analytics, perimeter intrusion, long range thermal, biometrics and centralised and remote management of everything. If you must get across the latest technologies for security managers and security operations, we’ll see you at SAGE. n

se&n 03

SEM1017_3ed.indd 3

3/10/17 12:37 pm


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM1017_4_5.indd 4

29/9/17 10:18 am


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM1017_4_5.indd 5

29/9/17 10:18 am


SE A SI 11 - MINA S 1PM RS

SECURITY & GOVERNMENT EXPO W W W. S E C U R I T YA N D G O V E R N M E N T E X P O . C O M . A U F O R F U R T H E R I N F O R M AT I O N C O N TA C T M O N I Q U E K E AT I N G E O N 0 2 9 2 8 0 4 4 2 5

S I LV E R S P O N S O R

EXHIBITORS

Intelligent Video Management Solutions

L A N YA R D A N D S P E A K E R S P O N S O R

MEDIA PARTNER

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

SAGE DPS AD_Oct17.indd 6

29/9/17 10:47 am


FREE EVENT REGISTER NOW

November 9, 2017 Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital from 12-6pm. CMDR Ainsley Morthorpe will speak on developing physical security strategies for the Australian Navy

Free refreshments 3.30 – 5.30pm

Enquiries please contact Monique Keatinge +612 9280 4425

SAGE DPS AD_Oct17.indd 7

29/9/17 10:47 am


22

56

36

42: CATHEDRAL OF RUGBY

OCT 17 22: WIRELESS ALARMS Wireless alarm panels and sensors have a tendency to ubiquity that belies their underlying functionality. Thoughtfully installed, they can offer excellent coverage in a range of applications, from residential to high security and they offer fast installation and relatively low installed cost per zone. 28: HEAT OF THE MOMENT

ENGLAND’S Rugby Football Union invested in a unified security solution to enhance operator efficiency at Twickenham Stadium in London. The results have considerably enhanced management of the integrated video surveillance and access control solution. 44: LOOK, MUM – NO HANDS! Hands-free access control is critical in many applications and none more so when it facilitates the movements of young people afflicted by disabilities that rob them of freedom of movement. At MS Queensland Youngcare Complex, ISCS and NASA Electronic Security Systems have partnered to make a difference. 48: XIMEN YAN, UNIVIEW

Thermal surveillance cameras are an underrated perimeter surveillance detection tool that puts mil-spec power into the hands of all security managers. With increases in resolution, reductions in prices and widespread integration into most popular VMS solutions, thermal pushes your sterile zone way back.

Chinese surveillance manufacturer Zhejiang Uniview Technologies is a networking specialist with a quite different take on what constitutes progress in video surveillance technology. For Uniview, progress is less about hardware and more about information. John Adams speaks with vice president of Uniview and founder of international business, Ximen Yan, to discover more.

38: SES INSTALLS SALTO

52: STAR CASINO

SALTO Systems has supplied its latest wirefree electronic access control technology to Australia’s State Emergency Service at Wodonga, Victoria.

SEM1017_8cont.indd 8

It’s been 2 decades since the first IP surveillance systems were installed in Australia, first at Crown Casino in Melbourne and a year later at Star

29/9/17 4:59 pm


68

42 28

38

regulars

Casino in Sydney. They were basic solutions compared to the current generations of digital CCTV technology but even the first generations highlighted the power and capability of digital video.

10 NEWS Latest business, product and technical news from Australia and around the world. 62: MONITORING

56: CYBER SECURITY BEST PRACTICE Given the central importance of cyber security to the infrastructure that underlies almost all our electronic security solutions, the industry’s lack of knowledge might well be the most pressing security issue of our time.

When you look at the hydra-headed beast alarm monitoring has become, it’s difficult to see a clear path forward, whether you’re an installer or a monitoring provider. But at times like these, the facts you need to focus on are the operational demands of end users.

68

68: EDITOR’S CHOICE What’s new from our manufacturers. 72: HELPDESK Our team of electronic security experts answers your tough technical questions.

Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

& Networks

OCTOBER 2017 ISSUE 392

WIRELESS ALARMS

PP 100001158

l l l l l l l l l

The Heat of the Moment: Thermal Surveillance Case Study: SES Victoria Installs Salto Genetec Kicks Goal at Cathedral of Rugby Case Study: MS Youngcare, Albany Creek The Interview: Ximen Yan, Uniview Retrospective: Star Casino’s Pit-Cam Applying Cyber Security Best Practice Alarm Monitoring: Operations is the Future ATG Opens Security Distribution in WA

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

Editor John Adams Advertising Manager Monique Keatinge Contributors Roger Pearce Simon Pollak Vlado Damjanovski Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge

publishing.com.au Design Tania Simanowsky e: taniasdesign@ optusnet.com.au Subscriptions 11 issues per annum One year (11 issues) Australia 11 months A$110.00 (incl GST)

22 months A$195.00 (incl GST) Overseas 11 months A$220.00 22 months A$440.00 WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM1017_8cont.indd 9

29/9/17 4:59 pm


Mobotix Appoints Thomas Lausten CEO

NEWS IN BRIEF OCTOBER 2017

CSD ANNOUNCES AGGRESSIVE NEW PRICE REDUCTIONS ON HIKVISION

CENTRAL Security Distribution has announced price reduction on Hikvision products. “CSD has partnered with Hikvision to offer very

aggressive savings on Hikvision’s range of surveillance equipment,” said CSD’s Mark Edwards, general manager of products and marketing. “A combination of

new purchases prices, factory rebates and a strong Australian dollar has seen prices on most standard Hikvision product lines reduce by around 6 per cent,” Edwards said.

Mark Edwards

“Couple this with the release of the H.265+ range from Hikvision, which see’s Hikvision’s 5MP cameras being sold at the price of 4MP cameras from any of our competitors, confirms that Hikvision continues to set the industry benchmark Vlado Damjanovski for quality and cost-effectiveness.” “This new pricing structure is available from CSD’s 8 National locations from Monday 2nd October 2017, which is perfectly timed for the lead up to Xmas, giving CSD’s loyal Hikvision customers an added bonus of more dollars in their pocket.”

CANTERBURYBANKSTOWN COUNCIL PLANNING NEW CCTV SOLUTION CANTERBURY-Bankstown Council sought tenders from suitably qualified and experienced tenderers for the supply, installation, testing and commissioning of new CCTV system at Civic Precinct, Fetherstone Street and The Apian WayBankstown to comply with relevant standards and specifications early October. Works under the contract include the provision of all necessary labour, plants and materials to undertake the works specified as per the attached drawings and specification Version 1.4 dated 9 September 2017 at Civic Precinct, Fetherstone Street and The Apian Way Bankstown and upgrade of the Security Control Room and Building Manager’s Offices located at level P1-Civic Tower. The contract is in 2 separable portions as follows: * Civic Precinct (Civic Tower at 66-72 Rickard Road and Paul Keatinge Park) - Bankstown. * Fetherstone Street and the Appian Way Bankstown.

LSC SECURITY SUPPLIES PARTNERS WITH DCS CABLES n LSC Security Supplies has announced a new partnership with Sydney based manufacturer,

Direct Cable Supplies (DCS). This partnership is the latest in a string of new distributorships

Stanley El Komala

for LSC, including wellknown brands such as HID Global, Dahua Technology and AMC. “Despite our extensive range of over 20,000 product lines, a quality cable brand has long been the Achilles’ heel of our electronic security offering” said David Cooper, product manager at LSC. “I’m pleased to say that our new partnership with DCS means this is no longer the case.” According to Cooper, LSC chose to partner with

DCS Cables for a number of reasons. “DCS is an ACMA licensed and accredited cable manufacturing company, so installers can buy with confidence knowing that their cable is compliant with the Australian telecommunications cabling standards,” he said. “In addition to its solid copper construction the 305m boxed security and data cable products include their new EZITAG feature – which allows

installers to quickly and easily pre-mark their cable by simply circling the relevant location. Add that to the endof-reel meter marking feature and you have a pretty innovative cable.” said Cooper. A wide range of 4-core, 6-core, Figure 8, CAT5E, CAT6 and specialty security cables are now in stock and available to purchase from the LSC Security Supplies website or at one of LSC’s 5 branches.

10 se&n

SEM01017_10news.indd 10

29/9/17 3:51 pm


HID Global Buys Controller Manufacturer, Mercury Security Products

HID Global Buys Controller Manufacturer, Mercury Security Products p.12 Brilliant Security Integrations Fight Tooth and Nail For ASIAL Excellence Awards p.14 Melbourne Airport T2 Expanding Security Screening p.16 Genetec Announces New Access Control as a Service Offering p.18 Seminar Topics Announced For Security and Government Expo 2017 p.20

COMPILED BY JOHN ADAMS

MULTICOM BMC-3G ALARM COMMUNICATOR FOR SOLUTION 2000/3000 PANELS n TECH innovators Bosch and Suretek have joined forces to build an alarm communicator that connects the Bosch Solution 2000/3000 panels to Suretek’s fully managed private network. The new Multicom BMC-3G will be available from Bosch authorised distributors end of September 2017. The BMC-3G is an advanced alarm communicator offering direct integration with the Bosch Solution 2000/3000 panels and safe transfer of alarms via the Surepoll network. Developed in Australia with Bosch, it facilitates compliance of Bosch panels with Australian Standard AS2201.5 2008. The BMC-3G Dual SIM solution doubles the redundancy on 3G, IP and voice by utilising 2 separate carrier networks. It enables delivery of

alarm messages across 3 transmission paths, including 3G IP and voice. The BMC-3G detects issues and outages on the active carrier network and automatically switches to the inactive SIM. If one path fails, the BMC-3G automatically transmits across one of the remaining paths providing constant reliable communication to Australian Standard AS2201.5 2008.

THE BMC-3G IS AN ADVANCED ALARM COMMUNICATOR OFFERING DIRECT INTEGRATION WITH THE BOSCH SOLUTION 2000/3000 PANELS AND SAFE TRANSFER OF ALARMS VIA THE SUREPOLL NETWORK.

“The BMC-3G alarm communicator provides the Solution 2000 and 3000 panels with additional means of securely delivering alarm activations. This technology doubles the redundancy, detects network outages, and switches to the remaining communication options. It’s a clever and strategic offering for Bosch alarm installers and businesses requiring peace of mind. I also see it being very popular with sites that do not have a fixed

ISCS BRINGING ICT PROTÉGÉ, NX WITNESS TO SECURITY AND GOVERNMENT EXPO

telephone line,” said Chris Dellenty, general manager of Bosch Security Systems. “Our team has done an excellent job and I think Bosch technicians are going to love how easy the BMC-3G is to install,” said Glenn Smith, managing director of Suretek. “Using the TechTools web portal installers can centrally manage, program and update all of their Bosch panels locally or remotely, using a mobile or PC via a standard web browser.”

HMAS STIRLING SEEKS ELECTRONIC SECURITY UPGRADE n AUSTRALIA’S Department of Defence - DSRG is seeking an electronic security upgrade to HMAS Stirling. Security works include an upgrade of the electronic access control system, provision of a controlled key cabinet, lockable cabinets, an amplifier, breakout box, ceiling speakers and associated cabling infrastructure at HMAS Stirling. HMAS Stirling is a Royal Australian Navy (RAN) base that is part of fleet Base West situated on the west coast of Australia. The base is located on Garden Island, near Perth. Garden Island also has its own military airport on the 10km long and 1.5km-

wide island. HMAS Stirling has expanded significantly within its existing boundaries and is the largest of the RAN’s shore establishments, with a base population of approximately 2300 service personnel, 600 defence civilians and 500 contractors. Amenities include berthing and wharves, vessel repair and refit services, a ship-lift, and a helicopter support facility, as well as medical facilities, fuel storage and accommodation. The base also hosts the Submarine Escape Training Facility – one of only 6 in the world and the only SETF in the Southern Hemisphere.

HMAS Stirling is home port to 11 fleet units, including 4 Anzac class frigates (HMAS Arunta, HMAS Ballarat, HMAS Toowoomba and HMAS Perth), all 6 Collins class submarines operated by the Royal Australian Navy Submarine Service (HMAS Collins,

HMAS Farncomb, HMAS Waller, HMAS Dechaineux, HMAS Sheean and HMAS Rankin), and a fleet replenishment vessel, HMAS Sirius. The electronic security tender for HMAS Stirling closes on October 19.

ISCS will highlight its range of state-of-the-art security solutions at this year’s SAGE Expo. ISCS’s main showcases at SAGE will include the ICT Protégé range of products and the Network Optix NX Witness VMS platform. Both products were extremely popular at the recent Security trade show in Sydney and they expect the same interest at SAGE. The unique and innovative NX Witness VMS has proved to be a breath of fresh air in the competitive CCTV management environment. The Protege System is an enterprise-level integrated access control, intrusion and building automation system with a modular design that allows operation at single sites right through to multinational corporations. Be sure to enquire about the ISCS/HID Mobile Access Reader promotion to receive your free reader and credential package to get your Mobile Access solution moving! Security and Government Expo will be held on November 9 from 12-6pm at the Realm Hotel in Canberra. Preregister now and don’t miss it!

se&n 11

SEM01017_10news.indd 11

29/9/17 3:51 pm


NEWS OCTOBER 2017

ATG OPENS DISTRIBUTION BUSINESS IN WESTERN AUSTRALIA n ACCESS Technology Group has opened a security distribution business in Western Australia, distributing Risco, Milesight and Fibaro, as well as a wide range of peripherals. According to general manager, Tim Kershaw, ATG is the combination of a group of companies, including Access Antennas, Access Security Distributors and the recently acquired Smart Home Group. Parent company, Access Antennas, distributes mobile phone antennas, TV antenna and Satellite TV systems, 12V batteries and solar, commercial MATV, fibre optics and wireless technologies. Meanwhile, Access Security Distributors distributes Risco Security products, access control products, Milesight and is the Australian distributor of Kepler CCTV products. Smart Home Group is a home automation distributor, which handles Fibaro products, as well as a range of audio visual solutions. “ATG managing director Hal McDonald developed Access Antennas from just 2 staff to a multi-million-dollar, communications, audio visual, and now security empire, that is dominating the WA market,” Kershaw said. “Recently, the company relocated to a new 1000sqm premises in central Perth within 4km of the CBD. They have 14 staff trained on a diverse range of communication and security products. “ATG has one of the biggest and most diverse ranges of products in the Australian wholesale market, ranging from the manufacturing and distributing of antennas, data cabinets, cable, TV antennas, HDMI cables and extenders, wireless products, satellite TV, fibre equipment, modulators, solar panels, MATV hardware and

BRILLIANT SECURITY INTEGRATIONS FIGHT TOOTH AND NAIL FOR ASIAL EXCELLENCE AWARDS

Near Ku (left) technical sales, Tim Kershaw general manager, Hal McDonald, managing director and Gavin McDougall, business development manager.

many other products. “We are forever sourcing the latest technology all over the world and bringing the latest products to Australia before anyone else,” Kershaw said. “This year we are one of the first companies in Australia to supply lithium batteries to the industry with builtin BMS under $1000. “We are also direct manufacturers of 12-volt solar panels meaning we can design off the grid CCTV systems using our batteries, wireless and battery products. We are known as a one-stop shop with everything from intercoms to MATV. We are able to tender big projects from A to Z having all the products in one location,” he said. “With our own manufacturing facility next to the Bosch facility in China, we are able to do a lot of our own branded equipment and save customers going through the middle man passing the savings on to the end customer. This gives us the edge to produce a product to our own specification and with the quality control we expect for market satisfaction.” According to managing

director, Hal McDonald, once Kershaw started with ATG, the company launched its new security division, Access Security Distributors, to cater for the huge demand in wholesale trade that was coming through. “We have since secured official distribution with Risco Security. Earlier this year the company bought out Smart Home Group, which gave us the addition of Australian, distributorship of the Fibaro home automation products and Milesight CCTV,” said McDonald. “Tim’s years of experience and knowledge in the security industry and with the Risco brand has been the key to the instant success with the product. “Alongside Risco, we are also distributing 3 major brands of CCTV products and access control systems alongside the standard security-related products you expect to see, which include locking, exit devices, intercom systems, time attendance, biometrics, detection devices, etc.” Kershaw says Access Security Distributors is already having good success.

“We are growing daily, with the new Risco Prosys Plus commercial panel having just hit the market, this opens more new and exciting opportunities to offer the WA security industry, with a fresh new large intrusion panel ready to show competitors how it’s done,” Kershaw said. “The integration of Fibaro products with our Risco security systems, gives a complete full home solution to your security and home automation needs. We have a team of 14 staff, multiple tech support and sales people on hand to offer the support people need.”

WITH OUR OWN MANUFACTURING FACILITY NEXT TO BOSCH FACILITY IN CHINA, WE ARE ABLE TO DO A LOT OF OUR OWN BRANDED EQUIPMENT AND SAVE CUSTOMERS GOING THROUGH THE MIDDLE MAN PASSING THE SAVINGS ON TO THE END CUSTOMER.

A PHALANX of brilliant security integrations has fought it out for top honours across multiple categories of the ASIAL Excellence Awards, which will be presented in Melbourne, late October. Submissions included ECS’ integration of thermal surveillance technology for NSW Roads and Maritime Services, Norman Disney Young’s work on the new Bendigo Hospital, the Geutebruck digital surveillance upgrade at Crown Perth, SAPE Industry’s enterprise CCTV installation for Aurukun Shire in far north Queensland, Schneider Electric’s integration of 16 sub-systems for Sunshine Coast University Hospital, Fredon’s integration for the new Australian Embassy in Bangkok and Honeywell Building Solutions’ layered solution installed at Eastern Goldfields Regional Prison. According to ASIAL general manager, John Fleming, each of these major integrations represented the pinnacle of electronic security technology in its vertical, with applications often installed under conditions of extreme duress. “Judges for this year’s ASIAL Excellence Awards and for the OSPA’s were generally pleased with the quality of entries received and there were some real standouts in key categories that really tested the panel, with some judges taking time out for further consideration of entries during the judging process,” Fleming said. The Awards Dinner will be held on 19 October 2017 in the River Room, Crown Melbourne from 6.30pm-10.30pm. The MC for the evening will be one of Australia’s most experienced and welltravelled comedians, Lehmo.

