SEN October 2018

Page 1

OCTOBER 2018 ISSUE 403

l The Interview: Dean Monaghan, Convergint Technologies l Case Study: RMIT Reaches For Infiniti l News Report: FHDistribution Launches in Australia l Cyber Security: Securing IP Cameras l Case Study: QUT Partners with Gallagher l Product Review: Hikvision DS-K2604 Access l Alarm Monitoring: Get Ready for 5G Disruption l Product Review: Qolsys IQ Panel 2 Review l Product Review: Panasonic WV-X8570N 4X4K Camera

SEM1018_1cover.indd 1

PP 100001158

ENTERPRISE ACCESS CONTROL

27/9/18 4:53 pm


R

DKC63E

Efficiently Boost Up Your Entrance Management Hikvision Smart ANPR Solution is A Perfect System for Productivity and Parking Security With the help of Hikvision Automatic Number Plate Recognition (ANPR) technology being employed at the vehicle entrance gate, the smart parking lot system can recognize and analyze license plate numbers. It also helps security teams to systematically manage videos and locate individual vehicles in a given period of time, greatly accelerating post-event investigation. The system integrates Smart IP cameras, NVRs, and video management software, providing around-the-clock protection for parking lots. -Automatic number plate recognition -Easy ANPR live view, search and reporting -Comprehensive management Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com

SEM1018_2.indd 1

www.hikvision.com.au

27/9/18 2:20 pm


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS O CTO BER 201 8 ISSUE 4 03

By John Adams

EFFICIENCY, TRUST, COMMUNICATIONS DRIVING CHANGE OR security managers and integrators left breathless by the pace of technological change over the last 5 years one thing is certain – there’s not going to be any let up – if anything things are going to change faster still. And there are signs upgrades are getting faster, more lateral, as the latest systems become more open. At the heart of technological changes over time are core things like processing power, developments in network infrastructure, falls in price and reimaginings of the user interface. These things are constant. But the next 5 years will deliver on some building trends that are going to need to be carefully managed. Artificial intelligence is one of these trends. It’s been coming for decades but with many countries, including Australia, taking different layers of citizen ID biometric and most manufacturers starting to deliver on past ROI promises, it’s clear that AI is going to be central to the future of our systems. It will make them more efficient, more powerful and more frightening. The paradox of AI is that it will need to be kept on a short leash to achieve its full potential – whether we’re already past the point of control remains to be seen. Secure and trusted communications and networks is another trend that must be taken in hand. This means security managers and integrators need to ensure their systems are protected and the data those systems gather is defended. This is more challenging than it sounds and the larger your application, the harder it’s going to be. There’s a reason the U.S. Government maintains the only way it can secure multiple agencies effectively is via one secure cloud. When it

F

There’s a reason the U.S. Government maintains the only way it can secure multiple agencies effectively is via one secure cloud. comes to cyber security, AI is going to intrude here, too, in the form of attack and defence. Trust is a nebulous, challenging, real concept. Smarter solutions with the capacity to facilitate closer relationships with an organisation’s staff, as well as the public, live by trust. That means systems need to be managed more closely using global protocols that don’t impinge on privacy or the rights of staff and citizens. This is going to be hard to wrangle but given the power of future technology, it must be managed to exacting standards. Potential power makes the impact of technological derailment more intense. Staff and the public are going to take a dim view of any organisation that breaches trust in the future. This is going to impact on how security managers handle AI for access events and video searches, as well as whether they use data analytics to keep an eye on staff communications. We’re going to see a more focused system of technology partnerships. This will mean manufacturers are going to need to ensure future equipment is designed to be open. For many end users, end-to-end proprietary systems make technology partnerships harder and limit the scope for security teams to leverage emerging efficiencies. Further, business processes and traditional security functions are beginning to leverage the same technologies. Security managers will need to make tough decisions based on wider operational goals to ensure they get solutions best equipped for a more fluid future. We’ve been talking about smart cities for a while but perhaps what we were really talking about was smarter workplaces. When you think about the latest electronic security and

safety solutions, what they strive to provide is a global view. Situational awareness is more about empowering law enforcement, security and management teams than about empowering collections of buildings. The future is likely to broaden this awareness by including inputs from dynamic environments to assist with managing disasters, proactively responding to incidents using automation, managing movement and delivering wide area duplex communications. Here more than anywhere, developments in networks are going to be central – particularly widespread 4G and later, 5G. Talking about communications feeds into the way users will interact with systems and networks in the future. Google says search numbers on mobile devices are now greater than those on computers. For security managers, this means use of biometric-enabled smart devices for authentication on converged applications is well and truly on the table. It also means smart devices are a viable way for security and safety systems to communicate with staff and the public. There’s also increasing use of voice assistants such technologies could be leveraged to enhance security procedures by interrupting device operations with audible and visual emergency alerts. Government and corporate security people are going to get a close look at the latest security technologies at Security & Government Expo at the Realm Hotel in Canberra on November 12. They’ll also hear about the latest trends in security management at the concurrent SAGE and ASIS seminars. Given the enormity, power and risk of many of the changes sweeping through security technology, SAGE 2018 is not to missed. n

se&n 03

SEM1018_3ed.indd 3

28/9/18 11:40 am


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM1018_4_5 copy.indd 4

27/9/18 3:46 pm


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM1018_4_5 copy.indd 5

27/9/18 3:46 pm


! DA TE OF GE AN CH

3RD ANNUAL

SECURITY AND GOVERNMENT EXPO SECURITY

& GOVERNMENT EXPO W W W. S E C U R I T YA N D G O V E R N M E N T E X P O . C O M . A U

EXHIBITORS

MEDIA PARTNER

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

SAGE DPS AD_OCT18.indd 6

27/9/18 3:49 pm


FREE EVENT REGISTER NOW!

Don't miss Security and Government Expo The Hotel Realm, Canberra.

November 12, 2018 Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital.

12pm - 6pm ASIS & SAGE seminars 10am – 4pm Free refreshments 3.30pm – 5.30pm

F O R F U R T H E R I N F O R M AT I O N C O N TA C T M O N I Q U E K E AT I N G E O N 0 2 9 2 8 0 4 4 2 5

Enquiries please contact Monique Keatinge +612 9280 4425

SAGE DPS AD_OCT18.indd 7

27/9/18 4:14 pm


10

60

44

boutique group of local distributors. FHD has aggressive intentions and plans to be Australia’s number 3 security distributor within 2 years. 36: THIS IS THE ENTERPRISE

OCT 18 30: CONVERGING STRATEGIES In this month’s interview, Dean Monaghan talks to SEN editor John Adams about the acquisition of Integrators Australia by Convergint Technologies and plans for the future. 32: RMIT REACHES FOR INFINITI ROYAL Melbourne Institute of Technology (RMIT) has selected the Inner Range Infiniti platform as the heart of its 3000-door electronic security upgrade – Convergint Technologies has been chosen to deliver the solution. 34: FHDISTRIBUTION AIMS FOR NUMBER 3 FHDistribution has launched in Australia as a manufacturers’ representative of a selection of international manufacturers it will provide to a

SEM1018_8cont.indd 8

Enterprise access control solutions deliver end users an elevated level of capability, allowing users to apply policy enforcement to business risk and to secure physical and IP assets to a global standard. The ability to manage staff access globally, to track staff and assets, can mean easier integration and reduced operating costs. However, enterprise access control is not for the faint hearted. It’s a process that requires careful planning and execution. 43: SECURING IP CAMERAS No electronic security device with an exposed network port can be considered secure without the considered application of network security policy. In this feature, Brendan White of Mobotix explains threats and strategies for installers, integrators and end users. 48: QUT PARTNERS WITH GALLAGHER Queensland University of Technology is partnering with Gallagher Security to provide safety and security, as well as facilities management, for 46,000 students and 12,000 employees across its 3 campuses.

27/9/18 3:47 pm


62 46

36

regulars

48

50: HIKVISION DS-K2604 ACCESS Hikvision has released a number of economical and full-featured 2 and 4-door access control solutions, supported by a suite of devices, from keypads and biometric readers to video intercoms. 54: QOLSYS IQ PANEL 2 REVIEW QOLSYS IQ Panel 2 is a security and automation solution distributed locally by BGWT, that incorporates multiple wireless paths, loads of peripherals and a swathe of functionality that gives security installers the capability to build serious security and automation solutions.