WITH OUR OW FACILITY NEX IN CHINA, WE OF OUR OWN AND SAVE CU THROUGH TH THE SAVINGS CUSTOMER.

14 se&n

SEM01017_10news.indd 14

29/9/17 3:51 pm


NEWS OCTOBER 2017

MELBOURNE AIRPORT T2 EXPANDING SECURITY SCREENING n MELBOURNE Airport is expanding its security screening capability at the new $A330 million T2 terminal and builder Lend Lease sought expressions of interest on behalf of the airport from security suppliers and integrators early October. The Architectus-designed $330 million international terminal expansion, completed in 2011, is the largest ever upgrade at Melbourne Airport. With more than 41,000 m2 of new space and 8000 m2 of refurbished area it covers 5 new international gates, 3 with dual-level aerobridges able to accommodate an Airbus 380 or 2 smaller aircraft, a new outbound

passenger processing area, extensive new baggage conveying and sorting systems and a world-class retail precinct. Completed within an operating airport environment that experiences more than 26 million passenger movements and 195,000 aircraft movements annually, the project, known as T2E, was delivered in 4 main stages over 4 years. Details of the equipment required are understandably light on the ground but it’s likely they include supply and installation of Explosive Trace Detection (ETD) Equipment, as well

as Walk-Through Metal Detectors. Use of ETD equipment is being pushed through all regional, domestic and international airports after the foiling of the

Bomb in the Barbie Doll plot to bring down an Etihad flight carrying 400 passengers flying from Sydney to Beirut earlier in the year. The plot was foiled thanks

to intelligence from Lebanese security forces, which led to a massive response from NSW Police in Sydney. The Melbourne Airport T2 tender closed on October 10.

VIP SECURITY SHOWCASING MOBOTIX SOLUTIONS AT BUS & COACH, ROTORUA n NEW Zealand-based integrator VIP Security will be showcasing its MOBOTIX CCTV solution for public buses at the annual Bus and Coach Conference next week, running from 4 to 6 October in Rotorua, New Zealand. Using MOBOTIX cameras, VIP Security developed an innovative solution to

several of the challenges specific to recording, storing and retrieving footage on moving buses. It has also been designed to handle environmental conditions, such as power fluctuations, vibrations heat, humidity and dust. The flexible MOBOTIX S15, with 2 hemispheric sensors, and hemispheric Q25, were all that was

required to cover the entire area of each bus, significantly keeping costs down. This was combined with a vibration-proof SSD for medium long-term storage of footage, also installed on each bus. MOBOTIX outdoor cameras were ideal because they have no moving parts and are

IP66 certified, making them extremely robust and reliable. Furthermore, because MOBOTIX technology is flexible and customisable, the integrator was able to harness the intelligence of the MOBOTIX firmware to create a number of additional features. Footage can automatically be downloaded for retrieval from a bus where an incident has occurred, the next time the relevant bus enters the depot. Also, automatic health checks run every time a bus enters the depot, ensuring all aspects of the camera’s recording and storage are functioning correctly. The longevity and reliability of MOBOTIX cameras, along with the SSD memory storage, make this a great longterm solution with a significant ROI, which potential to become even greater in the future, as both MOBOTIX camera technology and external storage technology continue to develop.

PHILIP GEORGE JOINS PELCO AUSTRALIA TEAM PHILIP George has joined the Pelco Australia team as sales manager - ACT/ VIC/TAS regions where he will be responsible for managing Pelco’s strategic partners and handling new business development. “Philip has more than 8 years’ experience in the CCTV industry with expertise in business development, market development, technical sales and product strategy,” said Pelco’s general manager sales AUS/NZ, Craig Cobbin. “Pelco is enjoying doubledigit growth throughout 2017 with a solid pipeline ahead. Having Philip join us with his strong business development skills and passion for fanatical customer service, is a welcome addition which will continue to grow Pelco’s business, as well as supporting the Pelco Australia Team and our customers.”

16 se&n

SEM01017_10news.indd 16

29/9/17 3:51 pm


NEWS OCTOBER 2017

NO TRAINING REQUIRED FOR SECURITY SALES, INSPECTIONS, ADVICE & INSTALLATION n ACCESS Canberra, which is responsible for security industry licensing in the Australian Capital Territory (ACT) under the Security Industry Act 2003, has announced that requirements for technical security employee licence applicants have changed. From 31 August 2017 applicants for the following security employee licence sub-classes will no longer need to have training qualifications in order to apply for a licence in those sub-classes: • Selling security equipment (2B); • Carrying out surveys and inspections of security equipment (2C); • Giving advice about security equipment (2D); and • Installing, maintaining, monitoring, repairing or servicing security equipment (2E). This change brings the ACT in line with most other jurisdictions regarding the ‘requirements’ for these subclasses.

SAAB BRINGING VOLATILE ENVIRONMENT SMS ONEVIEW TO SAGE n Saab Australia will be showcasing OneView, its award-winning intelligent security and surveillance systems at Security and Government Expo in Canberra on November 9. OneView is the most accurate security and information response system that’s simple to use and fully customisable. The solution is based on

Saab’s battle-proven defence research, design and integration experience and Saab says it is the ultimate security solution for any at-risk volatile environment. “This complete security solution dramatically improves the crisis response process with fast, accurate situational awareness; incident management and

response using your own pre-programmed instructions; and integrated communications,” said Saab’s Brett Bertram. “The point-and click interface is very fast and simple to use, so operators are able to remain calm and in control – be sure to get a demonstration of OneView at Security and Government Expo.”

GENETEC ANNOUNCES NEW ACCESS CONTROL AS A SERVICE OFFERING n GENETEC has released Security Center Synergis SaaS edition. This new edition will offer a turnkey access control solution for

easier deployment and maintenance. Synergis SaaS edition removes the need to purchase and install costly on-premises servers and streamlines

maintenance, allowing the corporate IT staff to focus on other business-critical projects. Synergis SaaS edition is expected to be available in November 2017. Synergis is the access control solution in Genetec Security Center, an open-architecture, IP security platform that combines video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. All Synergis access control software editions integrate with a wide selection

of access control hardware from leading manufacturers. The new Synergis SaaS edition will give customers the flexibility to adjust their system usage as their needs change, reducing budget requirements for access control capital expenditures. Customers will also be able to quickly and efficiently deploy their access control system, and benefit from automated update notifications. Multisite organizations will be able to centrally manage their access control systems more efficiently.

LONDON METROPOLITAN POLICE UNROLL TALON ANTI-VEHICLE NETS LONDON Metropolitan Police deployed new Talon anti-vehicle nets at a parade by active-duty sailors and naval veterans in near Whitehall. Talon nets are designed to puncture and grip tyres by entangling the front wheels, bringing vehicles up to 17 tonnes to a rapid, straight-line stop. According to the Met, Talon nets can be deployed by 2 officers in less than 1 minute and can effectively stop vehicles larger than a London double-decker bus. “The speed and low manpower required for deployment means that the nets can be relocated very quickly if necessary,” a police spokesman said. “The vehicle skids in a straight line significantly reducing risk to crowds and producing a wellcontrolled stop after which officers can engage with the driver.” Metropolitan Police Chief Inspector Nick Staley said; “the equipment undoubtedly has the potential to save lives and is just one of a number of measures being taken to provide protection to crowds attending major events in London and reassuring businesses, workers and visitors as they go about their daily lives.”

Mike Richardson

18 se&n

SEM01017_10news.indd 18

29/9/17 3:51 pm


NEWS J UCLY O T O2B0E1R7 2 0 1 7

SEMINAR TOPICS ANNOUNCED FOR SECURITY AND GOVERNMENT EXPO 2017 n SEMINAR topics for 2 of the seminar sessions at Security and Government Expo 2017 in Canberra between 12-6pm on November 9 have been announced, according to ASIS ACT’s Peter Bourke. Seminar 1 will feature T4 speaking on ASIO Tech Notes and Alignment with the Australian Government’s Protective Security Policy Framework. Seminar 2 will feature SCEC security consultant David Eddleston speaking on Physical and Technical Security Requirements for Government Departments. The SAGE Seminar will be concluded with a panel discussion on Australia’s Strategy for Protecting Crowded Places from Terrorism, with input from the Australia-New Zealand Counter-Terrorism Committee. Seminars will begin at 11:00am. “Later in the afternoon, Captain Ainsley Morthorpe, director of policing and security and service security adviser - Royal Australian

Navy, will speak inside the exhibition hall on the topic Developing Physical Security Strategies for the Australian Navy,” Bourke said. Security and Government Expo, which is sponsored by SAAB, with Lanyard and Speaker Sponsor being Hills and Genetec, brings together government and commercial end users, consultants, integrators and installers in the nation’s capital to see the latest security products and technologies, and to discuss key operational outcomes, in a relaxed and informal atmosphere. Leading Industry Partner is ASIS ACT and SAGE incorporates a seminar run by ASIS ACT, as well as the ASIS Dinner, which will be held at the National Press Club and is jointly sponsored by Manteena, SRA Solutions and ASIS ACT. Now in its second year, the SAGE exhibitor list is strong – there will be plenty of excellent and highly targeted security solutions on show. Current

exhibitors include AXXON, Dahua Technology, FSH, EKA, CyberLock, Gunnebo, EVVA, Perimeter Systems Australia, EZI Security Systems, Milestone, Smiths Detection, Honeywell, Axis Communications, SAAB, Telstra, Hikvision, SX Technologies, ASSA ABLOY, Geutebruck, Smart Entity, Harcor, Chubb, ISCS,

Inner Range, Gallagher, LSC, Panasonic, iCetana, Tyco, Critical arc, Paessler, Secure Edge Technologies and C.R. Kennedy. SAGE is short and sharp – one afternoon only – and it gives security professionals in Canberra the chance to see the latest security solutions in their home town with no need to travel.

NOW IN ITS SECOND YEAR, THE SAGE EXHIBITOR LIST IS STRONG – THERE WILL BE PLENTY OF EXCELLENT AND HIGHLY TARGETED SECURITY SOLUTIONS ON SHOW.

JONATHAN LIAROS JOINS SENSATEK AS DISTRICT ACCOUNT EXECUTIVE n JONATHON Liaros has joined boutique distributor SensaTek as district account executive. Liaros, who began his career as a technician, has most recently held positions at Hills and Allegion. According to Liaros, one of the attractions of joining SensaTek was that the company is a blank slate defined only by an intense commitment to customer support. “SensaTek is a blank slate so it’s about building relationships, bringing in the business and supporting it,” Liaros said. “We have a major task at hand but the response from the market has been excellent and that

suggests we are on the right track in terms of the direction we are taking.” Liaros said brands like Vicon, Aimetis and Vivotek also attracted him to join SensaTek. “Vicon is arguably the oldest CCTV manufacturer in the world and it has some impressive products that draw on the latest technologies,” he said. “Aimetis is another strong solution that has not had much exposure in Australia but is generating plenty of interest from end users. “A particular positive at SensaTek is the opportunity to work closely with Vivotek, which is right up among the top brands – a strong

range at a competitive price – well supported in Australia by Farshid Parhizkari, who is so passionate about the product. “Vivotek as a company is available – the team is willing to re-design products to meet applications,” Liaros said. “It’s a brand I think we will see break through over the next 12 months and I’m looking forward to being part of that success.” Meanwhile SensaTek’s managing director, Bill Barbagiannakos, said Liaros will be a major asset to the business. “Jonathan began his career back in 1999 as a technician and his most recent role

Jon Liaros

was supporting enterprise solutions at Hills Ltd, so he’s the complete package,” Barbagiannakos said. “As well as being technical, Jonathan is a people person who is committed to building working relationships with integrators

and end users - that commitment is what defines the SensaTek business.” According to Barbagiannakos, the SensaTek team will continue to expand, with additional announcements coming soon.

20 se&n

SEM01017_10news.indd 20

29/9/17 3:51 pm


NEWS OCTOBER 2017

HID GLOBAL BUYS CONTROLLER MANUFACTURER, MERCURY SECURITY PRODUCTS n HID Global has purchased controller manufacturer Mercury Security Products from Access Control Related Enterprises (ACRE), the owner of Vanderbilt and ComNet. Since its inception, Mercury Security has focused on a distinct manufacturing niche: innovative OEM hardware for the increasingly demanding world of facility security and access control. Authentic Mercury controllers, readers and embedded solutions consistently provide partners with

MERCURY SECURITY HAS FOCUSED ON A DISTINCT MANUFACTURING NICHE: INNOVATIVE OEM HARDWARE...

the most reliable and scalable open platforms. With more than 4 million panels installed around the world, Mercury has grown to become the controller platform supplier of choice for access control. “Divesting Mercury after many years of success since ACRE purchased the business in 2013 is a strategic move that allows ACRE to focus on its core access control, video and intrusion businesses under the Vanderbilt and ComNet brands,” said ACRE CEO, Joseph Grillo. “HID is the perfect home to provide for the continued growth and success of Mercury, which will remain a valued technology supplier to Vanderbilt.” Mercury Security Products, located in Long Beach, California. The company has been

providing enhanced access control technology to its partners since 1992. Partners include Lenel, Brivo, Honeywell, S2, Keri Systems and many more.

HID’s acquisition of Mercury Security is subject to regulatory approval and customary closing conditions. It is expected to close in Q4 2017. Financial terms

of the agreement are not being publicly disclosed. Houlihan Lokey Capital, Inc. and Raymond James & Associates, Inc. acted as financial advisors to ACRE and Mercury.

They see a fun day of shopping. You see smart data to help increase sales. Bosch empowers you to build a safer and more secure world. And with built-in video analytics in our IP 4000i cameras and up, we allow you to use video data for more than security alone. Anything from improving sales to increasing customer experience.

+1

People counting

Queuing alarm

Find out more at boschsecurity.com.au or email stales@au.bosch.com Enforcing safety regulations

12 se&n

SEM01017_10news.indd 12

29/9/17 3:51 pm


Never miss a thing

PNM-9081VQ / 9080VQ Hanwha’s new 20-megapixel and 8-megapixel, multi-directional camera, featuring our exclusive Wisenet 5 chipset, delivering crystal clear images in virtually any video surveillance application.

(02) 9749 5888

SEM1017_13.indd 1 SEN OCT PNM-9080CQ.indd 1

eos.com.au

Formerly Samsung Techwin

29/9/17 10:17 am 20/09/2017 10:37:31 AM


1

Receive alarm notifications and control your alarm system like never before - anywhere at any time. SkyCommand delivers alarm notifications and the freedom to control security areas, lights, heating/cooling and door access. Features: - Instant notifications for alarm events to your mobile phone - Arm and disarm your security system remotely - Supports multiple sites and security areas - Remotely turn on and off locks and appliances - Notification and event history - App pin entry and lock Utilising T4000 high-level integration to an Integriti, Inception or Concept system, SkyCommand provides powerful control over door access, security and automation.

Available now on:

Third party alarms systems can also be controlled using the output on a T4000 via a key-switch input on any third party alarm panel.

Multiple Sites

Easy Access

Multiple Areas

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM1017_15.indd 1

Simple Control

T: 1300 319 499

Notifications

W: csd.com.au

29/9/17 10:17 am


ADVANCED

PERIMETER PROTECTION For any size system. THE NEW FLIR FB-SERIES thermal security camera delivers affordable, best-in-class perimeter protection for short to midrange distances and is certified by 3rd party technology partners.

FLIR offers the widest range of advanced surveillance products to fit any situation.

Learn More at flir.com/security

SEM1017_17.indd 1

29/9/17 10:17 am


SEM1017_19.indd 1 Dallmeier_S-Panomera_A4_Montage_UK_Vektor.indd 1

29/9/1712:13:18 10:17 am 19.02.2015


Darkfighter X Oceania-2.pdf 1 2017/9/18 15:06:26

R

IN BRIGHT COLOUR ALL DAY, ALL NIGHT

M

M

Y

Y

MY

Hikvision DarkFighterX Using Dual-Sensor Imaging to Provide Full Colour Images Hikvision has taken its DarkFighter technology up to the next level with the DarkFighterX Series PTZ and Bullet Cameras. Using single-lens, dual-sensor technology, each 2 MP DarkFighterX Camera mimics human eyes to render bright, full-colour images. How? By fusing two discrete light spectra: an IR sensor captures brightness, and a visible light sensor captures colour – even under 0.001 lux. Install Hikvision’s DarkFighterX in city streets, public spaces, and critical travel nodes for the most critical protection. In colour – all day, all night.

Hikvision Oceania

See us at SAGE 2017 Canberra 9th November

Unite 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Toll Free:1300 557 450( Australia only) Email:salesau@hikvision.com www.hikvision.com.au

SEM1017_21.indd 1

29/9/17 10:17 am


● Special report

Alarms

WIRELESS ALARMS Wireless alarm panels and sensors have a tendency to ubiquity that belies their underlying functionality. Thoughtfully installed, they can offer excellent coverage in a range of applications, from residential to high security and they offer fast installation and relatively low installed cost per zone.

HILE many low cost smart home and self-monitored alarm systems make use of wireless technologies to link sensors to controllers, it’s a mistake to imagine that wireless is the domain of low end solutions. There are quality alarm systems in this space, many with functionalities that include video verification, access control and automation, as well as the more common intrusion detection. According to Wayne Trethown, general manager of Central Security Monitoring, an excellent wireless alarm system should be easy to configure, easy to use, provide reliable and secure communications between wireless devices, good wireless range, long battery life and provide a user-friendly interface, such as a smart phone app. “From our current offering, features and functions such as Z-Wave, Zigbee, video, cloud services and remote management are already provided,” Trethowan says. “The smart phone apps also provide a single, user friendly platform for endusers to interact with the system and its peripheral devices and features. This type of integration will continue to expand as technology allows. End users are certainly embracing these advanced functions. We see the trends and feature requests being driven by both installers and the broader consumer community. Installers are at the coal-face and will often receive valuable feedback and suggestions from their prospective customers. “The core advantage of wireless alarm panels is ease of installation, thanks to no cables so systems are easily expanded and are relocatable,” Trethowan says. “There are some things to take into account with wireless, apart from normal alarm system best practices with regards to location of sensors for optimum catch performance and reduction of false alarm occurrences. Installers should ensure that the devices are located within wireless range of the control panel/receiver to ensure reliable wireless communications.” Trethowan argues we have reached a point where battery life is a non-issue with medium and larger systems, with battery life measured in many years. “Most quality wireless alarm systems now provide device battery lifespans in a number of years,” he explains. “As both system and battery technology advances, these periods will increase even further.” Trethowan concedes there are still some installers and end users who are not confident in wireless alarm system technology. “There are also applications, whether they be commercial and industrial or integrated systems with access control, CCTV and automation

W

22 se&n

SEM1017_22alarms.indd 22

29/9/17 3:53 pm


BY J O H N A D A M S

THE CORE ADVANTAGE OF WIRELESS ALARM PANELS IS EASE OF INSTALLATION THANKS TO NO CABLES SO SYSTEMS ARE EASILY EXPANDED AND ARE RELOCATABLE.

integration, where wired solutions will remain as the only option,” he says. “Wired systems also negate the need for battery replacement, being mindful of a restricted wireless range and are basically an install and forget solution. Wired systems may not necessarily be only a local or monitoring station solution. Many can also provide personal monitoring facilities using voice, SMS, email and push notifications and allow control by the same methods.” At CSD, product manager intrusion, Paul Knight, says the company carries a full suite of wireless products, including sirens, repeaters, keypads and all the standard detection devices. It also has home automation options like Z-Wave and Wi-Fi cameras for a complete integrated wireless offering. “Speed of installation and the ability for proper device placement due to no cable restrictions is the big advantage with wireless, and battery life continues to expand, thanks to more efficient circuitry,” Knight says. “There are obviously things that need to be taken into consideration during installation to ensure best performance. There are a lot of things that affect wireless performance, from different types of construction materials to signal reflection. Good wireless systems have tools like field strength signal meters that installers should use for correct device placement.” When it comes to trends in wireless alarm systems – Z-Wave, Wi-Fi, video, cloud services, remote management, automation options – Knight is circumspect about where the market is going, recognising these are relatively early days for many technologies. “Its early days in Australia and it’s an education process for both consumers and integrators,” Knight explains. “However, feedback I have received from the market is that most consumers are now looking for a fully connected home solution. There will

always be room for a traditional security system, however, the domestic market in particular is certainly evolving.” At EOS Australia, Norman Wee, strategic business development managers, says wireless alarms, as well as wireless technology as a whole, have come a long way. “Top qualities that a wireless alarm system should have include excellent reliable wireless range, strong wireless encryption, home automation technologies such as Z-Wave, Zigbee and Thread, easy pairing and installation of panel and devices, multiple communications paths, including Ethernet, 3G, WiFi; and finally, interactive control via app or web browsers with real-time push notifications and remote arming/disarming,” Wee says. “Wireless certainly has many advantages for installers, as well as for end users. Quick and easy installation anywhere around the house without the need for cabling, wireless devices also eliminate the risk of cable tampering, offer easy troubleshooting to identify which part of the system is at fault. Wireless alarm systems also provide end-users the flexibility and versatility to move security sensors around their property at any time based on changing needs and consumer investment into the hardware is not lost because devices can easily be removed and reinstalled when moving properties.” From the point of view of wireless installation, Wee says there are a number of things integrators need to take into account. “The construction and size of the building – brick, double brick and pre-fab concrete will affect wireless range,” he explains. “Avoid mounting sensors on metal frames that will limit your wireless range and be sure to test wireless range in the desired device locations prior to installation. Further, if your wireless alarm panel is only communicating via internet, I’d recommend a UPS for the modem to maintain connection during blackouts – the location of the wireless alarm panel hub will play an important role for wireless range – what’s convenient for the hub, may not be best for sensor comms.” Wee is thoughtful when it comes to battery life. “Even with battery technology now going the distance in providing consistent power and also available in all sorts of small form factors, battery life will still be a small pain point on security sensors that are in frequent use,” he explains. “Take for example a Resolution product, the nanomax micro door/ window reed switch, which is rated for 6+ years.

se&n 23

SEM1017_22alarms.indd 23

29/9/17 3:53 pm


● Special report

Alarms

The battery life measurement is based on the reed opening and closing 16 times a day to obtain the 6+ year rating. But if we were to place this on a heavily used door that is opened and closed hundreds of times a day, battery life span will dramatically reduce. Regardless, the ease of installation of wireless alarm sensors means changing the battery will not be much of a hassle as systems now are smart enough to trigger low battery notifications allowing enough time for the installer, or in some cases the end user, to swiftly change the battery.” According to Wee, there’s a lot going on in the wireless alarms market. “Wireless alarm systems are now much more than just security,” he explains. “Consumers are driving the market and demanding a connected home/ building solution with interactive services. The expectations of consumers are ease of use, secure comms, flexibility, customisation and fast access to their system 24/7 from anywhere in the world. In my opinion, the market and solutions offered must be interactive and fit into consumers lives. “The market will continue to grow in this space as manufacturers of any product/devices will become iOT enabled. The key is having a platform that is future ready for integration with any of these devices and controlling it through their smartphone or devices. In my opinion, the demand driven from consumers will require these key elements: Interactive services via app, secure encrypted sensors, fast 24/7 access, home automation ecosystem using Z-Wave, Zig-Bee or Thread and live/recorded video that is accessible anywhere, anytime. “Further to this, many manufacturers within the home automation marketplace are now releasing smart hubs with mixtures of product solutions (including security sensors) that will seep into

CONSUMERS ARE DRIVING THE MARKET AND DEMANDING A CONNECTED HOME/BUILDING SOLUTION WITH INTERACTIVE SERVICES.

the security space,” Wee says. “Take Samsung SmartThings, for example. It’s a smart hub with Wi-Fi, Zigbee, Z-Wave and ethernet connectivity that can have a combination of up to 400 devices. Wireless PIR, reed, outdoor siren and camera complete the package for consumers to start building and automating connected devices. “But how secure is this smart hub? Security installers need a wireless alarm offering that is far more secure and flexible compared to such smart hubs. In my opinion, smart alarm products for installers should be fast and easy to install, have intuitive interfaces that are easy for the end user to use and represent a flexible and customisable solution that can adapt into users’ lives.” Wee argues traditional hardwired alarm panels managed on site and reporting only to a monitoring station need to evolve to ensure their future in the marketplace. “Traditional hardwired alarm panels need to evolve into a better product offering,” he says. “There is a whole suite of basic home automation smart hubs available in the marketplace which offer security (not very secure), automation and more, that’s already a big step in front of traditional hardwired offerings of just arming and disarming. “Resolution Products’ Interactive Gateway Module (IGM) is an innovative communication module with Z-Wave onboard enabling existing or new installations to be smart home/building ready with full interactive services that wires into compatible panels like Paradox MG5050, DSC PowerSeries, Honeywell Vista and NX, allowing installers to bridge the gap.” Risco’s Peter Mellino says the company is one of the pioneers of wireless intrusion detection and has expanded its product offerings to include access control, automation and most importantly, video verification. “Risco has developed an excellent range of 2-way wireless products,” Mellino says. “All our devices can communicate back to each other, are fully supervised, whatever is going on in a system, we know what’s happening instantly. The ecosystem is very complete and I think that’s something

24 se&n

SEM1017_22alarms.indd 24

29/9/17 3:53 pm


Complete Security Integration...

Download the free TSP App from

www.tyco-tsp.com

Watch

Touch

Detect

Expand Your Offerings to Cover Intrusion, Video and Access Control with One Single Solution A powerfully complete solution - simple to manage and easy to install. All in-one integrated intrusion, video surveillance and access control gives users greater control through one single and easy to use interface, while giving you a simple and quick to install solution to boost your revenue and amplify your business opportunities.

• • •

Kantech access control + Exacq video surveillance + DSC intrusion All managed and accessed from 1 platform - Choice of Kantech or Exacq users Download the app, scan the shopping bag image below and watch a video of how our products integrate together to give you a powerful, complete solution.

For more information or more products from Australia’s largest range of security systems call 1800 685 487 or visit hills.com.au/ branches for your nearest location nationwide.

For more information:

Pacific office 137 McCredie RoadGuildford, NSW 2161, Australia Tel: +612 8717 2000 © 2017 Tyco Security Products. All Rights Reserved.

SEM1017_25.indd 1

29/9/17 10:16 am


● Special report

Alarms “Now, due to the architecture of solutions like Risco, these issues are resolved. Being cloud-based, we can get panel alarm signals and link them to footage from a camera. In the background we’ll say, “Right, if that input goes off, trigger that IP camera and take this number of snapshots for verification.” We do that seamlessly in the cloud. “Physically, the alarm panel and the camera don’t connect. They connect in a cloud, which gives us total power to link them and then pass those integrated events to monitoring stations or authorised users. At Risco our product philosophy, our design philosophy, is to drive solutions using integration in the cloud.” According to Mellino, one of the beauties of Risco is the fact its detectors go all the way from residential to industrial, wireless and hardwired. There are dual technology sensors, PIRs, AIRS beams, reed switches and loads more, all with high levels of engineering and all supported by Risco’s family of controllers. “We’ve been building alarm systems for a long time and we’ve been making excellent detectors for a long time and we now combine this engineering excellence with our own proprietary, high security cloud service,” he says. “It’s a range that ticks all the boxes for installers and end users – domestic, commercial or industrial.” n

installers need to take into account. Our Agility wireless product is a full wireless system with a very, very, large array of wireless products that support and enhance its functionality - from satellite sirens, to PIR cameras, to smoke detectors, to wireless keypads and IP-rated keypads, and even external AIRs beams and dual technology sensors. “Programming everything is all seamless. Very, very, simple and easy. Where installers and end users need to be thinking is that next step in the intrusion space – video verification of alarm events. This is a functionality we’ve integrated into all of our panels. Wireless IP cameras - that’s probably the part I enjoy the most because it resolves an issue intrusion detection people, monitoring people and operational security managers have battled with for decades.

Keep the everyday moving. With extraordinary Sony 4K technology. Little details are important, especially when it comes to making quick decisions. Sony 4K’s cropping and tracking capabilities enable you to follow multiple objects or individuals – and improved analytics mean you can identify issues, share information and control transport flow more efficiently than ever before.

Discover more about how Sony 4K can help transform your business at boschsecurity.com/sonyvideosecurity

26 Medium se&n Size (W x H)

SEM1017_22alarms.indd 26

SAP No. 185 x 125 mm (+ 3 mm)

Language

EN

Color mode

4c / ISO coated v2 (ECI)

Notes

PDF-Standard: PDF/X-4:2010

29/9/17 3:53 pm


Increase your business intelligence (S99659)

PPRO-VA-BOX1

4-Channel Video Analytics Box

Licence free! NO annual subscriptions

Part of the PACOM Professional Series, the PPRO-VA-BOX1 is a 4 channel video analytics box that uses the video streams from select cameras to provide People Counting, Heat Mapping and Queue Management analytic functions, all of which can be exported as a report to help management better understand customers and their behaviours.

Queue Management

Heat Mapping

People Counting

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ CONNECT

SEM1017_27.indd 1

E N T E RTA I N

SECURE

29/9/17 10:16 am


● Special report

Thermal cameras

HEAT OF THE MOMENT Thermal surveillance cameras are an under-rated perimeter surveillance detection tool that puts mil-spec power into the hands of all security managers. With increases in resolution, reductions in price and widespread integration into most popular VMS solutions, thermal pushes your sterile zone way back.

E’VE long loved thermal surveillance technology at SEN. It’s as capable of monitoring deep perimeters, oddball battle-axe industrial blocks, electrical sub stations, high risk locations, the undersides and super structures of bridges, intrusion across water and just about anything else in between. No, you don’t get face recognition with thermal cameras but you do get cast-iron intrusion detection day and night, rain or shine – regardless of the presence of backlight, sidelight, no light. In fact, when the day comes that microbolometers are shoe-horned into PIR-style

W

video verification alarm sensors, I think the security industry will be able to say it has solved the false alarm problem for good. It’s true that dust or moisture in the air will attenuate the signal of thermal cameras but it attenuates that signal, at the longest possible ranges, it does not break the signal. And remember, serious thermal surveillance cameras can have useful ranges in good conditions of up to 5000 metres – for cryo-cooled military hardware the range is much further still – well over 10,000 metres from elevated monitoring positions.

28 se&n

SEM1017_28thermal.indd 28

29/9/17 3:54 pm


BY J O H N A D A M S

Thermal imaging is possible because every object – even an iceberg in a cold ocean – emits thermal energy that can be detected as above 0 degrees Kelvin or -273C, the background temperature of the universe. All objects can be digitally represented on a monitor using strong concentric colours each representing a particular emissivity. The ability to detect emissivity allows shapes to be mapped by software almost exactly as they would be represented optically – you will see streets, buildings, cars, people, all in context and moving in a natural way. According to Damien White of Dahua, the strengths of thermal surveillance cameras are greatest during the day, or in well-lit areas traditional cameras work well in. However, he says their effectiveness decreases at night or in more complex settings. “Thermal cameras detect the infrared radiation in the target area and convert that information into visible images which means they are not affected by bright sunshine, darkness or vehicle headlights,” White explains. “They can also effectively operate in environments where there is rain, snow and fog. One distinct advantage of thermal cameras over traditional surveillance cameras is that they can easily detect intruders who are camouflaged or approaching from a far distance.” In White’s opinion, there are a number of qualities integrators and end users should seek when considering thermal surveillance cameras. “Compared to traditional surveillance cameras, thermal cameras have a stronger ability to support analytic applications, such as perimeter protection,” says White. “The thermal image has a simple background, which is ideal for intelligent video analytics because it reduces monitoring difficulties and the probability of false alarms. “Depending on the purpose of the application, integrators should seek an appropriate combination of resolution and lens to deliver enough pixels-perfeet and wide enough coverage. Hybrid (thermal + optical) cameras are a good choice, as once an analytic event has been detected by the thermal camera, the traditional camera can then be used to give a more detailed image.” According to White, the ideal application for a thermal surveillance camera is long distance detection of intruders, detection of intruders in low light, and detection of intruders in scenes where intruders are easily camouflaged, such as white coloured clothing in an area covered in snow. “One less obvious application would be for loss prevention officers,” White explains. “Using a thermal camera, it would be possible to detect objects hidden under a shoplifter’s clothing. Dependant on the thickness of the clothing, hidden objects would be displayed as a cooler area and easily detected with the use of a thermal camera.” White’s top tips for thermal use are to ensure that the cameras are installed at the correct height

COMPARED TO TRADITIONAL SURVEILLANCE CAMERAS, THERMAL CAMERAS HAVE A STRONGER ABILITY TO SUPPORT ANALYTIC APPLICATIONS, SUCH AS PERIMETER PROTECTION.

and angle to ensure that the required field of view is obtained. “A major difference between thermal cameras and traditional CCTV cameras is that thermal cameras are unable to detect through glass or other similar transparent materials,” White explains. “It’s essential that installers take this limitation into consideration when they are planning the camera positions for their project.” Should thermal cameras always be installed with optical cameras supporting them to offer faces and plates, or does this depend on the application? “This definitely depends on the application,” says White. “For thermal cameras used for monitoring machine temperature or status in a factory, a traditional optical camera would have very little benefit as the machines would be easily identified using only the thermal camera. “If the thermal camera is being used for long distance intrustion detection or peremitor protection, an optical camera would be highly beneficial as it would allow for identification of the intruder. As thermal cameras have a long detection range the ideal form factor is an integrated thermal and optical PTZ camera.” Axis’ Wai King Wong argues that unlike conventional optical cameras, thermal cameras definitely have an advantage when it comes to the ability to ‘detect’ intrusion events. “This comes as a result of the difference in technology between the 2 types,” explains Wong. “Where conventional optical cameras capture an image using light reflecting off surfaces back into the lens, a thermal camera reads the thermal signature being emitted from a surface and this difference in technology means that thermal cameras are typically not subjected to the same challenges as optical cameras. These challenges include low light, strong backlight, smoke, fog, dust, and rain, to a certain degree. It is because of this, that thermal cameras in most cases are heavily utilized for detection, especially for perimeter protection applications.” When it comes to qualities integrators and end users should seek in thermal cameras, Wong argues it’s best to break this question into 2 parts, both of which will have equal value when it comes to determining a suitable solution. “First is the quality of the image, or how usable is the image being generated,” Wong explains. “This does not necessarily mean higher resolutions as most analytics (we’ll come to this in the next part)

se&n 29

SEM1017_28thermal.indd 29

29/9/17 3:54 pm


● Special report

Thermal cameras

usually scale the resolution down before being analysed. Rather, what is the important aspect would be the contrast of the thermal image being generated - how well it’s able to differentiate between temperature variations and represent that with clearly different colour tones in the image digitally generated. This becomes important for analytics we plan to use later, as it dramatically improves accuracy. “The second equally important factor is what is being done with that image by way of analytics and integration of said analytic with a VMS/SMS platform. Typically, prior research should first be done into what type of analytics is available out in the market, then identify those able to solve the customer needs. Next stage is to choose an appropriate VMS/ SMS platform, as this is going to be the platform/ interface an operator will use to access and receive detection from both the camera and analytics. All Axis thermal cameras can have an application installed into the camera called Perimeter Defender. Perimeter Defender is an application that enables a thermal camera to be highly effective in detection of object movement. Ultimately, thermal is simply a sensor which forms part of a larger solution chain before reaching the eyes of the operator.” Wong argues that because thermal cameras could be seen as a detector, it should always be coupled along with other components which allow for validation and response. “Commonly, this includes optical cameras but isn’t necessarily limited to just that - other viable support solutions could be the addition of alarms, lighting, radar and audio systems working in conjunction with the thermal component,” he explains. According to Wong, thermal and optical cameras share similarities when it comes to considerations that should be taken into account.