OCTOBER 2018 ISSUE 403

l The Interview: Dean Monaghan, Convergint Technologies l Case Study: RMIT Reaches For Infiniti l News Report: FHDistribution Launches in Australia l Cyber Security: Securing IP Cameras l Case Study: QUT Partners with Gallagher l Product Review: Hikvision DS-K2604 Access l Alarm Monitoring: Get Ready for 5G Disruption l Product Review: Qolsys IQ Panel 2 Review

PP 100001158

ENTERPRISE ACCESS CONTROL

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

10: NEWS Latest business, product and technical news from Australia and around the world. 52: MONITORING At CEDIA recently a roundtable led by CE Pro editor Jason Knott discussed 5G communications, describing it as network disruption, pointing out that the people most likely to be impacted were installers and the people who stood to benefit most if properly prepared were those same installers. 62: EDITOR’S CHOICE What’s new from our manufacturers. 64: HELPDESK Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: taniasdesign@ optusnet.com.au

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM1018_8cont.indd 9

27/9/18 3:47 pm


NEWS IN BRIEF OCTOBER 2018

UTC COULD BE SEEKING A BUYER FOR CHUBB FIRE & SECURITY, REUTERS n UNITED Technologies Corp is considering a sale of its Chubb Fire & Security division for more than $3 billion, Reuters reported. On Sept. 14, UTC CEO Greg Hayes said the company will announce a decision within 60 days about whether to break up, sources told Reuters. Chubb

is a global provider of fire safety and security solutions which was acquired by UTC for about $US1 billion in 2003, and is part of the company’s climate, controls and security division. Pershing Square Capital Management LP and hedge fund, Third Point, have been

putting pressure on UTC to break up into 3 focused, standalone businesses, according to Reuters. Investors have increasingly spurned sprawling industrial conglomerates, forcing competing firms to sell or spin out major divisions.

Vlado Damjanovski

DIY FASTEST GROWING SEGMENT OF $US75 BILLION GLOBAL HOME SECURITY MARKET n MARKETSANDMARKETS has told SSN that DIY home alarms are the fastest growing segment of a global home security market its researchers estimate will be worth $US75 billion by 2023. “There is a major trend among the different types of devices in the

home security system, that is: do-it-yourself, DIY home security systems,” explained Rupesh Yelhekar, company research analyst. “This system is very affordable in the market and people who are looking for the affordable security solutions are opting for it.”

Marketsandmarkets, which said the market was being driven by developments in wireless comms and IoT, said its report identified 3 categories of systems: Professionally installed and professionally monitored, self-installed and professionally

monitored system, and DIY installed and selfmonitored. The DIY market is expected to grow “at the highest CAGR of these 3 types,” Chaudhari said. The CAGR for this segment will be a whopping 30.86 per cent by 2023, compared to 4.3

percent in 2017 – in 2017 professionally installed and professionally monitored systems made up around 90 per cent of the market, he said. The Americas was the largest geography for home security systems, with about 43.1 per cent of the market share, according to Vaibhav Chaudhari, senior analyst in the company’s semiconductor and electronics practice. “In the Americas region, Canada is expected to be the fastest growing market, with around 11.63 per cent CAGR,” he said. “Asia-Pacific would be the fastest growing market – around 12 per cent of CAGR.” MarketsandMarkets examined a range of different product types, including fire detection, video surveillance, access control systems and intruder alarms. Currently, video surveillance is the largest segment, and the fastest growing is access control.

10 se&n

SEM1018_10news.indd 10

27/9/18 3:48 pm


EVVA Locks Securing Port Of Newcastle Industrial SiteNewcastle Industrial Site p.12 Hills Signals Intent With Key New Staff p.14 Video Security Products Distributing Briefcam p.16 U.S. Congress Targets Biases Of Artificial Intelligence p.18

COMPILED BY JOHN ADAMS

PERTH SECURITY INTEGRATOR DTI WINS CONTRACT FOR 576 TRAINS IN SOUTH AFRICA n DTI Group reports it has finalised contract negotiations with Alstom Ubunye for the supply of lateral, front and internal passenger information system displays on each carriage of 576 trains to be manufactured by Ubunye for delivery to the Passenger Rail Agency of South Africa (PRASA). Using DTI technology, these products will be manufactured in South Africa, providing DTI with an additional manufacturing location and the opportunity to manufacture a range of products for the South African and global markets. Deliveries for the systems are expected to commence in December 2018 and will

be supplied over a period of ten years until 2028. After an initial ramp-up, DTI is expecting to deliver approximately 60 trainsets annually. DTI provides sophisticated surveillance systems, solutions and services to the mobile security industry worldwide. DTI’s clients are transit agencies, transit operators, freight operators, law enforcement authorities and taxi organisations which utilise a range of professional products and services that encompass on-board recording equipment, fleet management systems, backend mass storage and retrieval facilities and end-to-end managed services.

UNIVERSITY OF WOLLONGONG SEEKS GALLAGHER SECURITY ACCESS UPGRADE

n THE University of Wollongong is seeking submissions from Gallagher NSW channel partners for the upgrade of its existing Gallagher access control solution. It’s a comprehensive enhancement involving a complete upgrade of all Gallagher hardware of all the university’s campus’ except the business school. That includes replacement of all terminals, controllers and card readers with

the latest versions. A summary of works required includes: 1) Replacement of 60 remote arm terminals 2) Replacement of 201 3000 & 5000 controllers 3) Supply and install 19 new 6000 controllers 4) Replacement of 1170 card readers 5) Other miscellaneous works. The tender closes October 16.

IT’S A COMPREHENSIVE ENHANCEMENT INVOLVING A COMPLETE UPGRADE OF ALL GALLAGHER HARDWARE OF ALL THE UNIVERSITY’S CAMPUS’ EXCEPT THE BUSINESS SCHOOL.

UTC AGREES TO ACQUIRE S2 SECURITY n UTC has agreed to acquire unified security, access control, and CCTV solutions provider, S2 Security, a manufacturer of IP-based physical security and video management systems. “This move is well aligned with our strategic focus to grow our core business and increase innovation,” Alex Housten, VP & general manager, Fire & Security Products, a part of UTC Climate, Controls & Security. “We look forward to providing enhanced service capabilities and offerings for our customers and accelerating our access control and video-centric solutions for intelligent buildings across the globe.”

Meanwhile, John Moss, founder and CEO, S2 Security, said that considering the complementary customer bases and product portfolios of the 2 companies, the acquisition was a natural step that will benefit customers, employees, and channel partners. United Technologies believes the buyout will enable it to boost its security portfolio as well as enhance service capabilities and offerings to its customers. The complementary product portfolios and customer bases of both the companies are also likely to benefit customers and channel partners.

se&n 11

SEM1018_10news.indd 11

27/9/18 3:48 pm


NEWS OCTOBER 2018

SECURITY INDUSTRY AWARDS AND OSPAS 2018: CROSS-INDUSTRY JUDGING PANEL DECIDES

EVAN LIU APPOINTED MANAGING DIRECTOR OF HIKVISION OCEANIA

n A CROSS-industry judging panel decided the Australian Security Industry Awards for Excellence and the Outstanding Security Performance Awards (OSPAs) in Sydney recently. As usual, there was plenty of debate around the table, with

n HIKVISION has appointed Evan Liu as managing director, Hikvision Oceania. An internationally experienced industry leader with business start-up and operational management experience, Liu brings strong technical knowledge of the computer science and the CCTV security industries. He has a proven track record of successful leadership within Hikvision’s international operation. After joining the company in 2010, Liu was soon mobilised to help set up the team in South Africa, where they secured toprank in local market share within 2 years. During the 2015-17 financial crisis, Liu developed new businesses for Hikvision

judges bringing different areas of expertise and experience to the process. Ultimately, this meant every category was considered from multiple angles and the quality of judging was considerably enhanced as a result. ASIAL’s John Fleming said the standard of nominees

was strong and he was pleased with the results. “We’re looking forward to hosting the industry at the Awards Ceremony and Dinner at Sydney’s Doltone House Hyde Park on October 18,” Fleming said. “This is the 23rd year the Australian Security Industry Awards for Excellence have been presented, as well as the 4th time ASIAL has partnered with the OSPAs to honour outstanding achievements.” Individuals or companies wishing to attend the dinner, which is sponsored by Chubb Security, should cvisit ASIAL’s website to reserve seats or tables before space runs out.

in the local market, including EZVIZ and SSD, as well as introducing other significant Hikvision products and projects. Liu has moved to Australia. Living and working here, he looks forward to enhancing Hikvision’s work with communities in Oceania by building stronger partnerships with local businesses.

Evan Liu

EVVA LOCKS SECURING PORT OF NEWCASTLE INDUSTRIAL SITE n A LARGE port-side industrial site adjacent to Port of Newcastle, covering hundreds of hectares and operating at 20 locations around the clock, is being secured by EVVA locking solutions. According to EVVA, there were several issues at the site with previous

master key systems. The first was age – the master key solution had been installed over decades and comprised multiple systems. There were also many unaccounted-for master keys in circulation, meaning security was compromised. Being a

maritime environment, there were also issues with salt and dust binding up locks, which then required service. The site required a maximum-security master key system upgrade, which needed to be highly resistant to the site’s environmental

factors as well as having the ability to create a highly complex master key hierarchy to cope with the specific access needs of the 160 various key holders. Keys also needed to be smooth to insert and effortless to operate. The user decided that the EVVA 3KSplus system was ideal for the project. The 2 main factors influencing the decision were an ability to handle the tough environment and to create a highly complex master key hierarchy which would avoid issuing too many master keys. A key cost saving feature with the 3KSplus system was the ability to re-barrel existing padlocks. Certain 3KSplus design features make the system highly resistant to environmental challenges. These include internal sliders (pins) that are teflon coated. This meant there was no need for lubrication of the cylinders which would act as an additional attractant for dust and salt. The spring-less design reduces

wear on keys, as well as reducing the impact of environmental factors exacerbated as the key actively places sliders. According to the client, since initial installation more than 600 3KSplus cylinders have been installed at the site. During this time there has only been one jammed lock, the cause of which was put down to shackle failure and not cylinder issues. The customer described the system as being “extremely versatile, hardy and easy to use”.