A MAJOR DIFFERENCE BETWEEN THERMAL CAMERAS AND TRADITIONAL CCTV CAMERAS IS THAT THERMAL CAMERAS ARE UNABLE TO DETECT THROUGH GLASS OR OTHER SIMILAR TRANSPARENT MATERIALS. “This starts right at the design stage where typical factors such as pixel density, field of view, coverage area, dead zones (blind spots), need to be factored in when selecting camera placement locations,” Wong says. “In addition to this, the requirement of any video analytics being used needs to also be accounted for, for examples most perimeter defence video analytics will also have guidelines for camera mounting height and pixel density in order to achieve an optimal level of accuracy. “It’s also important to be aware that thermal cameras are designed purely for detection and not identification, so while they may excel at knowing someone is walking up to a fence line, they will not be able to identify that person.” According to Wong, designing a thermal camera solution will involve the following: “These include ability to detect, ability to verify, ability to analyse and ability to respond,” he explains. “Looking at these considerations, we can say that a thermal camera can fulfil the role of a detector extremely well, that optical cameras are the most common form of verification used, perimeter defence analytics can also be installed on a back-end server or loaded directly onto the camera and that response in most cases is still based on a human operator making a decision, while analytics have the purpose of filtering out false data and presenting the operator with only relevant information.” FLIR’s Gareth Gross says thermal surveillance cameras empower security personnel to see intrusions in poor environmental conditions such as heavy rain, snow, fog, and smoke. “Invisible heat radiation emitted by all objects in the scene are presented for security analytics and monitoring regardless of lighting conditions,” says Gross. “Today, thermal surveillance cameras have become a staple of protection for many (if not all) major businesses across the country, and in such a landscape, the need to produce quality images is critical to providing constant protection against potential intruders. “For FLIR, producing the highest image contrast quality in harsh environmental conditions is the key to thermal surveillance camera selection. Endusers and security integrators should evaluate thermal cameras based on the following key criteria: l Longest warranty for thermal imager (key & expensive component of thermal camera) l Thermal sensitivity and resolution suitable for

30 se&n

SEM1017_28thermal.indd 30

29/9/17 3:54 pm


X-SeriesAd.pdf 1 19/09/2017 9:03:05 AM

C

M

Y

CM

MY

CY

CMY

K

WiseStream II Colour images in low light WDR 150dB DIS with gyro sensor Sound classification Business intelligence analytics

(02) 9749 5888

SEM1017_31.indd 1

eos.com.au

Formerly Samsung Techwin

29/9/17 10:19 am


● Special report

Thermal cameras

intended application l Thermal image quality/contrast l Lens coverage (distance of coverage), and wide range of lens options l Ability to perform built-in video analytics to alert on intrusions l Support for open standard such as ONVIF compliance l Ability to offer SDK/API for integrations l IP rating and PoE support l Importantly, select your thermal camera manufacturer supplier based on experience and track record. According to Gross, thermal security camera applications are vast, protecting anything starting from your immediate premises, business facilities and infrastructures, to government facilities, labs, museums, national monuments and key infrastructure, and places of worship, etc. Relevant applications or operational outcomes might include: l High value floors, fire staircase and exits, perimeter and border surveillance, etc l Thermal cameras (fixed and PT) with built-in analytics cameras can detect, identify and track objects (human, vehicle on roads) that violate fixed rules l Radar track 3D objects (drones) - integrated thermal PT cameras track and display on security monitors, irrespective of lighting conditions l Thermal thermographic cameras increasingly being considered for temp measurements and raise alerts in industry applications. More modest application could include: l Retail outlets, supermarkets employing thermal surveillance cameras to identify shop lifters l Thermal cameras connected to smart phones allow you to see the world in a new way whether you’re into outdoor adventures and DIY home repairs, or are a hardworking professional looking for the convenience of a thermal camera that goes everywhere you do. “Installation needs to be planned for the intended protection application requirements,” Gross explains. “For example, the fundamental concept of designing a perimeter protection application involves creating

TODAY, THERMAL SURVEILLANCE CAMERAS HAVE BECOME A STAPLE OF PROTECTION FOR MANY (IF NOT ALL) MAJOR BUSINESSES ACROSS THE COUNTRY...

a virtual line that separates external from internal areas. “To determine design parameters—such as camera placement and height, lenses, and distances—several calculations are required to ensure that the following terms are met: 1: There must be sufficient coverage across the virtual line to eliminate all “dead-zones” where a potential target is not fully covered by a surveillance camera’s field of view 2: Target size validation must meet the performance criteria required by a given camera’s video analytics, from the nearest to the most distant points covered by each of the cameras along the fence line. “Whether thermal cameras should have other solutions installed supporting them depends on surveillance requirements,” says Gross. “For example, if the preference is to monitor colour during the day and to switch to thermal imagery during the night, then dual sensor cameras would be vital – FLIR’s thermal PT-HD series of cameras are excellent options are these types of applications.” According to Ryan Fairclough, sales director MOBOTIX Asia-Pacific, thermal is the new frontier of the IP video industry and will allow integrators to drive innovation and expand their standard security offering into new areas. “Unlike traditional optical solutions, it is unaffected by poor lighting conditions and exposure issues, providing integrators with huge potential to offer a whole range of innovative solutions and applications,” says Fairclough. “Firstly, perimeter security is one of the most valuable applications of a thermal camera, with a 24/7 guarantee of activity monitoring, without the expensive running costs of infrared illumination or white light, while providing high quality and viable alerts, even in poor lighting conditions. No matter how much the traditional camera systems claim to work at low lux levels, they simply cannot be compared to a solution using thermal technology in terms of effectiveness, efficiency and reliability. “Secondly, using thermal technology takes the solution beyond security and into the realms of process control and monitoring of non-security issues,” Fairclough explains. “Integrators with the right expertise will be able to deploy systems to monitor and protect against rapid rise of heat in machinery, gas leakage and process management. This opens up new revenue streams that were previously the exclusive of specialist companies. “We now have affordable thermal technology that can be deployed far beyond the standard ‘see person, record person’ security-type applications. In the price-driven market that the IP video market has become, margins and revenues are declining rapidly, except for those integrators who think outside the norm and create solutions to customers to meet their demand. Thermal technology is at the forefront of being able to exploit these new areas. “In my opinion integrators and end-users should seek the qualities that best suit their applications.

32 se&n

SEM1017_28thermal.indd 32

29/9/17 3:54 pm


H.265+ OFFERS STUNNING BANDWIDTH AND UNBELIEVABLE STORAGE EFFICIENCY

SEM1017_33.indd 1

29/9/17 10:19 am


● Special report

Thermal cameras

To narrow down solutions to one size fits all, works against the core competency of a smart integrator. Fitting the job to the specification sheet is the realm of lower end price sensitive products, while the thermal market lends itself to the more advanced integrator, who builds a competent solution based on the specifications of the job, not on the product. “Image resolutions of thermal units are always something I wonder about. The thermal camera does not require deep resolution, so this aspect becomes less significant. It is a simple image and any requirement for deep resolutions in a camera is more of a vendor selling tool with no real application other than as a useful deployment consideration. “Obviously, a unit that can support a secondary reference image would be a smart consideration – thermal units give very good alerting capabilities, but the image is next to useless for identification purposes. A unit that easily integrates a secondary reference lens module should be considered a high priority to give the customer the best of both worlds in a single cohesive unit.” According to Fairclough, one feature that should always be considered, is the millikelvin (mK) rating of the unit. “Not all thermal devices are created equal and an mK rating of 50 is far more useful than an mK rating of 100 or more,” he says. “The mK rating is an industry standard rating of the minimum amount of temperature change required to show difference in the thermal image; the lower the better - always keep this in mind when comparing cheaper units with the higher quality units. “Thermal currently has its core use in perimeter detection but as integrators evolve, we are seeing more and more process control and site management applications. We have projects utilising thermal cameras as early detection warning systems for dangerous fire situations and the monitoring of leakage from pipelines, etc. The market is showing a distinct requirement from their integrators to solve new problems outside of their standard security landscape and we are currently seeing rapid growth of thermal units being used in exciting applications, that as recent as 2 years ago the traditional security integrator would have ignored. “Installers need to integrate and sell a solution as a whole. Don’t sell the specification sheet at a price – solve the customers’ problems. Approach each job as a blank canvas and select your integrations and products to suit the requirements. Solving problems results in a happier end-user, less price pressure from your competition (who will most commonly be

FOR FLIR, PRODUCING THE HIGHEST IMAGE CONTRAST QUALITY IN HARSH ENVIRONMENTAL CONDITIONS IS THE KEY TO THERMAL SURVEILLANCE CAMERA SELECTION.

proposing a ‘me too’ as a standard solution) but most importantly, maintain the integrity of your margins in the project.” Meanwhile, Hikvision’s Dean Edwards says strengths of thermal surveillance cameras include onboard analytics, with all the processing heavy lifting taking place out on the edge – he points out that integrators and end users need to seek a wide product offering adapted to multiple applications with numerous lens options and form factors, and the ability to support integrations with multiple video management systems. In Edwards’ opinion, the ideal application for a thermal surveillance camera includes things like heat detection, refuse/recycling stations green waste and processing, mining, sugar mills – with options like line cross trip wires, defence and corrections, and perimeter and compound surveillance being particular strengths. “My top tips include using the technology for low light and no light, dusty and smoky applications, for the long-range detection of objects, heat detection, edge analytics, reduction of false alarms and remote video verification. I’d recommend working with a local Hikvision BDM and pre-sales team so as to provide a registered manufacturer supported solution,” Edwards says. n

34 se&n

SEM1017_28thermal.indd 34

29/9/17 3:54 pm


Interlogix is changing the way we view security. Visit www.interlogix.com.au/securityredefined

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security, a leading provider of intelligent building technologies that make the world a better place to live. Š 2017 United Technologies Corporation, Inc. All rights reserved.

SEM1017_35.indd 1 InterlogixAd_Oct17-DRAFT.indd 1

29/9/17 10:19 14/09/2017 8:55 am am


● Case study

Gold Coast

GOLD COAST HOTSPOTS

Uniview has provided video surveillance solutions for 2 hotspot venues on the iconic glitter strip of the Gold Coast, Queensland. The locations include Latitude Restaurant & Bar, situated in the heart of Cavill Avenue, and Surfers Paradise Beach Café, overlooking Surfers Paradise Beach. ATITUDE attracts a more sophisticated clientele, offering modern Australian cuisine, while the Surfers Paradise Beach Café is more casual and laid back. The restaurants previously used dated analogue video surveillance systems and urgently needed to upgrade to benefit from the latest generation high definition and easy to use IP video surveillance systems. Uniview was chosen because of its high quality, with many features specifically designed for retail solutions. At Latitude, a total of 28 IP cameras are installed throughout the restaurant. These cover entranceways, the bar, seating areas and the kitchen. Meanwhile, in the Surfers Paradise Beach Café, cameras are installed to provide coverage of the café, the bar and back of house areas. Management is also able to log in on his mobile device and monitor both venues from anywhere in the world. And if one of the venues is dealing with a heavier workload than the other, the owner can shift staff between the two. Inside both applications, the IPC3234ER-DVZ PoE vari-focal domes blend seamlessly with the coastalthemed ceilings to provide discrete coverage. The 4MP day/night cameras feature 30 metres of IR, 120dB of WDR, 3D DNR (digital noise reduction), builtin motorized lens for remote zoom, remote focus, compression options including H.265, H.264, and MJPEG, region of interest, corridor mode, embedded

L

smart algorithm, an operating temperature range from -40 to 60C, IK10 vandal resistance and IP66 weather resistance. Uniview’s EZView mobile app is a perfect tool for the owner, who manages the 2 busy businesses, simultaneously. From the point of view of management, the surveillance system’s simplicity of operation means there’s no significant time required for training, as Uniview’s user interface and the companion EZView mobile app are user friendly and intuitive. Functionality is enhanced by on-board analytics, which have the ability to save time with features such as Smart Search and Face Detection, which make searches more efficient, as well as allowing the potential for face detection. A new feature is the Ultra 265 function saving up to 95 per cent network bandwidth and storage space, so recordings are stored and saved for longer if required for review. The app offers 1/4/9/16 split screens, display by pages, main/sub/third stream switch, tap-drag live videos, landscape orientation, PTZ control, gesture PTZ control, focus, zoom and presets configuration, recording and playback, search, search by time, zoom in on playback timeline by 5/30/60 minutes, drag timeline to search, digital zoom, snapshot, playback at 1/4x, 1/2x, 1x, 2x and 4x speed, real-time push alarms and plenty more. n

36 se&n

SEM1017_36goldcoast.indd 36

29/9/17 3:55 pm


SEM1017_37.indd 1

29/9/17 10:19 am


â—? Case study

SES

SES INSTALLS SALTO SALTO Systems has supplied its latest wire-free electronic access control technology to Australia’s State Emergency Service at Wodonga, Victoria.

ICTORIA State Emergency Service (VICSES) works to ensure the safety of Victorian communities by responding to emergencies and disasters across the state. A volunteer-based organisation (each State and territory of Australia has its own independent State Emergency Service) VICSES provides emergency assistance to the community 24 hours a day, 7 days a week. The lead agency during emergency responses in Victoria, SES is also the largest provider of road crash rescue in the state. The service assists the Victoria Police in search and rescue operations, and plays an important support role during major bushfire responses.

V

38 se&n

SEM1017_38ses.indd 38

29/9/17 3:55 pm


BY J O H N A D M A S

“When VICSES decided to upgrade from its mechanical keyed system, they began to search online for suitable electronic access control (EAC) systems,” says Nick Burton, managing director of Steve Burton Security Supplies. “After looking at a few different types available, they liked the look of SALTO as it appeared to tick all the boxes for them and is a scalable product, so they made contact with us as the local authorised SALTO dealer. “After a visit to their headquarters and a thorough site survey, we had no hesitation in confirming SALTO’s XS4 and GEO solutions as being perfect products for the job. We designed a highly secure and flexible access control system for use at the facility consisting of both online and

AFTER A VISIT TO THEIR HEADQUARTERS AND A THOROUGH SITE SURVEY, WE HAD NO HESITATION IN CONFIRMING SALTO’S XS4 AND GEO SOLUTIONS AS BEING PERFECT PRODUCTS FOR THE JOB.

offline XS4 escutcheons, GEO cylinders and CU SVN (CU50ENSVN) controllers. These were then installed into 20 locations made up of main entries, gates, storage cages, cupboards, filing cabinets, general and admin use doors.” SALTO’S access control solutions are built around a range of battery-powered, wireless locking devices that retrofit into existing mortise locks or knobsets in minutes and function using reader technologies including smart card, contactless smart card and dual technology cards. SALTO locks are designed to be installed in off-line applications on doors (or padlocks) and a full audit trail of events, as well as changes to access authorisations, are passed around the system network on-card as part of what Salto calls SVN (Salto Virtual Network). The SVN is formed by the credentials themselves moving around the building in the hands of cardholders. Whenever cards and locks and cards and hotspots meet, as part of their wireless exchange, they exchange a complete update of authorisations and events going on across the network. Through the hotspots, this information funnels back to SALTO’s Space management software running on a workstation, which allows administrators to manage things like access time zones, view audit trails, as well as driving antipassback and relay management. The software can manage large numbers of door installations, and as most access related information is written on the credential, the management of the doors becomes, a management of the credential. By simply

se&n 39

SEM1017_38ses.indd 39

29/9/17 3:55 pm


● Case study

SES

WITH THE ABILITY TO CUSTOMIZE BOTH DOOR HARDWARE AND SYSTEM SOFTWARE TO EXACTLY MATCH VICSES NEEDS, OUR SOLUTIONS OFFER CONSIDERABLE SECURITY AND FLEXIBILITY. updating the badge, you can change most accessrelated authorisations of the users, including adding/deleting doors, time zones, calendars, etc. The fact SALTO is wireless means its less expensive to install and that there are not layers of terminations and cable runs around the site yet you get all the features of a hardwired access control system, including unlimited audit trail, dynamic access profile changes, calendar and shift control, intruder alarm, automated unlock/relock periods, automatic lost card cancellation, departmental operator management, ethernet connectivity of all online devices and the ability to interface with other popular access control and BMS systems. “With the ability to customize both door hardware and system software to exactly match VICSES needs, our solutions offer considerable security and flexibility” said Robert Pai, business development manager, SALTO Systems. “All the stand alone electronic locks are battery operated, with the lack of hard cables being a particularly important consideration for the client when they chose to go with SALTO. Plus, as they had already

discovered, it is also fully scalable, enabling the system to easily grow to meet any future security needs as and when required.” Importantly, communications between carrier and electronic lock are encrypted and secure and SALTO locks can always be opened from the inside using a single action panic feature that works in conjunction with the relevant mortise lock. SALTO XS4 of the type used at SES Victoria, have high security protection via high resistance, hardened anti-drill plates to protect wiring and reader area. Additional protection provided by hardened axes and floating steel balls in the handle area. Other neat features include low battery power indication monitored through the SALTO Virtual Network (SVN), emergency opening via portable programming device (PPD), and a non-volatile memory. According to Rohan O’Brien, SES unit controller at Wodonga, replacing mechanical keys with electronic access now gives so much more control over building security. “It enables us to provide a secure environment for staff and volunteers alike,” O’Brien says. “It’s good that the new SALTO handle sets and cylinders don’t have any keyholes which can be vandalized. “Also, now we’ve it got it installed, it’s only a click of a mouse to blacklist a user’s credential, as compared to the cost and hassle of rekeying mechanical locks when a key was lost, or stolen. And it’s now very easy for us to lock/unlock doors and update user profiles remotely through the SALTO Space software.” n

FEATURES OF SALTO ACCESS CONTROL INCLUDE: l

Managed by SALTO Space software

l

Virtual Network capable through SALTO Virtual Network Technology

l

User on-card audit trailing capability

l

Communications between reader, door controller and PC encrypted

l

No additional control panels are required

l

Alarm input

l

Set up made with Portable Programming Devices (PPD) or via PC

l

Update made with Portable Programming Device (PPD) or SVN

l

Anti Pass Back mode available depending on the model

l

Firmware upgradable by PPD or direct from PC to on-line units.

40 se&n

SEM1017_38ses.indd 40

29/9/17 3:55 pm


The New Camera Line Mx6 Creates More Possibilities. More Images, in All Light Conditions, in Every Standard.

More Intelligence Is on the Way. The new Mx6 6MP camera system from MOBOTIX offers increased performance. A frame rate that is up to twice as fast than that of other cameras allows it to capture quick movements even better and simultaneously deliver sharp images in MxPEG, MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6 camera line is faster, more flexible and higher-performing, opening up new application and integration opportunities for to you to meet all requirements.

MOBOTIX AG • Pyrmont NSW, Australia • www.mobotix.com

SEM1017_41.indd 1 mx_Ad_Mx6_au_170505-A4.indd 1

29/9/17 10:19 am 05.05.17 10:02


● Case study

Twickenham Stadium

CATHEDRAL OF RUGBY

ENGLAND’S Rugby Football Union invested in a unified security solution to enhance operator efficiency at Twickenham Stadium in London. The results have considerably enhanced management of the integrated video surveillance and access control solution. WICKENHAM Stadium, the headquarters of the Rugby Football Union (RFU), was selected as the host nation of the Rugby World Cup 2015. To secure the event, the Twickenham Stadium organizers turned to the unified IP security platform, Genetec Security Center. During that world cup event and ever since, through a number of upgrades, the system has continued to provide high levels of efficiency in what have proved to be very challenging times for big event security managers. Located 16km southwest of the centre of London, Twickenham Stadium is the home ground of the England rugby team and the headquarters of the Rugby Football Union (RFU). Twickenham’s 82,500 seating capacity makes it the second largest stadium in the United Kingdom, and fourth largest in Europe. It is the world’s largest stadium entirely dedicated

T

to rugby. The venue hosts all of England’s home test rugby matches and many other high-profile rugby events, as well as concerts for renowned international artists. The ground, formerly known as the ‘Cabbage Patch’, has come a long way since the former market garden hosted its first rugby match one wet winter afternoon in 1909. After the award as host nation of the Rugby World Cup in 2015, Twickenham management decided that it was time to modernize its video and access control security systems. It wanted a security solution that offered advanced functionality and an open architecture which would allow for uninhibited growth. The team also needed security software that would be easyto-use and provide reliable, and higher resolution video to help the security team identify any suspects and see clearer details within the stadium environment. Twickenham planned a phased implementation of Security Center. There are 110 key cameras now managed from the Omnicast IP video surveillance system. Twickenham kept most of its analogue cameras by using IP encoders, and integrator Vindex Systems also added some new IP cameras. It also added doors onto the Synergis access control system of Security Center and unified a Digital Barriers analytics system within Security Center to monitor virtual tripwires along the fenced perimeter. “With Security Center, our operators are better equipped to handle potential security breaches,” says Phil Parker, head of security at the RFU. “If someone tries to climb the fence, or open a door, our operators know about it immediately. They also don’t have to monitor a variety of different applications like before. The system alarms and the associated video comes through one platform which makes the whole response process more efficient.” The quality of the video management is far superior than before. Operators can pull up video, magnify part of the frame, and dig deeper into a scene, which gives them a much better perspective. Additionally, the Threat Level Management feature has been programmed for match-day activity, presenting operators with the specific tools required to monitor the stadium and respond to events. Operators navigate the stadium using the map interface, Plan Manager, to quickly locate cameras, respond to alarms and check door statuses. They are empowered to make better decisions. The security team says it is confident that if an interesting new technology comes onto the market, Genetec would ensure access its capabilities - this was a main selling point for the RFU. “I can’t recommend (integrator) Vindex Systems and Genetec highly enough. They have an openminded, friendly and helpful approach, which has been refreshing,” says Parker. n

42 se&n

SEM1017_42twick.indd 42

29/9/17 3:56 pm


CREATING THE FUTURE OF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.

• No “Per Seat” Licensing In System Pricing

DSX Access Systems, Inc.

• LAN/WAN Compatible

• Alarm Text Message/ E-Mail Notification

• Smart Card and Biometric Integration

• Hot Swap Redundant Communication Server

• Unlimited Access Levels Per Cardholder

• High Level Elevator Control Interface

• Integrated Photo ID Badging • Backup SQL Server

• Backwards Compatible Architecture

www.dsxinc.com

• Integrated Wireless Locksets

DSX CORPORATE HEADQUARTERS | 10731 Rockwall Road | Dallas, TX USA 75238 | 214.553.6140 | sales@dsxinc.com SEADAN SECURITY & ELECTRONICS | Unit 7, 170 Forster Road | Mt Waverley, VIC, 3149 | (03) 9263-0111 | seadanvic@seadan.com.au | www.seadan.com.au

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

SEM1017_43.indd 1

29/9/17 10:19 am


â—? Case study

Youngcare

LOOK, MUM – NO HANDS!

Hands-free access control is critical in many applications and none more so when it facilitates the movements of young people afflicted by disabilities that rob them of freedom of movement. At MS Queensland Youngcare Complex, ISCS and NASA Electronic Security Systems have partnered to make a difference.

OR young people with multiple sclerosis, staying mobile is a key part of maintaining health and feelings of well-being. ISCS and NASA Electronic Security Systems have been instrumental in providing young, high-care MS patients with much-needed technology to help them move about more freely. The system, comprising Nedap uPASS readers and UHF cards in conjunction with the ICT Protege WX access control system, was installed at the recently completed $A5.5 million MS Queensland Youngcare complex at Albany Creek, in Queensland. Norm Larden, managing director of NASA Electronic Security Systems, said 29 of the longrange readers were installed in 8 care units across the state-of-the-art facility.

F

44 se&n

SEM1017_44youngcare.indd 44

29/9/17 3:56 pm


BY J O H N A D M A S

“Because of the difficulties in presenting a standard access control card, everything needs to be automated so when the patients at the centre wheel their chairs up to a door it simply opens for them automatically,” Larden said. “MS Queensland was extremely happy with the product and we were most impressed by the ability to alter the read range to suit particular aspects of the application. The readers can be easily configured at the time of installation to suit the needs of the project. Whether it’s a couple of paces or 2 metres, it was very simple for our techs to provide the ideal solution.” According to Larden, while this was a relatively straightforward installation, commissioning the readers themselves was more complex. “Nedap readers allow installers to set variable read distances during commissioning but there

are situations in which the read range is impacted – for instance, the closer the card is to the body, the less the read distance,” Larden explains. “Read distance is also impacted if the card is covered by a hand – discovering these variables assisted us during the commissioning process. Something else to take into account is the 200mW draw of each reader on idle – current draw is impacted by range settings, so that’s another consideration for installers. “Along with setting up the readers, the installation involved commissioning the controllers – each of the units needed commissioning. We needed to get doors to fire in concert with the alarm system and there was IP intercom to integrate as well. Other things we had to take into consideration included the fact electrical services did not keep up with us

THAT’S THE KEY TO THIS INSTALLATION - WHAT IT HAS DONE FOR THE KIDS IN TERMS OF GIVING THEM THE ABILITY TO GO THROUGH DOORS ON THEIR OWN.

se&n 45

SEM1017_44youngcare.indd 45

29/9/17 3:56 pm


● Case study

Youngcare

and there was a variation to the reader numbers to be dealt with.” As Larden explains, the access control installation is running Weigand but ICT Protege GX supports either option - for a relatively small site like this one, he says Weigand was ideal. “The system has a controller for each 4 readers and there are 29 readers and 50 cardholders in the system,” Larden explains. “Cardholders are mostly staff and there are also cards for patients in 8 fulltime care units and for visitors staying in 3 family units – it’s a small complex.” Larden say the system has been so successful, MS Queensland is likely to install a similar solution for a 3-story unit at Mater Hospital.

Norm Larden, NASA

THE SYSTEM HAS BEEN SO SUCCESSFUL, MS QUEENSLAND IS LIKELY TO INSTALL A SIMILAR SOLUTION FOR A 3-STORY UNIT AT MATER HOSPITAL.

“I believe MS Queensland will be going with Nedap again – they’ve been very impressed with how easy it is for patients to use – that’s the key to this installation - what it has done for the kids in terms of giving them the ability to go through doors on their own. That freedom of movement is a significant increase to quality of life for these youngsters.” Meanwhile, ISCS Queensland manager, Mike Knowland, said the project was a great showcase for the flexibility of the Nedap uPASS readers, as well as the ICT Protégé WX system, which can cater for up to 128 doors, 50,000 events, 10,000 users, and 512 inputs and outputs. “The Nedap readers are an industry leader for long range identification solutions, in our opinion,” Knowland said. “They are on-site configurable, offer consistent reading up to 5m in a weatherproof housing that also provides LED and audible read indication. Additionally, the cards are available in several form factors and being a passive UHF technology, there is no battery so there are no concerns regarding the lifespan of the credentials. “Protégé WX is a fantastic system that is a flexible, all-in-one, web-based system able to integrates access control, intrusion detection and building automation into a simple unified solution. The modular hardware design provides the flexibility to accommodate any installation whether it’s small, large, residential or commercial. Expandable modules allow users to scale their systems as requirements change.” n

46 se&n

SEM1017_44youngcare.indd 46

29/9/17 3:56 pm


FSS1

SCEC SL4 Approved Door Monitoring Sensor

WHEN HIGH SECURITY IS NOT ENOUGH... FSS1 Superior alternative to traditional magnetic balanced reed sensors FSS1 Surface & flush mount version SCEC approved to SL4 FSS1 Product listed in the Security Equipment Evaluated Product List (SEEPL) FSS1 Worldwide patented technology FSS1 Designed & manufactured in Australia VISIT FSH AT SAGE EXPO November 9, 2017, Canberra

FSH is an Allegion Company

SEM1017_47.indd 1

29/9/17 10:19 am


● Regulars

The Interview

Ximen Yan, Uniview Chinese surveillance manufacturer Zhejiang Uniview Technologies is a networking specialist with a quite different take on what constitutes progress in video surveillance technology. For Uniview, progress is less about hardware and more about information. John Adams speaks with vice president of Uniview and founder of international business, Ximen Yan, to discover more.

FOUNDED in 2011, Uniview Technologies is now the third largest video surveillance manufacturer in China and the 7th largest globally. Unlike the other big Chinese manufacturers, Uniview is first and foremost a networking company and that networking core makes Uniview’s take on the CCTV market rather different from those of its competitors. JA: It’s amazing to think Uniview has such a complete product spread given it was only formed 6 years ago – what do you put this down to?

48 se&n

SEM1017_48interview.indd 48

29/9/17 5:22 pm


X I M E N YA N W I T H J O H N A D A M S

XY: Partly to our focus and partly to special nature of the Chinese market, which is large and technologically advanced. We have certainly grown fast – our revenues have grown seven times and our staff numbers have increased 4 times since we were founded in 2011 - our goal by the end of the year is to increase R&D team numbers to 1600, which will make us number 3 in R&D globally. The cost of R&D is lower in China and R&D is important for our future success in the CCTV market – every year there are major advances in technology and we must keep up. The speed of change in the market is so rapid that after 3 years the latest technology has been superseded. Certainly, within 3 years, we plan to be number 3 globally in terms of CCTV manufacturers. It will be a challenge but we think we can do it. JA: Uniview is very strong in the Chinese market in projects, isn’t it? Does this relate to the fact Uniview is at heart a networking company? XY: Yes, we are differentiated by our focus on IP infrastructure and IP technology. We are certainly involved in some very large public security projects and smart city projects and some very large buildings in the China market. Very large projects are ideal for IP technology, which suits a networking specialist like Uniview. We are one of the largest networking suppliers in the China market with an R&D team of more than 500 engineers – we think of ourselves as an older player but a new company. JA: What would Uniview’s largest application in China be? XY: Probably an IP-based public security solution in Xinjiang Province but there are many applications that are huge by global standards where we have supplied a complete solution for a customer. JA: From the perspective of a networking company bandwidth is a major issue – does this impact on the way Uniview thinks about camera resolution - what is the resolution of cameras you sell most of? XY: I think resolution does not need to be extremely high in every case – I think the bulk of cameras sold are 1080p (23MP) – there are factors like storage and

IT’S INTERESTING THAT THIS VARIES BY COUNTRY AND WITHIN COUNTRIES, IT VARIES BY REGION. FOR INSTANCE, AUSTRALIA LIKES TURRETS AND DOMES MORE THAN BULLETS, WHILE KOREA PREFERS LARGE PTZS. IN CHINA, MANY USERS FAVOUR BOX CAMERAS AND PT BULLETS.

processing to take into account with high resolution cameras. Higher resolutions may be ideal for specific applications but not for every camera in an application. JA: What about camera form factor – what’s your biggest seller? XY: Bullets and fixed domes are most popular – we also see growth in compact PTZs, PT domes, PT bullets – there’s also growth in PTZs. It’s interesting that this varies by country and within countries, it varies by region. For instance, Australia likes turrets and domes more than bullets, while Korea prefers large PTZs. In China, many users favour box cameras and PT bullets. Being large, China is interesting in regional choices – in one part of the country, users favour compact PTZs, in another part users favour mid-sized PTZs – there’s a cultural preference for different form factors, though it may depend on a prevalence of certain application types, too. JA: Uniview is strong in cameras – what about software – VMS, IVA – how much effort is the company putting into software? XY: Our engineering numbers are split roughly down the middle – half work on hardware and half work on software – about 500 engineers on each. On the software side, there are 3 sub-groups of interest for our development team – the first is VMS, the second is big data and the third is around information – how to convert video signals into data streams that can be interpreted more easily. In China, many cities have thousands of cameras and must convert all those image streams into something that is useful for security and law enforcement teams, so this area is very important. We are investing in multiple areas of this aspect of the market and we think it will be a key area of importance over the next 5 years. Users want to access the information gathered by cameras across a whole

application, in a simplified form, perhaps delivered via the cloud. No security or management team can view every image stream in real time - we must develop a new way to manage it. This is a very important function for us to research. I think the China market provides a very large test for this new technology and we are taking it very seriously. When it comes to specific aspects of IVA we are looking at ways to detect cars and faces, but also other areas of a scene. We want maximum information from a single image – in the past it has been possible to gather 2 or 3 pieces of information from an image. In the future, we may be able to gather 100 pieces of information. An aspect of this is learning to use CPU and GPU together to make a very powerful low-cost processing solution for the customer – another aspect is creating software that has a simple and powerful interface for the end user. We have 100 people working on research in this area and in the future, we will have even more people focused here. I believe the China market is a special one, making it a good test case for Chinese manufacturers. This is a part of the reason Chinese manufacturers are so well placed when it comes to the global market. Before complex applications are released to the global market they can be comprehensively tested in huge integrated solutions in China so global customers can be certain that they work as they are meant to do. JA: In terms of market verticals, which would you say is growing the most at the moment – public surveillance, transport, industry, something else? XY: This is not easy for us to say from a global perspective because only in China do we sell large numbers of integrated solutions of the type you are speaking about. In the case of that market, the fastest growing segment from our perspective is public security

se&n 49

SEM1017_48interview.indd 49

29/9/17 5:22 pm


● Regulars

The Interview

systems – there are many secure, smart city applications in China. The second most important market segment from the point of view of growth is traffic management – LPR solutions – this is another big area of growth for us. Certainly, in China we sell primarily complete systems for our customers – front end including cameras, network infrastructure, storage servers and management software – a total solution. We have now begun to transfer a broader range of our high-end solutions into the global market, including storage, high-end NVRs with integrated VMS software and more. We will certainly be discussing the possibility of supplying complete solutions with our customers in key markets such as the Australian market. JA: Where would Uniview like to be positioned in the Australian market? XY: The Australian market is an important OS market – certainly in the top 15 for us globally – so we would like to continue to increase our sales here. Australia does not have a large population but nevertheless it is highly developed and there are many large high security applications. Additionally, the penetration and acceptance of IP is very high and the education level around networked solutions is good. This makes it an ideal market for the sort of solutions we specialise in. JA: As a networking specialist, where does Uniview see the future of networking going in a broader sense – wireless? A cloud-based model? XY: That is a very interesting question – wireless is an interesting area for us – we see it as useful for long distance communications with reduced infrastructure spending. As for whether cloud storage is going to grow – cloud storage is already very popular in China market – much more popular than here in Australia. I think the underlying technology will continue to develop in the ways it is currently developing.