THE SITE REQUIRED A MAXIMUMSECURITY MASTER KEY SYSTEM UPGRADE, WHICH NEEDED TO BE HIGHLY RESISTANT TO THE SITES ENVIRONMENTAL FACTORS AS WELL AS HAVING THE ABILITY TO CREATE A HIGHLY COMPLEX MASTER KEY HIERARCHY...

12 se&n

SEM1018_10news.indd 12

27/9/18 3:48 pm


© 2018 Genetec Inc. GENETEC and thethe GENETEC LOGO are trademarks ofof Genetec Inc., © 2018 Genetec Inc. GENETEC and GENETEC LOGO are trademarks Genetec Inc.,and andmay maybe beregistered registeredororpending pendingregistration registrationininseveral severaljurisdictions. jurisdictions.

How secure is your security?

In an age of state-sponsored hacking and increased cyberattacks, trust is crucial. an age of state-sponsored and increased cyberattacks, trust is crucial. – YourInphysical security equipment hacking is a potential entry point to your critical infrastructure Your physical is a potential entry point to your critical infrastructure – and security not everyequipment manufacturer has your network’s best interests at heart. and not every manufacturer has your network’s best interests at heart. At Genetec, we place the emphasis on transparency and trust – and select our partners accordingly. At Genetec, we place emphasis on transparency – and select our of partners accordingly. It allows our users the to focus on what really matters:and thetrust successful operation their business. It allows our users to focus on what really matters: the successful operation of their business. Are you asking the right questions about the connections you’re making? genetec.com Takethe a closer look genetec.com/trustyournetwork asking rightsolutions questions about the connections you’re making? For more information on theseAre andyou other best-in-class

Take closer look genetec.com/trustyournetwork fromgenetec.com Hills call us on 1300 HILLS1 (445 571) or visita hills.com.au

facebook.com/HillsLtd/ CONNECT

SEM1018_13.indd 1

E N T E RTA I N

SECURE

27/9/18 2:20 pm


NEWS OCTOBER 2018

AUSTRALIAN CATHOLIC UNIVERSITY UPGRADING NATIONAL SECURITY CONTROL ROOM n AUSTRALIAN Catholic University is upgrading its National Security Control Room located in North Sydney. As part of the upgrade process, ACU last month sought quotes from vendors who have experience and capabilities to supply electronic and computerbased equipment designed for security and CCTV control rooms. Australian Catholic University incorporates 7 campuses Australia-wide supporting more than 32,000 students. Situated

at the heart of the North Sydney Campus, which includes multiple buildings that span 4 inner-city blocks, is ACU’s National Security Centre (NSC) and its 24-hour security team. The ACU NSC was originally established to monitor the numerous CCTV systems installed across its multiple campuses, but now operates as an in-house alarm monitoring centre for all ACU campus security and CCTV systems.

HILLS SIGNALS INTENT WITH KEY NEW STAFF n HILLS has recruited a raft of new sales talent to boost its security business across Australia and New Zealand (ANZ), naming Gary Hickey and Cliff Simons as the regional sales managers for New South Wales/ACT and Victoria/Tasmania respectively. Simons returns to Hills after working for Hikvision Australia and Q Security Systems. Having worked in the security sector for over 20 years, Simons brings a wealth of industry experience and a vast catalogue of contacts to the role. Hickey joins Hills after 6 years at Central Security Distribution, and with 20 years’ experience in the industry, comes to the business with a strong background in enterprise level negotiations and a deep understanding of the Australian security landscape. Both Simons and Hickey are tasked with accelerating Hill’s growth aspirations and

ensuring continued sales momentum of exclusive vendor products including Genetec and United Technologies Corp (UTC). In addition, Hills has recruited 7 new account managers across ANZ, including Troy Mercy, Peter Pereira and Dale Simons in Victoria/ Tasmania, Ricardo Fernandez and Kevin Baik in NSW, Gavin Aquino in Western Australia, and Scott Hamilton in New Zealand. David Lenz, Hills CEO and managing director, said the appointment of new staff strengthened

the sales capacity for the company’s security, surveillance and IT business. “Hills is investing heavily in people, processes and technology to deliver exceptional customer service,” Lenz said. “After achieving sales revenue growth in the security business over the last financial year, it’s important to maintain the momentum and invest in our sales staff to ensure we maintain our position as ANZ’s largest building security technology distributor,” Lenz said.

NSW ROADS AND MARITIME SEEKS SECURITY CONTROL ROOM, INTEGRATION, ANALYTICS n NSW Roads and Maritime Services, which manages roads and waterways across NSW, has gone to tender seeking the construction of a new security control room, incorporating comprehensive integration of security and

communication systems, the implementation of new technologies, including analytics, and the development of a dedicated incident management room. Objectives of the project are: 1. To establish a secure

and resilient security control room and incident management room 2. To deliver enhanced situational awareness and functionality in the protection of RMS critical infrastructure 3. To create an operational environment that is

appealing and conducive to 24-hour operations. The RMS security control room construction project seeks to provide: • A comprehensive integration of security systems • A passive control room with analytical support and incident monitoring • Using all data sources to provide increased situational awareness • Providing RMS security control room operators with a state-of-the-art facility. Roads and Maritime Services is an agency of the New South Wales Government responsible for building and maintaining road infrastructure and managing the day-to-day compliance and safety for roads and waterways. RMS has an annual budget of around $A6.5 billion and

was created on 1 November 2011 from a merger of the Roads & Traffic Authority and NSW Maritime. The network that RMS’ 7000 employees maintain and manage includes, 18,036km of state roads, 147km of privately-funded toll roads, 5287 bridges, major culverts and 22 tunnels, as well as 47 commuter wharves.

ROADS AND MARITIME SERVICES IS AN AGENCY OF THE NEW SOUTH WALES GOVERNMENT RESPONSIBLE FOR BUILDING AND MAINTAINING ROAD INFRASTRUCTURE AND MANAGING THE DAY-TODAY COMPLIANCE AND SAFETY FOR ROADS AND WATERWAYS.

14 se&n

SEM1018_10news.indd 14

27/9/18 3:48 pm


SEM1018_15.indd 1

27/9/18 2:19 pm


NEWS OCTOBER 2018

JOHNSON CONTROLS INTERNATIONAL WINS CROWN CASINO UPGRADE

CSD’S JOSH MILLS MOVES TO INNER RANGE

n JOSH Mills, formerly CSD state sales manager for Victoria and Tasmania is now the new business development manager for Inner Range. “As part of our strategy for the expansion of Inner Range in the Australian market we have created the new role of national new business development manager,” said Peter Krincevski, CEO at Inner Range. “As a group we identified Josh Mills as a perfect fit for this role and he has moved over to Inner Range from CSD this week. We are excited about this new role and

the extra support we will be able to offer to our loyal security integrators, consultants and end users.” According to Peter Grimshaw, general manager sales and distribution at CSD, Mills has been in the security industry for over 15 years and part of the CSD team for almost 10. “On one hand we are really pleased that Josh has been given this opportunity at Inner Range but on the other we are sad to see him leave CSD,” said Grimshaw. “However, we take great pride in seeing

our loyal staff members furthering their careers within our group and wish him every success in his new role.” Mills said he was looking forward to the challenges ahead of at Inner Range. “This new role will enable me to still deal with all the loyal Inner Range clients and assist them with their project opportunities while developing new opportunities for our product line up and pushing them through our sales channel,” Mills said.

n JOHNSON Controls International has been awarded the head end upgrade contract by Crown Casino for Crown Melbourne and Crown Sydney, currently under construction at Barangaroo. The upgrade across 2 sites will include Dallmeier SeMSy management software, as well as hardware able to support around 7000 channels of IP video. C.R.Kennedy & Company is the largest provider of surveillance systems in the Australian casino market, as well as the distributor for Dallmeier

AS PART OF OUR STRATEGY FOR THE EXPANSION OF INNER RANGE IN THE AUSTRALIAN MARKET WE HAVE CREATED THE NEW ROLE OF NATIONAL NEW BUSINESS DEVELOPMENT MANAGER.