Australian market, where applications are not so large. Certainly, our networking capability makes us the perfect provider of video surveillance storage solutions – it’s our speciality. JA: The other large Chinese manufacturers also have products in access control, automation, intercoms, intrusion – do you have any plans to get involved in other parts of the electronic security market? XY: No, we want to be deep in the video surveillance market and to develop better ways to manage the information for the future – we don’t want to get involved in other sub systems. Many industries can benefit from information gleaned from video surveillance given the fact a camera gathers so much information and we will focus all our efforts on developing this part of the market as far as we can. JA: What would you say the IP/ analogue divide is in the China market? XY: In China, we think it is around 80 per cent IP, while Australia as a comparison might be 50 per cent IP.

JA: What about storage solutions – that’s another strength of the Uniview range, isn’t it?

JA: What are the current challenges for an IP specialist like Uniview?

XY: Yes, it is – we have been discussing ways to make Uniview’s storage solutions more useful in Australia – for each project we undertake in China market we typically provide storage of 20-50 terabytes, which is very large. The issue is finding ways to make our technology suitable for the

XY: Education is the number one challenge and at many levels. It’s not easy to find sufficiently qualified engineers, for instance. Also, many installers and integrators do not understand the basics of networking and IP technology changes rapidly. We think education is

the biggest challenge to growth in the IP surveillance market, not price. We can provide serious IP surveillance systems at a cost very similar to analogue. Another issue is that in established markets – the UK and the USA for example – there are many older buildings with analogue infrastructure and building owners may not want the expense of re-wiring for IP so that’s another challenge we must get on top of. JA: As a networking company, Uniview obviously has its finger on the pulse when it comes to cyber security issues – is cyber security now a core part of the everything modern CCTV manufacturers undertake? How vital is this to Uniview’s solutions? XY: As a video surveillance manufacturer, cyber security is our basic responsibility. Thus, cyber security is undoubtedly the core technical issue for modern CCTV manufacturers. Uniview’s origin as a networking company has many inherent advantages on this point. At the software architecture and code level, we have a unique perspective and capability. JA: What message would you like to give Australian integrators and end users about Uniview’s commitment to the Australian market? XY: Uniview will continue to insist on high quality and innovation, trying to provide the best price and a good user experience for end users. When it comes to our integrator customers, we will always put our partners’ benefit in first place. n

50 se&n

SEM1017_48interview.indd 50

29/9/17 5:23 pm


THE MOST COST EFFECTIVE

RUGGED & RELENTLESS SURVEILLANCE

It’s an intruder’s worst nightmare. While the intruder thinks everything is going to plan. Predator is relentlessly tracking and recording every false move. Predator Radar is designed for applications where wide area detection and tracking of moving objects is required. This ruggedised radar controlled pan, tilt and zoom, is a cost effective perimeter/wide area

Predator Radar surveillance system that surveils up to 200m radius/400m diameter with constant high speed full 1080p high Definition video. It works in all weather conditions - rain, fog, snow, mist, coastal as well as extreme hot and cold climates.

Give the predator a demo today, call us on 02 8896 4364

www.sensingproducts.com

SEM1017_51.indd 1 Final.indd 1 Predator Advertisement

3/10/178:49:49 9:55 am 03-Oct-17 AM


● Case study

Star Casino

STAR CASINO It’s been 2 decades since the first IP surveillance systems were installed in Australia, first at Crown Casino in Melbourne and a year later at Star Casino in Sydney. They were basic solutions compared to the current generations of digital CCTV technology but even the first generations highlighted the power and capability of digital video.

XACTLY 20 years ago, in 1997 I was consultant on my first large-scale digital CCTV project for Star Casino in Sydney, a site which at that time was called Sydney Harbour Casino. One of the earliest digital CCTV systems in the world of this size, it comprised 50 DVRs and more than 200 cameras. The only similar solution of this type I’m aware of was completed just one year earlier at Crown Casino in Melbourne. So, in a way, this is an anniversary for the whole industry. The project was the so-called Pit-Camera System (also known as ‘Pit-Cam’) developed for Star Casino in Sydney. The idea of this project was to have gaming tables disputes resolved on the spot, quickly, without waiting for the analogue matrix switcher to search for the VHS recorders and find the recorded footage to clear a gaming incident. Using digital recording in 1997 was pioneering. Many CCTV experts of the time did not believe that digital recording quality could be equal to

E

52 se&n

SEM1017_52star.indd 52

29/9/17 3:58 pm


BY V L A D O D A M J A N O V S K I

USING DIGITAL RECORDING IN 1997 WAS PIONEERING. MANY CCTV EXPERTS OF THE TIME DID NOT BELIEVE THAT DIGITAL RECORDING QUALITY COULD BE EQUAL TO OR BETTER THAN VHS, LET ALONE S-VHS RESOLUTION (400TVL).

or better than VHS, let alone S-VHS resolution (400TVL). I should also point out that the main surveillance system was handled by the legendary MAX-1000 analogue matrix switcher, controlling more than 1000 VCRs with their patented VCR management via the wired LED remote control. But this was still analogue VHS recording. Casino operators would usually spend 8 hours per day in just replacing video tapes in machines. The digital recorders, however, even in their infancy, were offering immediate and quick access to the recorded footage, without loss of recording during the playback. This was not possible with analogue VCRs at the time. My choice, as consultant to the Star Casino wasw Dallmeier DVRs, which were distributed locally by C.R. Kennedy (a company I didn’t even know then) under the name of Grundig. They proved to offer everything my client wanted and more. The specifications are worth recalling from the point

of view of showing how technology has changed. The hard drives used in each DVR were 2 x 9GB each in a Parallel ATA (PATA) array. Recording was undertaken using wavelet compression in 4CIF resolution (around 450TVL), which was state of the art at the time. Storage requirements were not too high as the client only required 15~30min recording, as the disputes were obvious quickly. The cameras used were Panasonic’s leading Super Dynamic box camera of the day and these were analogue and coax-connected to the DVRs. I think the minimum scene illumination performance of these cameras (around 1 lux) was below the casino’s illumination (around 5 lux), so they were quite good for playing card recognition, and the angle of view was just sufficient for the playing card clarity to be visible, which is why the resolution had to be equal or better than VHS. One of the most impressive things with the Dallmeier choice was not only the image quality (offering >400 TVL) but also their engineering ability to modify the control and navigation of the playback to the satisfaction of the end user was outstanding. Although mouse and touch-screen controls were known at that time and the Crown Casino system was using the touch-screen, my client wasn’t happy with such a control. Using a mouse was not as natural to them, mouse pointer being too small, and touch-screen control was not as fluent as today - touch sensitive areas on the screen being quite large and not as precise. So, upon my suggestion to use a joystick control for playback, they agreed. I designed a simple panel with buttons representing 8 gaming tables, a joystick for playback, reverse playback, fast rewind and fast forward, and a quad screen button to toggle between quad view of 4 gaming tables. The problem was - would the DVR manufacturer be able to provide such hardware control to their DVRs? To

se&n 53

SEM1017_52star.indd 53

29/9/17 3:58 pm


● Case study

Star Casino

my surprise, Dallmeier engineers not only agreed, but supplied a prototype within 2 weeks, with a floppy diskette software update which worked immediately. This was exactly the solution my client wanted. With only 2 clicks - one for camera selection and one for playback in reverse (from the latest moment in time, immediately after the incident) the casino operators were able to see the quickest possible playbacks of any dispute - in just one second, for any camera. Such a speed of selecting a camera and playing back an incident instantly was unheard of when using VCRs. Another novelty that I introduced in this project was that the cameras used at the gaming tables were tilted by 90 degrees so that as they were installed in the ‘lollypops’ on the corner of the gaming tables, they were seeing the gaming tables vertically. When shown on the analogue monitors, they appeared to the dealer’s manager as if they are standing at the dealer’s position, making it much easier to see what was happening in case of a dispute. This gave a better clarity to the cards

Vlado Damjanovski is a CCTV specialist, consultant and managing director of ViDi Labs. He is the author of CCTV, the world’s best-selling and most authoritative video surveillance text book

and money placed on the table and also satisfied the privacy requirement to not see the faces of the patrons, but only their hands and the table. The system was installed and worked as predicted. The client was very happy with the results, as it cleared many disputes on the spot, and potential scammers were discouraged, thus reducing casino losses. The Pit-Cam system was in service for quite a few years. In fact, it only came to be replaced when the digital technology progressed so much that replacement hard drives were no longer available on the market. Even Burswood casino, many year later, simulated the simplicity of Pit-Cam system control by developing software control keyboard simulating the originally designed physical keyboard for Star Casino. Today, in 2017, it is almost impossible to see a new solution, or even an upgrade to an old CCTV system, being designed without digital IP technology. Something that only 20 years ago was unheard of, today is just standard - how things have changed! I am very proud of this anniversary milestone, not only because it is a part of my career, but part of the history of the CCTV industry in general. With this history in mind, I would like to hear from colleagues who are aware of, or who were involved with digital CCTV projects earlier than 1996/7 that were of a similar or larger size. With a glass of Australian red, I celebrate this anniversary and salute all my colleagues reading this article. Let’s not forget the fascinating history of the video surveillance industry! n

54 se&n

SEM1017_52star.indd 54

29/9/17 3:58 pm


ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.

Increase your own income.

AT NO COST

Complimentary award winning HID Readers and Credentials Exclusive to ISCS

“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix

AN ARA PRODUCTS COMPANY

HID Mobile Access®

Secure, convenient access control via your mobile device

ISCS is Australia’s HID Platinum Partner distributor

Contact

goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers

SEM1017_55.indd 1

29/9/17 10:19 am


● Special feature

Cyber security

CYBER SECURITY BEST PRACTICE Given the central importance of cyber security to the infrastructure that underlies almost all our electronic security solutions, the industry’s lack of knowledge might well be the most pressing security issue of our time.

T a recent conference, I posed two questions to a large group of people who work with IP video, the answers to which were concerning, though perhaps not surprising. The first question was “Who has read (cover to cover) a cyber security best practice document or hardening guide from ANY IP video manufacturer?” Less than 20 per cent of the room put their hands up. The second question was “Who has deployed an IP video system with security controls based on any hardening guidelines or specifications”. In a room of more than 100 people, just 2 people said ‘yes’ and a

A

couple more said ‘kind of’ - that’s less than 5 per cent of people deploying security controls in a planned manner, if at all. For an industry that deploys what are essentially large computer networks, that’s a very concerning response.

CYBER SECURITY - WHY DOES IT MATTER? The first IP video camera was introduced to the market in 1996. Before then, everything was analogue close circuit television with largely no security other than physical security of vital parts of the

56 se&n

SEM1017_56cyber.indd 56

29/9/17 3:58 pm


BY S I M O N P O L L A K

DURING THE WANNACRY MALWARE CAMPAIGN, 55 SPEED AND RED-LIGHT CAMERAS IN VICTORIA WERE INFECTED WHEN A TECHNICIAN PLUGGED IN AN INFECTED USB KEY. The Cyber Security triad comprises of confidentiality, integrity, and availability – all are relevant in the world of IP video. Let’s start with availability. Having a system that works is profoundly important, however, it’s important to remember that a security breach can impact availability. Confidentiality comes next. If you or your client has seen fit to install an IP video system, it’s probably a given that there’s something of value or importance being viewed. There are many instances in which you or they would not want that information getting into the public arena or into the wrong hands. Finally, let’s consider integrity. We rely on CCTV imagery to inform us of real time events and to carry out forensic investigations after the fact. What if you couldn’t trust that what was being viewed was accurate?

MIRAI, WANNACRY, AND STUXNET

No one wears a hoodie at their workstatiom, do they?

system, such as VCRs, tape libraries and operator workstations. It’s fair to argue that security and usability sit on opposite ends of a spectrum. The most usable computer system has no passwords, no security and anyone can just walk up and use it. Meanwhile, the most secure computer system has complex passwords, many controls, and sits inside a concrete vault at the bottom of the ocean. Unfortunately, the vast majority of installations are configured for usability over security and their accessibility means they are arguably less secure than their analogue video predecessors.

In recent years, there has been a slew of malware attacking both IT and IoT technology and if you think that IP video is safe, this is most certainly not the case. In 2014, while a cyber-attack on the US was taking place, an unnamed US ally hacked into the attackers’ surveillance cameras and were able to observe the people carrying out the attack. While we may not be combating nation state hackers, the risk to systems is real. In the weeks leading up to the US presidential inauguration, 80 per cent of CCTV recorders in Washington State were found to have malware on them. WannaCry received a lot of publicity earlier this year after it compromised computer systems around the globe. It spreads across Windows networks using an SMB Share vulnerability and encrypts files. The patch for this vulnerability had been released 2 months before WannaCry was released into the wild, however, it found many companies scrambling to deploy patches that had not been applied. Mira, while less applicable in the world of complex video management systems than in small domestic systems, takes over internet-facing CCTV cameras, DVRs and other devices to run malicious code. The attackers in this case were not concerned about the systems they were attacking, but had devised a means of harnessing them as a source of free computing to launch massive denial of service attacks on third party targets. Stuxnet is where it all began in the world of OT cyber security. It was a program alleged to have been devised jointly by Israel and the US to set back the Iranian nuclear program. Stuxnet took control of the

se&n 57

SEM1017_56cyber.indd 57

29/9/17 3:59 pm


● Special feature

Cyber security opinion that there are people out there wanting to attack YOUR system. This may be the case from time to time, but the majority of cyber-attacks are opportunistic, even inadvertent. With cybercrime more and more often being carried out by organisations seeking to generate maximum profit, their attacks are typically opportunistic and rely on mass campaigns to find targets, or setting up ‘watering holes’ in places where potential victims are likely to frequent. While all security should be designed around a site-specific risk assessment, the typical system is far more likely to be compromised by a user browsing to an infected web site, a person plugging in an infected USB key, or someone clicking on a link in a phishing email, than a determined attacker seeking to compromise your specific system. For instance, during the WannaCry malware campaign, 55 speed and red-light cameras in Victoria were infected when a technician plugged in an infected USB key. The other common way in which systems get compromised is by attackers scouring the internet for vulnerable systems. This is no different than criminals walking down the street trying to open car doors and when they find an unlocked door, helping themselves to whatever goodies they can take. A recent study by Johannes B. Ullrich, a member of the SANS Technology Institute found that an unpatched DVR with default credentials was typically compromised after being connected to the internet for just 2 minutes.

PLC’s running the centrifuges being used to enrich uranium and caused them to spin at excessive speed resulting in the centrifuges ripping apart and being destroyed. Something else to consider here is the cyber kill chain. The kill chain was associated with the cyber domain by Lockheed Martin in order to define the steps that an attacker typically follows in order to carry out a cyber-attack on a target. Disrupting any of these steps will allow a defender to delay or defeat an attacker. While defences can be deployed against all steps of the cyber kill chain, best practice and hardening efforts will mostly provide defence against steps 3, 4, and 5 – delivery, exploitation and installation. While there is no such thing as a perfectly secure system, a hardened, fully patched system with robust controls makes the installation of malware or unauthorised system access far more difficult for an attacker.

WHO ARE THE BAD GUYS? It is also worth considering who may attack your system and why. The image of a hoodie-wearing hacker in front of a screen in a darkened room, is loved by the media but rarely the case. So too, is the

WHAT IS BEST PRACTICE? It’s beyond the scope of this article to catalogue every vulnerable component of a surveillance solution, let alone describe how to harden them. There are many great resources available which discuss this in detail, and I can’t recommend strongly enough to familiarise yourselves with these. As well as product-specific hardening guides provided by the various manufacturers, I would also recommend ISO-27001 and the NIST SP-800 series which address information security more broadly. Some of the system components you should be considering when securing a system include physical security of: l Servers l Workstations l Switches l Camera fixings and network connections l Storage media. Security of devices: l Cyber security for servers and workstations l Network switches l Cameras.

58 se&n

SEM1017_56cyber.indd 58

29/9/17 3:59 pm


SEM1017_59.indd 1

29/9/17 10:19 am


● Special feature

Cyber security l Lock or delete files l Compromise functionality. Integration with corporate IT environments: As systems get connected to corporate IT networks with increasing frequency, you need to know your stuff lest you look to be a fool l AD integration l Compliance with corporate IT policies. Harden the people: l Train yourself & your staff l Make cyber security a point of focus with your stakeholders - if they don’t understand it, it’s your job to educate them. Have a plan: l I can’t stress this one enough. Without a plan on how to secure the system, you are setting yourself up for failure.

HOW DO YOU PICK THE RIGHT LEVEL?

Identity & Access Management: l Passwords l User controls l Access rights l Password policies Secure remote access: l Use 2-factor authentication l Use a VPN l Avoid port forwarding or exposing remote access services directly to the internet Security of the network: l While network switches are often thought of as a dumb box you plug blue cables into, they provide an attacker access to traverse the entire network l With IP networks, a connection at ANY point can give you access to EVERY point. An attacker could then: l View video l Exfiltrate footage

The security industry is at an advantage in this area – we’ve been assessing and managing risk for many, many years now. The only thing that has changed is the environment in which conversations about risk are taking place. Something you want to ask is what is the site’s risk appetite? If you don’t know, ask questions bearing in mind that security comes at a cost and you need to make a risk-informed decision. In the same vein, what’s your reputational risk appetite? What will happen when your name is in the papers as being the cause of a hack? Claiming no one was willing to pay to change the passwords isn’t an excuse. Then there’s stuff that’s just plain wrong in relation to exposure to cyber security vulnerabilities. We’ve all seen examples of this – if it’s wrong, don’t do it. Final thoughts - best practice guidelines, hardening guides, and other resources are readily available. Make yourself familiar with them and use them. The IP video industry is becoming more and more IT-centric every year – if we don’t get on board with cyber security, it will be taken over by those that are. n

The views expressed in this article are those of the author only and do not represent those of any organisation, or necessarily reflect the position or policies or any organisation or entity. Simon Pollak is a security professional with more than 25 years’ experience in physical and cyber security, smart buildings and automation systems. A licensed security consultant and CISSP, he holds a Masters of Cyber Security and a Masters of Business Administration (Technology). Simon contributes to SEN discussing all things cyber and converged security. Follow him at https://twitter.com/SimonPollak and https://au.linkedin. com/in/simonpollak

60 se&n

SEM1017_56cyber.indd 60

29/9/17 3:59 pm


Security Security redefined redefined Join Joinus usfor forthe the 2017 2017Interlogix InterlogixProduct ProductRoadshow Roadshow

InIn partnership partnership with with Hills, Hills, the the Interlogix Interlogix team team will will provide provide anan interactive interactive product product experience experience and and sneak-peak sneak-peak into into the the future future of of the the portfolio. portfolio. Showcasing Showcasing the the latest latest technology technology across across a range a range of of intrusion, intrusion, access access control control and and CCTV CCTV portfolios, portfolios, the the team team will will visit visit key key locations locations across across Australia Australia && New New Zealand Zealand in in October October and and November November 2017. 2017. Don’t Don’t miss miss this this opportunity opportunity to to see see how how Interlogix Interlogix is redefining is redefining the the way way wewe see see security security - now now and and into into the the future. future. Contact Contact your your local local Hills Hills branch branch forfor more more information. information.

ForFor more more information information on on these these andand other other best-in-class best-in-class solutions solutions from from Hills Hills callcall us on us on 1300 1300 HILLS1 HILLS1 (445 (445 571)571) or visit or visit hills.com.au hills.com.au

facebook.com/HillsLtd/ facebook.com/HillsLtd/ CO CN ONNENCETC TE NETNETRETRATIANI NS ESCEUCRUER E SEM1017_61.indd 1

29/9/17 10:21 am


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Attila the Hub When you look at the hydra-headed beast alarm monitoring has become, it’s difficult to see a clear path forward, regardless of whether you’re an installer or a monitoring provider. But at times like these, the facts you need to focus on are the operational demands of end users. Hubs can be scary...

URING the week I was speaking with engineers at a famous intrusion detection company who pointed out that alongside their networkable security and automation controllers they would soon be releasing a home automation hub of the type that immediately made me worry the traditional alarms market is going to tear itself apart. This company’s not the only one playing in the hub-type home automation market – everyone seems to be getting in. On the drive home, a somewhat gloomy fragment of my brain started wondering how long it would be before home automation hubs start appearing on the shelves of a JB Hi-Fi or a Bunnings. It’s an indubitable fact, someone said to me recently, that if

D

installers keep demanding security systems so simple to commission Granny May can install them, sooner or later she’s going to try. Adding to questions about future directions, it’s fair to say no one outside the company is fully across Telstra SNP’s long-term intentions for the alarm monitoring market, though the addition of Joanna Burke as head of sales suggests an expectation of considerable expansion. Whatever Telstra SNP does it’s going to have a networking flavour – if that weren’t going to be the case, we’d have seen some dramatic announcement already – there are plenty of capable solid-state wireless controllers in the market capable of giving the Big T a dependable security and automation platform – DSC, Bosch, Honeywell,

Risco – take your pick. We heard the team from SCSI explain their ideas about the future of the monitoring market in the Interview last month and this month comes the news Bosch and Suretek have teamed up to get the Solution panel range onto Suretek’s fully managed private network. It’s an interesting development in no small part because Bosch and Suretek both play the long game. It’s also not a hub-play. The BMC-3G communicator now connects dependable Solution 2000 and 3000 solid state controllers using dual SIM 3G, IP and voice pathways. The use of 2 separate carriers conforms neatly with Australian Standard AS2201.5 2008. So, what’s it to be? Will we see muchloved controllers like Bosch Solution and many others give way to a slew of

62 se&n

SEM1017_62monitor.indd 62

29/9/17 4:56 pm


Proudly brought to you by

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

SO, WHAT’S IT TO BE? WILL WE SEE MUCH-LOVED CONTROLLERS LIKE BOSCH SOLUTION AND MANY OTHERS GIVE WAY TO A SLEW OF HUB-TYPE HOME AUTOMATION SYSTEMS?

hub-type home automation systems? Or will solid state controllers, with their low current draw and neverending lifespans leap-frog onto private high security networks in a way that placates cyber security fears and guarantees glitch-free performance? Personally, I think it’s going to be both but it doesn’t really matter. That’s because the most important things about alarm monitoring are not going to change any time soon, if ever at all. Installers need simplicity and relentless reliability. End users need measures of the same. They want systems that do alarm and that don’t false alarm. And customers whose risk profile demands professional monitoring services are not going to switch out to self-monitoring for no good reason. As a commercial expense,

single-site alarm systems are cheap to install and very cheap to monitor. If your site has hundreds of thousands to tens of millions of dollars’ worth of stock and equipment laying around, professional security solutions are a no-brainer. Of course, residential end users increasingly want solutions that can be addressed via mobile devices but their dislike of installing network cameras in family living spaces clearly attests to the fact they don’t believe their domestic networks are secure. No wonder. Most security installers don’t know how to secure a network-facing security controller or device. Would you install a networked security camera in your living space? Not likely. But on a secure private network, a secure private cloud? That’s a different

matter altogether - and commercial users seeking video verification and remote management are no less likely to require some measure of cyber security when it comes to protecting comms. And there’s the rub. Because if thoughtful homeowners and commercial operators want their security systems reporting across off-piste communications networks, the pressure to go all-in on home automation hubs is off. Does that mean hubs aren’t going to be a force to be reckoned with? No again. Almost every installer, manufacturer and monitoring provider is kicking hubs around, attracted by device agnosticism but without a market vehicle to really drive the business forward. Smart hubs are best when they’re orbited by dozens of Z-Wave devices and constellations of Z-Wave devices cost pots and pots of money – much more than the pittance many homes and businesses are prepared to throw at a security solution. So, what’s the future? It’s what the end user decides it is. Reliable solid state with hard wired sensors (no battery changes ever, we can all sign up for that!), managed by a few keypads and pendants; or remotely managed home automation jigged up so far it would make your eyes water. In the middle, we’ll see the expansion of something familiar. Solid state controllers that offer all the benefits of remote management and a smidge of automation - the best of the old and the best of the new. n

se&n 63

SEM1017_62monitor.indd 63

29/9/17 5:01 pm


● Special feature

PSIM

ENGINE MANAGEMENT Just when you thought there was nothing new under the security sun there is something new – or not so much a new concept as an enhanced idea of something that has been tried many times over the years but that now looks to have come of age – it’s physical security information management (PSIM) – the engine management system of security operations.

64 se&n

SEM1017_64engine.indd 64

29/9/17 4:58 pm


BY R O G E R P E A R C E *

UR access control industry is pretty comfortable with High Level Interfaces (HLIs) these days. In fact, no respectable access control system would not have a suite of HLIs available to interface to other systems. The most important and the most common HLIs we’ve been dealing with for more than 20 years now are interfaces to lifts, CCTV, building management systems (BMS) and more recently, intercoms. In a commercial high rise building these interfaces will probably suffice where an integrated system is required. PSIM will be of more use in larger buildings where there is in house security monitoring and guards.

O

However, when you move to larger more diverse security installations with onsite monitoring and guards like a port authority; prison, university campus, airport or mine site; the security control room is likely to have a much larger array of systems to monitor and control. From one central point, the security department will be monitoring all the usual security sub systems as well as taking phone calls, answering intercoms and communicating with mobile patrols and staff over the 2-way radios. Both access control systems (ACS) and video management systems (VMS) do part of what a PSIM solution does but not everything. To be completely affective and improve efficiency, a PSIM must not only integrate the physical security but also link it to manpower management software. This means combining several technologies including the physical, such as the ACS, VMS, BMS, fire, radio, intercom and phones, but importantly connecting these to a system that logs all physical events and can pull related events together and present them as one scenario to the operator by linking an alarm, a relevant camera view or views, as well as bringing up a report page so that the operator can add comments and response. It also must automatically pull up the recommended Standard Operating Procedure (SOP) and present it to the operator. The system must then go on to allow easy and rapid reporting and analysis of historical events to help identify patterns and trends that have occurred over time. Management of operators and mobile guards must also be handled within the system. This involves creating diaries and programs of future activities, reports on response times and staff performance and giving the ability to crossreference or link records, search on any information in the security database, and presenting findings in a variety of ways. Automatic dispatching of guards to respond to an event is a great time saving feature, especially in an emergency when the control room is under pressure during a crisis. PSIM should also enable requests for service to be thoroughly documented—from initiation, to deployment, to response. Routine activities should be escalated into incidents for further follow-up. Operators should be able to search text fields across the whole database and consolidate related incident and investigation data into case records for comprehensive tracking, analysis and reporting. This will bring clarity to complex investigations and scenarios by mapping relationships between seemingly disparate data.

TO BE COMPLETELY EFFECTIVE AND IMPROVE EFFICIENCY, A PSIM MUST NOT ONLY INTEGRATE THE PHYSICAL SECURITY BUT ALSO LINK IT TO MANPOWER MANAGEMENT SOFTWARE.

se&n 65

SEM1017_64engine.indd 65

29/9/17 4:58 pm


● Special feature

PSIM

Existing security control rooms have probably acquired a range of sub systems over time to cope with the demands of monitoring a large site but because they were installed at different times by different integrators, they probably have little or no connection with each other. The security operators have to do the coordinating themselves, so it is not unusual to see a control room set up for peak loads where there are staff monitoring cameras, responding to alarms, writing reports, taking phone calls, despatching guards and answering intercoms all at once. At times like this, the operators have to make snap decisions and need 4 pairs of hands to work all the systems. This challenging time is then followed by a lull when things go quiet and little is happening, allowing time to catch up. These peaks and troughs can be smoothed out by a PSIM as it will automate a lot of actions, even if they come in rapid fire as they will in an emergency. In an emergency, dozens – even hundreds – of alarms occur over a short period. With a PSIM, the pressure is taken off the operators leaving them to concentrate on the overview of what is happening and manage the most appropriate response. This is where PSIM comes in. The aim is to put in an overlay graphical user interface (GUI) with all the sub systems interfaced to it, so that there is only one GUI workstation for the operator to use. This is the main differentiator between an integrated access control system or video management system and a PSIM. A PSIM does not just integrate, it provides intelligence as well. This has many advantages over a control room that has grown just like topsy with operators having to jump from one keyboard to another and look for information on various monitor screens.

Some of the advantages are: l All the sub system present on the same maps and screens in the same format l Consistent GUI operation for security control room operators no matter which sub system is being viewed. l Operators only need one keyboard, mouse and headset l Every field device – be it a reed switch, movement detector, card reader, camera, thermostat, temperature alarm, fire alarm, emergency call point, lift phone, 2-way radio, iPhone, iPad, iPod – can be linked or interrelated by programming. The interrelationships between all devices and events are programmed into the (PSIM) overlay by way of scenarios or related Inputs and outputs. An input can be from a device or an event and can trigger an output or create an event. The aim is to make the whole system event-driven, thereby minimizing the control room operator’s involvement in routine tasks leaving them free to be proactive and ready to respond to the exceptional events. Some good examples of these scenarios that can be automated would be say, a vice chancellor drives onto a campus and badges their card on the weekend, the air conditioning and lights in their office turns on, the lift is called to the ground floor, and the relevant cameras come up on the monitors in the security control room to check the VC gets to the office safely. Or a student calls from an emergency call point, the nearest camera comes up on the video monitor in the security office, if after dark, additional lighting comes on, and the message is relayed to the nearest security patrol as a text or even a video. At the same time, a door or gate can be locked or unlocked, depending on the time of day or other circumstance. A high temperature alarm is triggered in a computer room. An alarm is reported to all appropriate personnel via mobile phone or handheld device as well as the security control room. Oncall IT personnel go directly to the location and take action. There is a fire alarm from a particular building – the alarm reports to the brigade as well as security. Air conditioning is shut down, an SMS text message is sent to the radio(s) of the guard(s) nearest that building and a page is broadcast to all occupants to evacuate. To be effective, PSIM should integrate all of the technologies and security operations. To know what is required, the designers of a PSIM needs to immerse themselves in the procedures carried out day-to-day in the security control room so that every facet of the operation is incorporated into the design. n Roger Pearce is an independent security consultant with more than 30 years’ experience in the electronic security industry, 15 years of which have been as an independent consultant advising clients on a range of security technology applications. He can be contacted at sbtb@people. net.au or visit www.sydneysecurityconsultants.com.au

66 se&n

SEM1017_64engine.indd 66

29/9/17 4:58 pm


CLASS 5

Encrypted High Security

End of Line Modules Are Only the Beginning

Inner Range’s Infiniti Class 5 is a complete Hardware/Software solution designed specifically for Class 5/Zone 3 installations. Our range includes: 4 All Software 4 Hardware Controllers 4 End of Line Modules 4 Power Supplies 4 Keypads 4 Enclosures 4 Communications Devices 4 Access Control Readers 4 Credentials

Why take chances? Full End to End Encryption compliant with AS/NZS 2201.1:2007 Class 5 Externally Certified SEE US AT MEMBER

NOVEMBER 9, 2017 CANBERRA

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM1017_67.indd 1

AUSTRALIAN SECURITY INDUSTRY ASSOCIATION LIMITED

T: 1300 319 499

W: csd.com.au

29/9/17 2:34 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

WAMA INTRODUCES NEW 4MP H.265 INTELLIGENT IP CAMERAS l WAMA is pleased to announce the newest addition to its product family – the NF4 Series H.265 intelligent IP cameras. These IP cameras come with 4MP image sensors, H.265 compression technology, built-in video analytic functions and a competitive price. “Users who are looking for video surveillance solutions with high resolution and an extended recording requirement, but at the same time have a limited budget, would find the NF4 Series IP cameras a very attractive solution,” said Dr. Wallace Ma, CEO of WAMA Technology Ltd. “Additionally, the cameras also come with sophisticated built-in intelligent functions.” H.265 can reduce the network traffic and storage requirement by 50 per cent in comparison to H.264, which is crucial when deploying a CCTV system with long recording requirement. The NF4 Series IP cameras come with built-in video analytic functions including tripwire, loitering, missing / unattended object detection and overcrowd monitoring. Distributor: NAS Australia Contact: +61 7 3015 8700

SIFER KEYPAD FROM CSD

WISENET 20MP & 8MP MULTIDIRECTIONAL CAMERAS FROM EOS l WISENET 20-megapixel and 8 megapixel multi-directional camera feature the Wisenet 5 chipset, which exceeds the benchmark for multi-sensor camera technology by incorporating features such as 60fps, 150dB wide dynamic range, low light performance of 0.0015 lux B/W, 0.015 lux colour and digital image stabilisation with a gyro sensor and built-in, license-free advanced video analytics. The camera provides wide coverage in extreme detail, ideal for many applications, such as lobbies, airports, railway stations and shopping centres. Distributor: EOS Australia Pty Ltd Contact: +61 2 9749 5888

l INTRODUCING the SIFER keypad with inbuilt SIFER Smart Card Reader from Inner Range. The combination of an IP67-rated keypad and smart card reader allows; card or pin, card only, PIN only or dual credential card and PIN to be set on a per-user basis. Connected on the multi-drop RS485 bus, this device employs 128-bit AES encryption from the card/ keypad through to the door module and 13.56 MHz Mifare DESfire EV1 card format, which provides a far superior level of security to that of traditional Wiegand-based keypads and card readers. As SIFER keypads utilise a superset of the OSDP protocol, the keypads may also be deployed on any system capable of using OSDP. The SIFER keypad is ideal for use in all residential, commercial, government and enterprise facilities where higher levels of security are required. Distributor: CSD Contact: 1300 319 499

68 se&n

SEM1017_68prods.indd 68

29/9/17 5:03 pm


TOUCHONE MINI 5-INCH CODE PAD FOR BOSCH SOLUTION 2000/3000 PANELS l NEW from Bosch is the TouchOne Mini Code Pad - a high definition 5-inch touchscreen for the ever-popular Bosch Solution 2000 and 3000 control panels that provides a rich graphical user interface and extended functionality. With a 1280px x 720px resolution (landscape), and a MicroSD card slot for adding photos or updating the device, the TouchOne Mini can be used to view critical status information of the system and perform common actions from the Home Screen. Use it to arm/disarm, bypass or rename zones, maintain users including PINs and keyfobs, control and rename outputs, and change the time and date. You can also connect to your local WiFi network to install apps, communicate with other units or video intercom door stations, and access automatic updates and diagnostics. You can even have a photo slideshow running in standby mode from the MicroSD card. Ideal for residential and small commercial applications, and available now. Distributor: Bosch Security Systems Contact: 1300 1 BOSCH (26724)

HIKVISION RELEASES DARKFIGHTERX PTZ

DAHUA AND GJD CREATE DETECTOR-ACTIVATED SURVEILLANCE l DAHUA Technology’s network video recorders (NVRs) now have a direct integration with IP-based outdoor detectors from GJD Manufacturing Limited. This integration provides users with high-quality and reliable detector-activated surveillance and monitoring. D-TECT IP detectors and Clarius PLUS IP illuminators have been integrated with Dahua’s NVR6-4KS2 range, an enterprise-level NVR providing up to 4K resolution. Its open architecture supports multi-user access and it is compatible with ONVIF 2.4, enabling interoperability when combined with third-party 4K cameras. The NVR includes intelligent video analytics to detect people and moving objects, as well as other predetermined events, such as abandoned or missing objects, tripwire detection, people counting and facial detection. The integration was achieved by incorporating GJD’s API on a special firmware that enables the NVR to accept alarms from the detectors and link them to the recorder’s functions. The BS8418-compliant IP detectors are suitable for intruder monitoring, CCTV surveillance and other alarm warning requirements, providing both volumetric and long-range narrow field-of-view sensing, plus remote programming. “We are thrilled to have integrated our class-leading NVRs with GJD’s IP detectors, providing a professional detection and alarm monitoring solution that is a fantastic addition to our security portfolio,” Daniel Chau, Dahua overseas marketing director said.