VIDEO SECURITY PRODUCTS DISTRIBUTING BRIEFCAM

ROSS AMATO JOINS CSD AS BUSINESS DEVELOPMENT MANAGER

n VIDEO Security Products is now distributing Briefcam’s range of Video Synopsis video analytic solutions, which deliver fast searches, reviews and alerts, as well as movement data for multiple applications, enhancing efficiencies and increasing return on investment. “Briefcam is now an important part of our portfolio,” said Zaki Wazir of Video Security Products. “Briefcam offers cutting edge live and post event video analytics with seamless Milestone integration. “VSP is all about is allowing customers to get the most value from their Milestone deployment and we are

n INTERNAL promotion at CSD has paved the way for Ross Amato to join the CSD team as business development manager, based in Victoria. “Our promotion from within strategy has seen Matt Veenstra, formerly an external account manager for CSD Melbourne, promoted to major accounts manager – Victoria,” said Peter Grimshaw, general manager sales & distribution at CSD. “This has created an opening for a new BDM to join our team and we are excited Ross Amato has come on board. He will be a fine addition to our ever-growing external sales team. “Ross brings with him an abundance of enthusiasm

always searching for value-add products and solutions that bolt onto Milestone – Briefcam is one of these value-add products. Importantly, like Milestone and Axis, Briefcam is now owned by the Canon Corporation.”

Zaki Wazir

in Australia, and worked with Johnson Controls and all the stakeholders at Crown in delivering the winning solution. With 510,000 square metres of gaming floor, Crown Casino is Australia’s largest casino, the largest casino in the Southern Hemisphere and one of the largest casinos in the world. The complex also hosts 4 hotels, Crown Towers, Crown Promenade, and Crown Metropol, with a fourth hotel approved for construction and expected to commence in 2018.

and passion for the security industry and we are sure he will fit in extremely well within our dynamic infrastructure,” Grimshaw said. Amato spent many years as an installer and more recently has held both internal and external roles

at Hills. “Because I’m technically focused, it’s really exciting to join CSD,” Amato said. “The Inner Range product suite is leading the industry, providing the opportunity to learn more about and to grow this wonderful solution.”

16 se&n

SEM1018_10news.indd 16

27/9/18 3:48 pm


MORE THAN A COLLECTION OF BRANDS MORE THAN A COLLECTION OF BRANDS MORE THAN A COLLECTION OF BRANDS

AN ARA PRODUCTS COMPANY AN ARA PRODUCTS COMPANY AN ARA PRODUCTS COMPANY

SEM1018_17.indd 1

1300 111 010 1300 111 1300 111 010 010 www.iscs.com.au www.iscs.com.au www.iscs.com.au

27/9/18 2:19 pm


NEWS OCTOBER 2018

ADT MONITORING SERVICES NOW OFFERING 24HOUR NETWORK PROTECTION

DTI SIGNS MELBOURNE RAIL CONTRACT FOR CCTV ON 58 COMENG TRAINS

n ADT’S Digital Security services gives 24/7 live agent support to protect customers’ identities and networks and financial information. “Since ADT began in 1874, our mission has been to help keep families and homes safe,” said Jim DeVries,

n METRO Trains Melbourne Pty Ltd has signed a contract with DTI for the supply and installation of CCTV surveillance and passenger information systems on the Commonwealth Engineering fleet for the city of Melbourne. MTM operates a fleet of 420 trains on 869 kilometres of track, and this contract involves the supply and installation of surveillance and passenger information systems on 58 existing Comeng-built trains. Deliveries are expected to commence in June 2019 and will be delivered over an 18-month period. Each Comeng train will be equipped with a ruggedized digital surveillance system including a quad-core digital

current President and incoming chief executive officer of ADT. “With online threats occurring more often than ever before, our mission evolved to not only help protect the premises, but also people on the go and their network and

TSA PLANS EXPANSION OF AIRPORT 3D LUGGAGE SCANNING PROGRAMME

n THE Transportation Security Administration will expand a pilot program for 3-D luggage screening with the purchase of an additional 200 ANALOGIC ConneCT scanners, a move which suggests the technology is proving effective. 3-D luggage scanning uses computed tomography X-rays which examine luggage from multiple angles using hundreds of images that can be rotated 360 degrees. The technology is more discerning, which means liquid and electronics could be scanned inside bags to make queues at airport security checkpoints more efficient.

“I’ve watched them in operation,” TSA Administrator David Pekoske told the Senate Commerce, Science and Transportation Committee recently. “They are a significant enhancement in security effectiveness.” The scanners are being used at John F. Kennedy airport in New York City, Phoenix Sky Harbor International Airport and Boston’s Logan International Airport, and will soon begin working at Los Angeles, Chicago and Washington, D.C. With the planned purchase, 10 per cent of airport security checkpoints in the U. S. will deploy 3-D scanning.

digital identity. On average, cyber-attacks are happening every 39 seconds, and Digital Security by ADT is an opportunity to extend the breadth and scale of our security monitoring to our customers’ personally identifiable information and network.” Digital Security offers different levels of identity theft monitoring and protection, a personal secure virtual network (VPN) for easy and secure app-based Wi-Fi privacy outside of the home, and home network security using a secure Wi-Fi router. Additional services soon to be added include dark web defence, Secure VPN and home network protection.

recorder with mass storage, 12 high-definition cameras, 2 transit rated power over Ethernet network switches, 2 hearing aid loop amplifiers, 2 driver display units, 2 frontal displays, 3 PA amplifiers, and 6 internal displays. DTI says the award of these options is a strong endorsement of its retrofit capability, as well as its ability to deliver into complex rail projects.

U.S. CONGRESS TARGETS BIASES OF ARTIFICIAL INTELLIGENCE n MEMBERS of Congress have asked the Federal Trade Commission, Federal Bureau of Investigation, and Equal Employment Opportunity Commission if agencies have studied biases of artificial intelligence algorithms used for commerce, surveillance, and hiring. Senators Kamala Harris, Patty Murray,

and Elizabeth Warren specifically ask the agency to determine whether this technology could violate the Civil Rights Act of 1964, the Equal Pay Act of 1963, or the Americans with Disabilities Act of 1990. “We are concerned by the mounting evidence that these technologies can perpetuate gender, racial, age, and other biases,” a

letter to the FTC says. “As a result, their use may violate civil rights laws and could be unfair and deceptive.” Earlier in the year Charles Isbell, executive associate dean at the Georgia Institute of Technology, testified about the biases he’s seen for nearly 30 years of working in AI research. “I was breaking all of [my classmate’s] facial recognition software because apparently all the pictures they were taking were of people with significantly less melanin than I have,” Isbell said. Meanwhile, AI researcher Joy Buolamwini told Quartz Congress’ move was a major step in alerting federal agencies to the dangers of bias. “Government agencies will need to ramp up their ability to scrutinize AI-enabled systems for harmful bias that may go undetected under the guise of machine neutrality,” Buolamwini said.

18 se&n

SEM1018_10news.indd 18

27/9/18 3:48 pm


SEM1018_19.indd 1

27/9/18 2:19 pm


● Product review

Panasonic

PANASONIC WV-X8570N 4X4K PANASONIC’S new WVX8570N 4 x 4k multi-sensor camera is a play for the Holy Grail of video surveillance – a camera with the ability to see everything, all of the time.

20 se&n

SEM1018_20pana_2.indd 20

28/9/18 1:17 pm


BY J O H N A D A M S

ANASONIC has a long history at the bleeding edge of video surveillance technology. The company’s Super Dynamic cameras changed the way the industry judged the performance of CCTV cameras in the late 1990s and Panasonic was at the forefront of PTZ development, with a string of excellent camera systems over many years. The WVX8570N has the same design DNA as earlier breakthroughs and incorporates many of the company’s technological breakthroughs but fundamentally, it’s designed to give end users managing large open spaces a view of everything in its focal range – around 30 metres for faces and plates. The specification list is long – in fact it’s so long, it makes the camera difficult to get a handle on. Each of the 4 camera sensors is a 1/1.8-inch progressive scan CMOS with a minimum scene illumination in colour of 0.12 lux and in monochrome of 0.05 lux. These are 4K image sensors with a resolution of 3840 x 2160 pixels at up to 15ips. The lenses are fixed 4.6mm with a constant aperture of F1.6 and wide dynamic range of 108dB. The cameras feature auto gain control, white balance, adaptive black stretch, backlight compensation, highlight compensations, fog compensation and digital noise compensation. Interestingly, the camera heads can be moved and Panasonic’s swingEye wide range tilt angle adjustment allows for 270-degree or 360-degree views. Positioning of the camera heads is integral to performance and 1-3 of the camera heads pan through 360-degrees, and tilt between 30 and 80 degrees with an azimuth of 50 degrees up or down. Meanwhile, camera 4 pans through 360, tilts between 15-80 degrees and yaws through 50 degrees. Each camera head offers a horizontal angle of view of 97 degrees and a vertical angle of view of 53 degrees. Compression options are H.264 and H.265 and H.265 compression has new smart coding, Auto VIQS self-learning region of interest, ClearSight Coating, and end-to-end system encryption. Intelligent Auto monitors scene dynamics and motion to adjust key camera settings automatically in real-time reducing. Adopting H.265 Smart Coding technology, bandwidth efficiency is intelligently increased for longer recording and less storage. Out of the box, the camera supports full data encryption streaming to FIPS 140-2 Level 1. Data security is another

P

INTERESTINGLY, THE CAMERA HEADS CAN BE MOVED AND PANASONIC’S SWINGEYE WIDE RANGE TILT ANGLE ADJUSTMENT ALLOWS FOR 270-DEGREE OR 360-DEGREE VIEWS.

2 x zoom, camera 1

4 x zoom

4 x zoom and a pan right...

consideration and there’s encrypted SD card edge recording, as well as end-to-end system encryption with supported VMS and devices to protect from IP snooping/spoofing and detect data alteration. The build is also solid with NEMA 4X, IP66 and IK10 ratings against water, dust and vandalism. Dimensions are 230mm long, 196mm high with a dome diameter of 80mm. Construction is die-cast aluminium and weight 2.8kg using the attachment plate or 3.3kg using the base bracket. The camera’s build quality is high, with lovely hand feel. Cabling is through the foot of the pendant mount I’m using. All fixing screws are stainless steel and have corrosion resistant coatings. There’s

se&n 21

SEM1018_20pana_2.indd 21

28/9/18 1:18 pm


● Product review

Panasonic THE NEXT THING THAT HITS ME ON THE STREET IS RESOLUTION. IT’S STRONG AND THAT FEEDS INTO GOOD THINGS LIKE DEPTH OF FIELD AND SHARPNESS.

Wide view on camera 2

2 x zoom

a dehumidification device integrated into the camera to handle condensation. Operating temperature is -40 to 60C and the clear poly resin dome cover has hydrophilic ClearSight coating to disperse water and accumulated dust. Other features include 24 simultaneous users, events recorded or sent to iOS or Android devices, email notifications, VMD alarm and command alarm, as well as G.726 audio compression from 16kbps-32 kbps and G.711 audio compression of 64 kbps. Current demand is PoE and maximum draw is 12.95W.

TEST DRIVING THE WV-X8570N 4X4K I’m running the camera through a NetGear ProSafe GS108P PoE switch on our dedicated Dell Optiplex 9020 i7 server via the Panasonic camera browser – I’m interested to see whether the standard video card can keep up but it seems to be managing well. It’s hard to know with 4 x 4K how the CPU/ GPU might respond to widespread movement through 360 degrees, but the fact Panasonic’s H.265 compression delivers a combined video stream that’s the equivalent of a single 4K camera is instructive. Running frame rate at 15ips helps keep things under control in this department, while ensuring security managers get near real time performance. There’s have no trouble getting

the camera cabled up and opening the camera browser on SEN’s server. The first thing I realise, as I pin the Magic Arm to the verandah rail outside the office with the heaviest camera it has ever carried, is that this is much more camera than my application. Yes, you can set the camera to deal with 270 degrees, but I want to look at 360. Even using a pendant mount pushing away from an overhang, this isn’t easy. In the real world, integrators and security managers of universities and public spaces are going to need to find way to install the camera to leverage its undoubted power. The next thing that hits me on the street is resolution. It’s strong and that feeds into good things like depth of field and sharpness. The camera’s ability to manage variable light is good and I’m impressed with colour rendition. Motion blur of moving traffic is good, too, though it’s better in the sweet spot of the 4.6mm lens than at the edges, where classic barrel distortion starts arm wrestling pixels. Once I start playing with digital zoom, I get as stronger sense of the power of the camera, but I decide I prefer to stick with 2x digital zoom, rather than using 4x, unless it gives me the field of view I want with a particular angle of view. Digging into digital zoom unearths typical pixel-spread softness at 4x, as well as discovering chromatic aberration, while the full 4.6mm angle and 2x are flinty and sharp from edge to edge. Hyperfocal distance looks a little longer than usual. Looking at detail in the timber, as well as the sharpness of the adjacent verandah railing suggests it might be around 1 metre. This is likely to come down to that slightly longer than usual 4.6mm fixed focal length, the pay-off of which when combined with 4 x 4K resolution, is getting court admissible plates and pretty good faces out towards 30 metres. The WV-X8570N’s camera browser gets involved in the test and that’s because of the nature of the camera. In some ways it’s better to think of this as a 4-camera system, not a single camera. In my case that system comprises Bellevue Street cameras 1, 2, 3 and 4. The cameras are not stitched but together they contrive to give complete coverage out the front. I can see across the street, up the street, down the street and under the verandah of the office. Bear in mind, you can adjust the camera sensors to give the best possible coverage – I could enhance my coverage doing so but I’d lose the sense of 360 degrees. I also note my tilt angle is a little low for

22 se&n

SEM1018_20pana_2.indd 22

28/9/18 1:18 pm


Security complexity simplified

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM1018_23.indd 1

T: 1300 319 499

W: csd.com.au

27/9/18 4:09 pm


● Product review

Panasonic

Wide view camera 3

2 x zoom plus pan and tilt

2 x zoom tilted up

my mounting height. Even so, whatever comes past the office is always captured by 1 camera or 2, and more detail is only a click away. Something else that takes me a little while to get my head around is that the 4 camera streams are always being recorded at full resolution. This makes the Panasonic more capable than you think it is. Investigators will be able to access all 4 images streams after the event, steering around the images from corner to corner and making the most of that strong resolution. When I’m viewing the scene in full screen I can pan around by clicking the browser image off-axis. Towards the top, the angle of view moves up, towards

the bottom, it moves down. For operators and investigators, this makes managing the camera easier. The image quality is strong throughout the afternoon. The colour temperature seems to be ever so slightly warm. As the afternoon wears on my faintly pink tones move to faint blue. I find that to keep an eye on a key part of the scene, it works best to select a camera view and then go in 2x digital zoom for best faces and plates. Is the camera getting plates out to 30 metres, as the Panasonic literature claims it is? Yes, for the most part, it is. Things start slipping when fast moving cars are whizzing by a maximum range but closer in, there’s no drama. This is our same old afternoon scene between the buildings and test day is sunny, giving strong delineations between light and shaded parts of the scene but none of this bothers the WV-X8570N, which plugs away happily. Colour rendition in light and in shade is excellent. There’s not that overwrought intensity you sometimes see – the colours are rich with excellent variation in tone. Nor do I notice significant amounts of noise in good light. Latency seems to be about 300th of a second, which is good performance. As light levels fade into the late afternoon, I start seeing some evidence of a reduction in shutter speed in the scene from camera 2 in the array. What’s interesting here, is that usually when shooting on the street, I point the lens up towards Albion Street at an angle – it’s not common for me to view a scene at right angles like this and there’s no question it’s tough, especially in failing light. I try to snare the plate of a motor scooter doing about 40kmph but there’s no chance. Still, given the difficulty posed by the scene, the bike is generally in one piece and details like colour, clothing colour, helmet design and more, are easy to discern. I have a lot of fun playing with 2x zoom on 4K resolution out front using the 3 camera angles that work best in my application. If the Panasonic was going to live on the Magic Arm, I’m be tweaking Camera 4 to cover what’s going on underneath and slightly behind the camera. The greater tilt angle on camera 4 suggests I’m not the first person to think this way.

LOW LIGHT PERFORMANCE & WDR As night really comes down I get a stronger sense of the WV-X8570N as a system of cameras. In my application at default, camera 1 stays in colour, camera 2 goes to monochrome, camera 3 stays in colour and camera 4 stays in colour. There’s no doubt that looking under the tree out front, there’s considerably less light, so it’s no surprise camera 2 went over before the others. That it made a unilateral decision to do so is instructive. Monochrome performance is tidy – perhaps a little brighter than I’m used to seeing. When I dig

24 se&n

SEM1018_20pana_2.indd 24

28/9/18 1:18 pm


SEM1018_25.indd 1

27/9/18 2:19 pm


● Product review

Panasonic wind the image in for more detail. It’s a beautiful thing. My view down the street towards Foveaux Street is deep and detailed. Looking at the images for noise, I find that while night performance is a little softer than afternoon, there’s no excessive noise going on in any of my 4 scenes. The night performance in colour and monochrome is better than I was expecting. There’s a little blooming around bright points but it’s controlled in a typical Panasonic way. I note some chromatic aberration around bright points but it’s mild. Around tree branches moving there’s some blur in colour that’s not evident in my monochrome image – different shutter speeds at work here. Next morning in the presence of 75,000 lux of backlight, the camera delivers typically even Panasonic performance across the frame ignoring variable light and backlight. The colours in this strong light are excellent, as is sharpness, contrast and detail – that resolution again feeds into depth of field. For a fixed lens camera, DoF is monstrous. When it comes to motion blur, looking at camera 2, which is installed at right angles to the lens, I can see there’s still some blur with faster moving vehicles but I don’t see it with the cameras viewing the road from an oblique angle.

further in on camera 2, the resolution starts to show its face. I can drill in across the road and get detail of the motorcycle parked over there at least 20 metres from the lens. Camera 1, which has stayed in colour, is delivering a bright colour image. There’s some rocket tailing of the high-resolution video stream with fast moving cars – 35-40kmph – moving between light and dark areas but with pedestrians, performance is strong. The resolution comes to the fore – I’m able to wind the camera views in digitally and get details of people on the street – gender, hair, clothing, actions. It turns out to be a quiet night when I get back to the office to test – the closest pedestrian is 20 metres or more away and facing in the opposite direction. Something that’s telling is that I don’t realise I recorded them until reviewing the images. The huge coverage of this camera is a bit like that. When investigating, you need to examine 4 high resolution streams and chances are you recorded much more than you thought. When a car goes by moving fast I find that while I don’t get plates (CCTV cameras almost never can get plates at night), I do get make and model, colour and distinguishing features. The resolution feeds into the levels of detail that are available. With a 1080p camera, as you wind in the digital zoom you might isolate areas of interest, but you never increase the levels of detail. With a 4K camera on a 1080p monitor (bear in mind the quad is displaying at less than full HD resolution), you