l THE ultra-low light performance of DarkFighterX PTZ is absolutely awesome, according to CSD. It can see colour in the almost complete darkness of night. Utilising cuttingedge technology, it delivers colourful, sharp images right down to 0.001 lux. Taking inspiration from the human eye, DarkFighterX merges colour from a visible light sensor and brightness from an IR sensor to provide one bright, full-colour image under low light conditions. DarkFighter X H.265+, IP66 rated series includes a PTZ or bullet camera with optical defog, 25x optical zoom, 2MP resolution and smart detection. Distributor: CSD Ph: 1300 319 499

Distributor: Dahua Contact: overseas@dahuatech.com

se&n 69

SEM1017_68prods.indd 69

29/9/17 4:57 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

C•CURE 9000 ACCESS MANAGEMENT WITH VISITOR MANAGEMENT l THE latest version of Johnson Controls, multi-integrative flagship C•CURE 9000 platform allows visitors to self-register using the new visitor management Kiosk Application for iOS iPad devices. Visitors now have the option of using a QR code to check-in instead of manually entering pertinent information into the application. Within C•CURE 9000, when the appropriate field is checked, the system generates a QR code for each visitor and for each visit. The visitor receives a confirmation email which includes a QR code image and a calendar attachment. Once the visitor arrives for check-in, he/she simply presents the QR code at the kiosk and the information is prepopulated into the application. Once the visit is confirmed by C•CURE 9000 and a credential is created, a temporary identification label or card can be printed from the C•CURE 9000 client. An email notification of the visitor’s arrival is promptly sent to the host. Using access management workflows, personnel records can be assigned as requestor and/or approver roles and process clearance requests using customized rules and workflows. Clearance requests can be approved or denied by assigned approvers without the need for adding operator accounts to C•CURE 9000, moving administrative tasks from security officers to individuals within the building for operational efficiency. Distributor: Tyco Security Products Contact: +61 4 6776 3544

ICT RELEASES SILICONE MIFARE ACCESS CONTROL WRISTBANDS l ICT’S new silicone Mifare wristbands provide a convenient hands-free access control credential that is ideal for restrictive or humidity prone environments. The slim, unobtrusive design ensures the wristband can be worn comfortably, including under protective clothing if required. The wristbands are available in 3 sizes (small, medium, and large) and in 2 colour options (black or white). Completely sealed and with an IP68 rating, they are ideal for high humidity environments such as water theme parks, wash down areas, and medical facilities. Order codes for the wristbands are: PRX-SWB-MF-B-L Black Large Mifare PRX-SWB-MF-B-M Black Medium Mifare PRX-SWB-MF-B-S Black Small Mifare PRX-SWB-MF-W-L White Large Mifare PRX-SWB-MF-W-M White Medium Mifare PRX-SWB-MF-W-S White Small Mifare. Distributor: Integrated Control Technology Contact: 1800 428 111

NEW HIKVISION MOTORISED 4MP IR DOME l HIKVISION’S new 4MP IR turret dome with motorised zoom and focus was released by CSD at the start of August and has been one of fastest selling new product releases ever experienced by the company. According to Mark Edwards, GM of products & marketing, thousands of units have been shipped in the first few weeks of the camera’s launch. “The camera is available at a very competitive price point and allows the security integrators to adjust the field of view from the NVR without having to have a second employee at the camera making manual adjustments,” Edwards said. “How many times has a camera installation been completed and it comes to handover and the customer asks, can you zoom in a bit? “This new Hikvision motorised dome saves time and money, as well as reducing the need for carrying various models with differing lens configurations,” Edwards said. “When you consider the image quality, price and ease of installation, this is probably the best all-purpose IP camera on the market today.” Distributor: Central Security Distribution Contact: 1300 319 499

70 se&n

SEM1017_68prods.indd 70

29/9/17 5:04 pm


CONNECT WITH BOSCH’S REMOTE SECURITY CONTROL PLUS APP l BOSCH’S new Remote Security Control Plus (RSC+) app for Solution 2000 and 3000 will be available this month for iOS and AndroidOS devices. The new app builds on the existing features of Remote Security Control in order to provide an experience that sets new standards in notification, intuitive control, and ease-of-use. When used with the new B426-M and B450-M Cloud Connect communications modules, the RSC+ app becomes simplistic to setup – simply plug the panel into an existing network connection or insert an active data SIM, enable cloud connect, then scan the onboard QR code to get the panel online. There is no need for IP addressing or complicated configuration of ports on the router – if there’s an internet connection, you’ll be able to get online instantly. For adding more users, it’s simply a case of scanning a QR code and entering your passcode. Each user of RSC+ app is able to receive push notifications from one or multiple panels which they can configure so that they are only seeing what matters to them. Once you log in to the panel via the app, you can read the full panel history and see what’s been going on while you’re not around. Arm or disarm your alarm panel, see the status of your sensors and isolate them if required, or control up to 20 outputs devices connected to your panel such as garage doors or heating systems. Distributor: Bosch Security Systems Contact: 1300 1 BOSCH (26724)

HIKVISION UNLEASHES DEEP LEARNING l HIKVISION has launched its DeepinMind network video recorder, an intelligent NVR that learns to identify people captured by video surveillance cameras. The NVR can also learn to filter out false alarms that would have previously been triggered by nonthreatening moving objects. The new 32-channel iDS-9632NXI-I8/16S NVR will be the first in Hikvision’s new range of DeepinMind products. Hikvision is taking the deep learning concept and applying it to the security industry, yielding a series of completely new products. Imitating human beings’ synaptic learning and memory processes, the DeepinMind Series NVR incorporates advanced algorithms to achieve accurate and consistent video content analytics (VCA) performance. False alarms triggered by animals, leaves, shadows, changes in lighting, and other insignificant objects regularly plague security personnel, costing too many man-hours and monetary resources. But with its ability to detect human bodies, the iDS-9632NXII8/16S NVR effectively filters out such false alarms. The DeepinMind NVR identifies and triggers human activity with an unprecedented accuracy—exceeding 90 per cent. Its high-speed graphics processing unit (GPU) performs accelerated computing while deep learning algorithms improve accuracy over against current NVR models that still rely on conventional CPUs. Moreover, these features enable authorized users to search recorded footage and find targets far more quickly than with a traditional NVR. The DeepinMind embedded NVR also features up to 32 channels of video input for IP cameras (up to 12 MP), HD video output and decoding, hard drive hot-swapping, RAID (0, 1, 5, 6, and 10) configurations for up to eight 8-TB HDDs, and dual-NICs.

AMC ALARMS UNIKA TOUCHSCREEN KEYPAD FROM LSC l WITH more than 30 years’ experience in the intrusion detection device market, AMC Alarms has garnered a strong reputation for their user-friendly, market-leading design. AMC’s new Unika touchscreen keypad is no exception, distributed in Australia by LSC is no exception. Equipped with an intuitive, user-friendly graphical interface, this 5-inch touchscreen display allows users to manage all alarm functions from keypad. The inbuilt SD card reader enables users to personalise their Unika with a screensaver of their favourite photo or image. Once loaded, users can enjoy a crystal-clear image thanks to the high resolution (480 x 272) TFT display. Other notable features include: • NFC reader (for smartphone recognition) • Microphone and speaker • Temperature sensor • Vocal memo • Alarm clock function • Compatible with all AMC panels. Distributor: LSC Contact: 1300 626 269

Distributor: Central Security Distribution Contact: 1300 319 499

se&n 71

SEM1017_68prods.indd 71

29/9/17 4:57 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: We’re fed up with the images we get from our few-year-old surveillance solution – it’s fine during the day but as soon as evening arrives we lose the fine detail to noise and blur. We’ve also installed a higher resolution camera in a key location to get more detail and find at night for the above reasons we get even less detail than before! We also have IT bullets but their performance in monochrome leaves plenty to be desired in the real world. Is there a surveillance camera that gives court-admissible images at 5 lux or is this impossible for current technology? A: Our testing shows that most cameras suffer from noise and blur under 10 lux. We favour noise over blur but there’s a law of diminishing returns. You should be able to get court admissible images at 5 lux out to 12 metres at 5-6mm focal lengths. You can increase the minimum shutter speed to reduce blur but the impact on image quality isn’t always clear cut. We would be using slightly longer focal lengths with cameras we were depending on at night. If we really needed faces we’d be providing some additional lighting, or leveraging existing ambient lighting. All the top line box cameras will give you reasonable faces to 12m at around 5 lux but bullets are another matter. Given they are fitted with integrated IR, they are going to switch into night mode at around 10 lux. IR can be great in an unlit back lane but it might not be so effective on a city street with an average light level of say, 7 lux and lots of reflective surfaces. If your

Our panel of experts answers your questions.

application is large enough to generate leverage, we’d be inviting some leading manufacturers to meet the demands of your application onsite. It’s worth bearing in mind that higher resolution sensors tend to have smaller photo sites, which means they collect fewer photons and apply more amplification but making blanket statements about low light performance is very hard to do. Our experience is that lower cost high res cameras can suffer from blur in low light while some high end 4K cameras – the Sony VB770 is one – have outstanding performance in extreme conditions. Q: What do you think are key features users should seek from a CCTV camera, all other things being equal? A: Remote zoom and focus is a great strength and one we’d hate to do without in a modern surveillance application of any size. Whether the camera is a fixed dome or a bullet, it’s still an advantage to be able to dig in optically. We think it’s worth getting a handle on the value proposition of remote zoom during the planning phase – you need to bear in mind that at the long end a bullet or dome with a slight downward angle to the housing or the camera chassis is going to end up focusing on the ground – the point is that there’s no point over-specifying remote zoom in such applications if it means you just get a closer view of tiles, macadam or pavement. Within a useful zoom range, the other benefit is remote focus. Given many cameras tend to drift out of focus

during day/night cycles or in the presence of vibration or thermal expansion, remote focus is a major benefit. Loss of focus can really kill camera performance and if that camera is mounted somewhere hard to reach, it might cost the best part of $1000 to get a scissor lift and a team of 2 techs onto your site to put things right. Q: Do you think there is a quality difference between lower cost Chinese manufacturers and traditional manufactures or are all likely to be similarly high quality? A: Impossible to say without extensive testing. Quality control is all. If you are concerned you could undertake some magnification photography of a couple of samples focusing on sensors and boards to get a feel for QC. Given there is still an aspect of hand-building involved in CCTV camera manufacture you’d be wanting to ensure cameras are built in clean conditions and there are no fingerprints on sensors or boards, no stray off-cuts of plastic or metal floating around, no fibres, bits of hair or flakes of skin that might impact on performance over time. A bit of internal dust in lenses is almost impossible to avoid and has an undetectable impact. Dirty sensors will impact on image quality. It’s probably good practise to examine a camera’s sensor using a SensorKlear loupe and lenspen just to clear away any debris during the commissioning process. It’s easy to see the impact of dust, dirt or oil on a sensor if you know what to look for on the monitor. Dirt will appear in an

72 se&n

SEM1017_72help.indd 72

29/9/17 4:00 pm


250m from lens, f11 and a 15 second exposure

image as a circular smudge, or a cluster of smudges, hairs as an organic smudged line. Tidying sensors is easy work for a careful technician. Q: We have a particular application in which a fixed camera in an external housing monitors a high security location across 250m water – we are most interested in ensuring secure lighters remain moored to piles, so high frame rate is not so much of an issue. We simply need to be able to regularly check the dedicated monitor and see instantly that all the lighters are present. Something we are having trouble with is getting sufficient detail from the scene with our current set up. With auto shutter speeds the scene is too dark - or with amplification elevated, we get loads of noise. When we reduce shutter speed with an F1.4 lens we get large amounts of blooming and this also costs us the detail we need. The key for us in this application is very fine detail looking into a scene that includes ambient lighting on our target site, as well as in the background. What would you suggest? We’ve looked at some long CS-mount lenses on the web and they are very costly, given this is a one-off. A: If you were shooting with a DSLR we’d suggest f11, a shutter speed of 15 seconds and a rock-solid mounting point – something made of concrete, not a pole. This would give the detail you need and avoid triggering detail robbing amplification from the camera engine thanks to a low ISO equation. Smaller aperture numbers combined with slower shutter speeds are the key to fine detail

in low light. You don’t say what your focal length is but it’s likely you should be using a longer focal length than you are using. For a high security application, it’s likely this lens should have a focal length that overs the angle of view of the target and not much more. With a shutter speed of 15 seconds any moving object in this field of view will be indiscernible – moving lights will renders as lines. But you should get very high levels of detail of relatively static objects. It’s certainly worth experimenting with DSLR glass if you feel up to it. Have your technicians customise an airtight connector/adaptor – it could be made of rubber hose - and firmly mount camera and lens inside the weatherproof housing you already have. The key will be lining up the sensor and the lens opening and making sure placement does not wildly impact on magnification. You’ll need to tape focus but the big f number means you’ll have a serious depth of field anyway. Something like a Nikon 135 f3.5 AIS could be ideal. If you needed a tighter angle of view, try the Nikon 200 f4 AIS. Either will cost about $125 American. We’d recommend buying from sellers in Japan. The C-mount Rainbow 8-80 lens is another option worth considering but they are becoming very hard to find. If you have success, please share images!

another tech check terminations during commissioning. Do a walk test during commissioning. These checks will reduce false alarms and expensive call-outs to rectify basic faults that should have been picked up while installation teams were on site. Special attention should be paid to electrical connections - these are the places a system is most likely to run into trouble. Look for obvious mistakes in application of sensors. Make sure a PIRs field of view is clear. Make sure there’s not going to be afternoon sun in the field of view at any time of year. You must be sure that any active motion detector transducers are installed firmly on vibration free surfaces. Another important point is to ensure that sensitivity is never adjusted to such extremes that the detector is prey to picking up environmental disturbances like traffic. Sensors are especially likely to be tuned too highly on large sites when the preferred technology is not available due to budget constraints. When setting sensitivity make sure the sensor is positioned and tuned to allow the best possible performance in a worstcase environment - never over-extend a sensor in perfect installation conditions and expect no false alarms later on. Every sensor enclosure should have tamper protection and any units located externally should be installed in weatherproof enclosures with boards conformal coated. Care should also be applied to installation of the cable plant with all cabling sealed in conduit meeting the Australian Standard and buried or carried too high to be reached and in sealed conduits. n

Q: It should not happen but we have issues with technicians who claim to be skilled failing to undertake the basics during alarm installations – what would you recommend as a minimum? A: Check the sensor during unboxing to ensure there’s been no damage caused by shipping before installation then have

se&n 73

SEM1017_72help.indd 73

29/9/17 4:00 pm


Security Managers ◆ Integrators ◆ IT Managers ◆ Installers

& Networks

OCTOBER 2017 ISSUE 392

WIRELESS ALARMS

events SECURITY & GOVERNMENT EXPO l l l l l l l l l

PP 100001158

The Heat of the Moment: Thermal Surveillance Case Study: SES Victoria Installs Salto Genetec Kicks Goal at Cathedral of Rugby Case Study: MS Youngcare, Albany Creek The Interview: Ximen Yan, Uniview Retrospective: Star Casino’s Pit-Cam Applying Cyber Security Best Practice Alarm Monitoring: Operations is the Future ATG Opens Security Distribution in WA

+ SECURITY & GOVERNMENT EXPO

+

Security and Government Expo 2017

Date: November 2017 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with space for 20 companies to promote their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

Smart Summit Asia Date: November 30 - December 1 Venue: Suntect, Singapore Contact: el: +44 (0) 330 3353900 The Smart Summit is a 2 day conference and exhibition covering the Internet of Things (IoT) ecosystem and its impact on the digital society. With 4 in-depth event tracks and over 80 leading speakers, no other IoT event covers the Smart Home, Smart Cities and Industrial Internet of Things in as much detail.

Security 2018 Date: July 25-27 Venue: 2018 Mebourne Convention and Exhibition Centre Contact: +61 3 9261 4662 Security Exhibition brings the largest selection of electronic and physical security suppliers in Australia to one destination for three days to showcase innovative solutions from 100s of leading brands.

SecTech Roadshow 2018

=

Dates: May 2018 Venues: Melbourne, Brisbane, Sydney, Adelaide and Perth Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in it's 4th year takes leading distributors and wholesalers on a national tour.

DAILY, WEEKLY, MONTHLY.

SEM1017_74events.indd 74

29/9/17 2:54 pm


SIMPLYTHE THEBEST! BEST! SIMPLY

UNRIVALLEDVIDEO VIDEOQUALITY! QUALITY! UNRIVALLED

H.265Coding Coding H.265 RealTime Time4k 4kStreaming Streaming Real InstantPlayback Playback Instant IntuitiveSmart SmartGUI GUI Intuitive NewEESeries SeriesEnterprise EnterpriseCameras CamerasNow NowAvailable AvailableInIn8MP 8MP4k 4k New NewCost CostEffective EffectiveSSSeries SeriesCameras CamerasNow NowAvailable AvailableInIn4MP 4MP++8MP 8MP New

PH1300 1300663 663904 904 PH sales@csmerchants.com.au sales@csmerchants.com.au www.csmerchants.com.au www.csmerchants.com.au

SEM1017_75.indd 1

29/9/17 10:20 am


SIFER Keypad

SIFER Reader EliteX Keypad

Security Alarm

SEM1017_76.indd 1

Access Control

Automation

No Software Required

Multiple Devices

Easy Setup with Checklist Prompting

Send IP Alarms via the Multipath-IP Network

29/9/17 10:20 am


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.