You don’t miss much with 4 x 4K

26 se&n

SEM1018_20pana_2.indd 26

28/9/18 1:18 pm


SEM1018_27.indd 1

27/9/18 2:19 pm


● Product review

Panasonic

CONCLUSION So, can the Panasonic WV-X8570N 4 x 4K really see and record everything out to 30 metres, all the time? In good light and with very strong backlight, yes it can, and it performs the task well, with strong colour rendition, excellent resolution and depth of field, and solid management of backlight. The bitrate is a weird thing when you’re zoomed on a portion of a scene. When there’s nothing going on it drops right off – I mean right off – down to 21 kbps. That’s something we’ve never, ever seen before and it suggests that Panasonic’s engineers are doing spooky things in firmware. Whatever caching might be going on, there’s no real sense of it. When something moves in the scene, the camera spins up with no hesitation whatever. In lower light levels, the camera heads more explicitly show that they work independently. They’ll stay in colour, or go over into night mode as required by their angle of view. Night performance unassisted in colour and monochrome is bright, with good colour rendition. Shutter speed definitely comes off at night – I’m at default 1/25th at the bottom end – that means there’s some blur of traffic but it’s much less evident with cyclists and pedestrians and I’m getting strong detail deep into the scene, where that powerful resolution across 4 cameras really delivers. n

FEATURES OF THE PANASONIC WV-X8570N 4 X 4K CAMERA INCLUDE:

l 4 x 4K high resolution(33MP) 3840 x 2160 15fps per sensor l H.265 compression combined with Smart Coding technology l

Wide range tilt angle adjustment mechanism

l

4 repositionable lenses to minimize blind spots

l

NEMA 4X, IP66 and IK10 ratings

l

ClearSight coatings.

28 se&n

SEM1018_20pana_2.indd 28

28/9/18 1:18 pm


hanwha-security.com

Ensures Clear Visibility

Wisenet Q Flateye IR Dome Cameras Wisenet Q 2M & 4M flateye dome cameras uses a flat window glass lens that doesn’t require a dome cover. The cameras are ready to solve the existing problems of the conventional dome cameras such as IR diffused reflection or moisture problem caused by temperature differences. It can even reduce the problem of the view being obscured by external contamination and save the labor costs since there is no need to remove and mount a dome cover. Ensure clear visibility with the Wisenet flateye dome cameras under any conditions. • Max 2Megapixel & 4Megapixel resolution • 3.2~10mm (3.1x) motorized varifocal lens • WiseStream, True WDR (120dB) • Tampering, Motion detection, Defocus detection • IR Viewable length 30m • Flat window glass lens without dome cover

www.eos.com.au

SEM1018_29.indd 1

27/9/18 2:30 pm


● Regulars

The Interview

Converging strategies In this month’s interview, Dean Monaghan talks to SEN editor John Adams about the acquisition of Integrators Australia by Convergint Technologies and his plans for the future.

JA: Convergint Technologies acquired Integrators Australia a couple of months ago – how has the transition process of acquisition gone so far – what has changed for the team and what has remained the same? DM: Convergint is very experienced with ensuring the process goes smoothly, and we have worked diligently together so that no interruption in service has occurred for our customers. As a result, not a lot has changed in our day-today; it’s been business as usual. JA: Will Integrators Australia retain its name and management structure or move under the Convergint Technologies’ banner? DM: Our new ANZ locations have been branded Convergint Technologies from their onset, while our main Victorian operation is looking forward to transitioning its branding in the coming months. Aside from branding, the Integrators Australia entity and management structure will remain unchanged. JA: Was Convergint active in the ANZ market prior to the acquisition – have the local operations combined? DM: Convergint’s APAC business, ICD Security Solutions, is a powerhouse in Asia, and they have done a fantastic job in delivering services to our global clients present in ANZ. We have been working with them since integration to service both global and local customers. JA: What’s the general plan for

Convergint Technologies in Australia, New Zealand and in the region? Where would you like to see the business positioned? DM: Our plan is to continue to grow the Convergint business throughout ANZ both organically and via further acquisition. The vision is for us to eventually be as strong in every major city as we are in Melbourne. JA: What geographical area will you be covering – will you be looking at a wider market – SE Asia, the Pacific, India? DM: We cover the Oceania region, but we also work closely with the rest of the APAC team, which is led out of China. India is a rapidly growing market for us, with a team of more than 70 colleagues located there. JA: There’s a lot of heat around electronic security technology now. Which new technologies are of most interest to your clients – what are you and the team focussing your collective attention on getting across? DM: The size and scope of Convergint has presented some fantastic opportunities for us to work with new vendors who are on the cutting edge of technology. AIbased video analytics and its applications are of interest within the market now, so we have been exploring that technology. JA: Integration has gone from being the bleeding edge of the electronic security business to something that serious end users are demanding in order to meet operational requirements and enhance

efficiencies – but there are still plenty of challenges. What’s hardest about effective security integration, in your experience? DM: Effective security integration relies on an excellent user experience. I find that partners tend to work hard to release feature-rich products, but it can occasionally come at the expense of the experience layer. JA: You founded Integrators Australia back in 2005 to give end users a higher standard of service than the majors provided at the time – contracts they could opt out of if they weren’t happy – it was revolutionary stuff. This created a powerful customer-centric culture at Integrators Australia – will this same service standard apply moving forward? DM: Convergint’s values and beliefs have been in place since their foundation, and the first one states: “We expect to be our customers’ best service provider”. Service is central to Convergint’s value proposition, and this aligns perfectly with our own culture. Service excellence is what we work towards each day. JA: What about your own future, Dean? Can you see yourself staying on in the new business? DM: I have always really enjoyed my role in the business, and since the acquisition, this is even more true. Convergint brings a wealth of knowledge, as well as the capital we need to grow, so I can’t imagine working anywhere else. JA: How do you feel personally, having sold the business, Dean? It’s been your baby for a long time. You must have mixed feelings about passing on the baton - as well as a strong feeling that there’s greater potential for expanding the business to deliver clients the best possible solutions? DM: I’m very proud that IA was selected as Convergint’s entry into the local market. The possibilities to grow this business and the opportunities for our colleagues are virtually limitless, and we’re more motivated than ever to set a new benchmark for service. JA: What did 13 years growing one of Australia’s most successful privately-

30 se&n

SEM1018_30interview.indd 30

27/9/18 3:50 pm


DE AN MONAGHAN WITH JOHN ADAMS

owned electronic security integrators teach you – what advice would you give the young techs coming through? DM: I had no formal business training prior to forming Integrators Australia, so I did a lot of learning as I went along. I always give the same advice with respect to the business in general – don’t run a business for profit, run it to serve 2 things: The happiest colleagues, and the most satisfied clients. I can assure young techs that profit will result if you achieve these 2 goals. JA: Convergint Technologies has a broad base – electronic security, fire alarms, life safety systems – will we see this wider services suite flowing through in support of local customers?

SERVICE IS CENTRAL TO CONVERGINT’S VALUE PROPOSITION, AND THIS ALIGNS PERFECTLY WITH OUR OWN CULTURE. SERVICE EXCELLENCE IS WHAT WE WORK TOWARDS EACH DAY. DM: Our approach has always been to sell wider and deeper into our existing client base, and this is an avenue we will continue to pursue. Conversely, we now have an IT skillset within our local CTC that we are looking forward to sharing with our colleagues across the globe. JA: Convergint Technologies is growing fast through acquisition – it must be one of the fastest growing integrators in the

world – in what ways does this global reach enhance the local operation’s ability to service customers in Australia, NZ and the elsewhere? DM: Convergint recognises the importance of maintaining a healthy mix of local business and global accounts. We think we have the model right, which is why our portfolio of global clients is growing so strongly. JA: What message would the new Convergint business like to give the ANZ market? DM: Convergint supports our focus on the ANZ market unequivocally, and we are very much looking forward to leveraging our global partnership to reach our mutual goal of being our customers’ best service provider. n

se&n 31

SEM1018_30interview.indd 31

27/9/18 3:50 pm


● Case study

RMIT

RMIT REACHES FOR INFINITI ROYAL Melbourne Institute of Technology (RMIT) has selected the Inner Range Infiniti platform as the heart of its 3000-door electronic security upgrade – Integrators Australia has been selected to deliver the solution. MIT’S access control demands are considerable – there around 5000 academic staff and 83,000 students and the campus has around 90 buildings, many in the Melbourne CBD, as well as branch campuses in Asia and Europe. “Being able to work so closely with RMIT has been a real privilege,” said Inner Range’s CEO, Peter Krincevski. “Like any evaluation or sales process, we were just one vendor in the mix. One of the key items that appealed to RMIT was Inner Range’s ability to provide local support and local engineering. What struck me was RMIT’s commitment to this project, especially their meticulous analysis of the various technical and commercial abilities of each vendor and their confidence deciding to move forward. “You might imagine this process taking years, but the time from initial discussions to a signed contract was only about 6-7 months. This has represented real cost savings to RMIT. Inner Range will continue to play a key role in this project with support and professional services offered to both RMIT and Integrators Australia.” According to Rusty Blake, business development manager at Inner Range, the technical side of the project is vast. “The scale of the project is enormous,” Blake said. “RMIT has over 130 buildings, 3000 access control doors and thousands of zone inputs, and Infiniti will also be the single overarching security management system supporting concurrent high-level interfaces with Avigilon (CCTV), Jacques (intercoms), 60x Building Management Systems (BACnet/IP), Traka (KeyLocker), Active Directory and HID (Bluetooth card readers). “An open REST/XML API within Infiniti will allow RMIT to write a custom interface and tailor the Infiniti software to suit their specific requirements. Another key attribute that Infiniti offers in comparison to most of our competitors is that Infiniti’s hybrid architecture can be both deep with a large RS-485 cabling infrastructure, as well as flat with support

R

WE ARE ALL BENEFITING FROM A CLOSE AND OPEN PARTNERSHIP THAT MITIGATES RISK AND REDUCES INSTALLATION COSTS AND TIME.

for thousands of IP-based door controllers. In the case of RMIT and their extensive RS-485 cabling infrastructure, Infiniti is the obvious choice; being able to reuse their RS-485 cabling has likely saved them millions of dollars.” Key university staff are also pleased with the expediency of the process. “We are all benefiting from a close and open partnership that mitigates risk and reduces installation costs and time,” said RMIT security manager, Russell Lightfoot. “Integrators Australia and Inner Range have proven their support and we are excited to be deploying the Infiniti platform.” Founded in 1887, the RMIT’s city campus began as the Working Men’s College of Melbourne. Its original building is on the corner of Bowen Street and La Trobe Street, and the campus has since grown to 87 buildings. Making access control more vital, the campus has no perimeter walls – its buildings are contiguous with the surrounding city. Most of buildings are spread across 6 city blocks covering approximately 720,000 square metres bounded by La Trobe Street to the south, Elizabeth Street to the south-east and Swanston Street to the north-east (connected by Franklin Street), Queensberry Street to the north, Lygon Street to the north-west and Russell Street to the south-west. In the leadup to the contract win by Inner Range and Integrators Australia, RMIT said it intended to replace and/or upgrade its existing electronic access control system with a new solution, as well as a warranty and maintenance regime that presented security and value for money to RMIT. The video surveillance solution at RMIT is Avigilon. n

32 se&n

SEM1018_32rmit.indd 32

27/9/18 3:56 pm


Smart Solutions. Smart Connectivity. Smart Networks.

SEM1018_33.indd 1

27/9/18 3:55 pm


● News report

FHD

FHDISTRIBUTION: NUMBER 3 IN 2 YEARS? FHDistribution has launched in Australia as a manufacturers’ representative of a selection of international manufacturers it will provide to a boutique group of local distributors. HEN you run your mind’s eye over the electronic security distribution market the first thing that occurs to you is that it’s mature, competitive and that success in the future is likely to come down to thinking out of the box and perfect targeting of unexplored areas. That makes it hard to conceptualise how a new distribution player could grow hard enough to hit the top 3 in a couple of years without acquisition. But according to Ilya Malkin general manager FHDistribution, there are areas in the market that will reward hard work and quality relationships - supplying products to a group of key local distributors in each state which then sell to installers and integrators. “FHDistribution is a manufacturers’ representative – it represents overseas manufacturers in Australia,” Malkin explains. “FHD will manage distribution locally with full support of the brands we carry. We will not have too many distributors – the idea is that the brands be exclusive enough so that everyone does not carry them to the point the only way integrators can differentiate themselves is to drop prices.” According to Malkin, there are big traditional wholesalers in the market and they can import products and convert them for the ANZ market but it’s harder for smaller companies. “There are boutique distributors which don’t have a national footprint and while they give excellent service at the local level, their smaller size means they can struggle with product management, and importing can get complicated for them as well,” Malkin explains. “A company like FHDistribution fills the gap. We can offer these smaller distribution companies a great product range across multiple market segments at competitive prices, while not competing in the same space as distributors because we don’t sell directly to integrators. Meanwhile, distributors can be certain we will not flood the market and drive down prices.” The product ranges being managed by FHD include the sole distribution of TVT, as well as Folksafe (CCTV accessories) and Vesta alarms and

W

Ilya Malkin

WE CAN OFFER THESE SMALLER DISTRIBUTION COMPANIES A GREAT PRODUCT RANGE ACROSS MULTIPLE MARKET SEGMENTS AT COMPETITIVE PRICES...

automation products. There’s also access control and other peripherals, with further brands subject to negotiation. “TVT has been in market since 2004 and has a lot of knowledge – they did not start manufacturing CCTV gear 5 minutes ago – TVT started out building cameras and NVRs as an OEM, however, the company is now focusing on doing more of its own branding,” Malkin said. “It’s a competitive range – 5MP cameras, 4K NVRs and cameras range, 5MP HD analogue – the mobile app is great, too. Very easy to use and nicely designed. “Best of all, installers can use the TVT product and it will be extremely competitively priced compared to the competition and you will be offering a different solution that uses all the latest technology – H.265, analytics, face recognition built into NVRs, a great GUI that combines a “Windows-like” look with Linux stability, simple remote access configuration with QR code scanning – we have a local server in Sydney that handles remote access. The iPhone and Android app is state of the art, extremely responsive, easy to operate, timeline in playback view, backup of critical footage to the phone storage.” As well as Folksafe video accessories range, FHD also offers alarms and automation. “Our alarm system is called Vesta – a modern alarm panel with IP and 4G backup, video verification of alarm events, and it comes with home automation built in. We offer a range of ZigBee devices as well,” Malkin explains. “Vesta will soon be integrated with Alexa and Google Home – that means customers will be able to control the system using voice. Vesta also has self-monitoring via our own server here in Australia. Vesta is another company has a long history in the field, so it’s a reliable and well-designed system with 24 months of warranty. “Visual verification and self-monitoring are important for some home owners, even if they also use professional monitoring as it gives them the power to manage the system. With Vesta, everything is wireless - the range is up to 2000 metres, which makes it one of the best and most stable in the world. Programming is very easy and can also be handled using a web interface. Rounding out the current range, we have gate access control systems: Bluetooth, 3G, Long Range RFID; all solutions are driven by an app on a mobile device and can use a remote. “We’ve had a very positive response from distributors, so we know we will be offering a real alternative,” Malkin said. “Our intention is to incubate a group of excellent brands, support boutique distributors, grow our presence and make FHD number 3 in the market place within 2 years.” n

34 se&n

SEM1018_34fhd.indd 34

27/9/18 3:59 pm


Open platform. Complete flexibility. Exclusive to Hills Facility and security management in a single interface • • • •

Easy-to-manage menu structure Integrated software platform that provides a multi-user solution Interface to key business functions such as CCTV, intrusion and access control Industry-leading third party integrations (visit the website for a list of integrations)

Learn more at tecomc4.com.au and request a demonstration today.

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security. © 2018 United Technologies Corporation, Inc. All rights reserved.

TecomC4Ad_Feb2018.indd 1 SEM1018_35.indd 1

29/01/2018 7:22 pm am 27/9/18 3:54


● Special report

Acess control

THIS IS THE ENTERPRISE Enterprise access control solutions deliver end users an elevated level of capability, allowing users to apply policy enforcement to business risk and to secure physical and IP assets to a global standard. The ability to manage staff access globally, to track staff and assets, can mean easier integration and reduced operating costs. However, enterprise access control is not for the faint hearted. It’s a process that requires careful planning and execution.

NTERPRISE access control is a wonderful concept. The ability to manage staff and assets globally puts considerable power into the hands of managers – the expanded capabilities of the latest access control and security management solutions only make this power greater. But the notion of enterprise access control and the application are very different things. It can be challenging to get your head around the topology of an enterprise solution, let alone system design and the nature of programming. According to Daniel Joubert at Inner Range enterprise access control systems differ, significantly from site to site. “They will generally be IP based systems that are modular and scalable,” Joubert explains. “Enterprise sites that span multiple geographic locations require an IP-centric architecture for the

E

36 se&n

SEM1018_36access.indd 36

27/9/18 3:58 pm


BY J O H N A D A M S

deployment of controllers and their connection to the head-end software. Over time, enterprise sites can significantly increase in dimensions, a modular platform is easily able to scale to accommodate any size enterprise site. “When compared to multiple single-site installations an enterprise system reduces the operator training costs, improves situational awareness and reduces the ongoing cost of maintenance and site administration,” he explains. “An enterprise access control system, such as Integriti, offers a single unified front end that works as an aggregation point for all the sites sub-systems. “Enterprise systems offer significantly better integration to other systems such as CCTV, building management, active directory and visitor management, just to name a few.” According to Joubert, the key selection considerations when it comes to enterprise access control depend on the application, to considerable extent. “No two enterprise sites have the same requirements, in some cases, the true requirements of a site are unknown until the solution is in use,” he says. “When selecting an enterprise access control solution, it is essential that the system is agile and scalable to accommodate a diverse range of installations. For instance, our Integriti solution provides the flexibility for deployment in large or small buildings on sites that are in close proximity or span the globe.

ENTERPRISE SYSTEMS OFFER SIGNIFICANTLY BETTER INTEGRATION TO OTHER SYSTEMS SUCH AS CCTV, BUILDING MANAGEMENT, ACTIVE DIRECTORY AND VISITOR MANAGEMENT.

“Importantly, the Integriti platform was designed to allow easy upgrades of both legacy Inner Range products and other manufacturer’s systems. Integriti offers a cost-effective replacement path for Inner Range’s legacy products due to its comprehensive backwards compatibility. Integriti is also able to replace third-party systems while using existing cards, readers and door hardware. Additionally, Integriti supports any end of line configuration allowing existing detection devices to be used and reducing the overall cost of an upgrade. “Integriti’s deployment architecture supports both a flat distributed IP based deployment or a deep RS485 LAN based topology. This versatile architecture provides the best of both worlds making Integriti the ideal choice for replacing localised systems while leveraging the sites existing topology.” Joubert says features integrators should be looking for to assist with installations are those that simplify the process and enhance support. “Integrators require features that simplify installations and ultimately reduce commissioning time,” he says. “Handy features such as the autodiscovery of hardware and peripheral devices or module beepers to locate physical hardware can have a beneficial impact on an installation. “Integriti’s flat IP-based or deep RS485 LAN deployments allow installers to leverage existing architecture and provide the flexibility to overcome installation hurdles. No installation will be completed without issues, a system that is backed with skilled and responsive technical support is often the most valued feature for the integrator.” When it comes to enterprise applications, the real heavy lifting of the system over many years is going to be done by the end user and its security or

se&n 37

SEM1018_36access.indd 37

27/9/18 3:58 pm


● Special report

Acess control

AN ENTERPRISE SYSTEM THAT CAN COMBINE ALL OF A SITE’S BESPOKE SYSTEMS INTO A SIMPLE INTUITIVE DASHBOARD WILL SIGNIFICANTLY REDUCE OPERATOR TRAINING AND THE TOTAL COST OF OWNERSHIP. facilities management staff. That means potential customers need to carefully consider feature sets to ensure they get exactly what they need. According to Joubert, end users should insist on a system that is easy to use above any specific feature. “An easy to use system empowers end users to take control of the management of their site,” he says. “An enterprise system that can combine all of a site’s bespoke systems into a simple intuitive dashboard will significantly reduce operator training and the total cost of ownership. “Additionally, a system that can be tailored to the experience level and capabilities of the operator will assist in site management. Restricting what an operator can see and how they can interact with the system will reduce much of the risk associated with human error. Operators will inevitably make a mistake and when this happens a full audit trail of every programming change. This allows unwanted changes to be easily reverted.” The most challenging aspects of installing an enterprise access control system involve planning, says Joubert. “Due to the scale of an enterprise access control system, often the most challenging aspect of installation is planning,” he says. “Installers need a system that is agile and flexible that can be used to resolve, rather than create problems. The physical deployment of the access control modules and door hardware is always a challenge since the integrator is restricted by the products deployment topology. Integriti easily overcomes this challenge with flat or deep topology and flexible deployment options including wireless door hardware and detection devices.” Something users need to consider is how much more important the security management system is in an enterprise application and they’ll also need come to decisions on mobile management, as well as global credential choice. “The importance of security management is largely determined by the site, however, an integrated intruder detection and access control system provides a platform to build solutions based on the unique needs of sites,” says Joubert. “An integrated system also provides the operator with complete visibility of the entire site and all the sites subsystems. This visibility improves response times when dealing with critical events such as duress alarms while providing the ability to control doors and lockdown a site.” Integrating enterprise solutions with subsystems such as CCTV and visitor management is

challenging with enterprise solutions, and integrators and end users need to be across the general process, as well as establishing the pitfalls of managing this process globally. “It is not only possible but expected for enterprise solutions to provide integrations to many subsystems,” says Joubert. “End users expect enterprise systems to do more than just simple access control. For example, integration between access control and building management lower the running cost of buildings by tracking room occupancy. One pitfall of an integrated enterprise solution is access to support from multiple manufacturers, especially when a manufacturer is not located in the same time zone.” Over at Alarmcorp, technical director, Jeff Rushton, explains that components of a global access control solution can vary. But he says that for the Vanderbilt SiPass, a basic system requires a server to run the management software, and the client gains access to the system through remote workstations via a thick client or web browser. “The network consists of a number of advanced central controllers (ACC’s), which store all of the site’s information and event history,” Rushton says. “Each ACC can control anywhere from 1 to 96 doors and the card readers can be any technology, in fact multiple card technologies can be assigned to the same cardholder. The client’s other connected systems, including payroll, lifts, CCTV, intercoms, etc, can be connected to SiPass via Ethernet or serial. According to Rushton, in its most basic form, the obvious advantage of enterprise access control is global management of sites and cardholders.

38 se&n

SEM1018_36access.indd 38

27/9/18 3:58 pm


COLOGNE CATHEDRAL SQUARE

DallmeierPanomera_allgemein_A4_C.R.-Kennedy.indd 1 SEM1018_39.indd 1

30.08.2018 27/9/1809:19:12 3:54 pm


● Special report

Acess control

“Many global organisations now standardise on an enterprise platform that has worldwide acceptance, they can then have the system installed and supported locally, but the overall control and reporting is done via the company’s headquarters,” he explains. Rushton’s key selection considerations when it comes to enterprise access control include multiple reference sites, similar in size and complexity to the proposed project; as well as the flexibility and openness to integrate to other platforms to either control or take control of your system. “Level of security is important, too,” he says. “It’s imperative that the correct card/reader technology is chosen to facilitate a smooth migration from current to future technologies. And the selection of integration partners is paramount - they need to be chosen wisely to ensure the highest level of technical competence is held within the organisation.” When it comes to upgrading an existing local solution to an enterprise solution, Rushton says anything can be upgraded and he points out that time and cost are the deciding points. “For most existing local solutions, the only

“IT’S IMPERATIVE THAT THE CORRECT CARD/READER TECHNOLOGY IS CHOSEN TO FACILITATE A SMOOTH MIGRATION FROM CURRENT TO FUTURE TECHNOLOGIES. component that would remain would typically be the cards and readers, pretty much all other hardware would be replaced,” he says. “In saying that, if the reader technology is old, then an upgrade should include replacing this hardware as well. In our case, the migration from an old Vanderbilt Sipass system to the latest Vanderbilt SiPass MP2.75 system can be done with minimal hardware changes.” When it comes to features important to installers and integrators, Rushton argues the simplest tools can be the best. “One key example with the Vanderbilt SiPass solution is that PCB’s have multi-coloured LED’s on board to show the status of key processes, from communication right through to the state of every relay and input,” he explains. “This allows the integrator to easily identify the state of the entire system, reducing installation and service times. The SiPass system also has a number of reports and live status feeds that can be utilised to diagnose any fault. “Frankly, the installation process is typically the easiest part of the work. The most challenging component is the interpretation of the end users’ requirements, understanding their work processes and ensuring the system is programmed with the flexibility to encompass those processes. The introduction of an enterprise access system should not hinder the current operation of a business. For medium to high end complex systems, it’s important to create a flow chart with the customer, develop the forms and paper trail that is required and ensure that these are completed and submitted, well before the hardware installation. “For end users meanwhile, key features include complete offline access with all data being held outside the main server and the ability to store and manage multiple card technologies for a single user is important. Ongoing security is critical, so the ability to restrict login access down to a floor or department ensures only approved staff have access to sensitive information. More broadly, the system needs to be open and flexible to connect to a variety of thirdparty systems.” Rushton is not convinced by mobile management of enterprise solutions. “Let’s assume in an enterprise application, we have manpower constantly operating the system, monitoring access and alarm conditions (which should be the case in 100 per cent of installations),” he explains. “In such a case, I don’t believe mobile management is required, as all instructions are relayed via control room staff. The SMS is required

40 se&n

SEM1018_36access.indd 40

27/9/18 3:58 pm


Secured Entry, Simplified H4 Video Intercom

The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom featuring exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing, and two-way communication with visitors.

Remote Entry Control Using Avigilon Control Center (ACC) software, operators can receive, review and respond to intercom requests, and remotely grant access. Avigilon Appearance Search™ Technology Incorporates the unique characteristics of a person’s face to search for the same individual even if items such as their clothing change over time. LightCatcher™ and Infrared Technologies Provides clear image detail in a broad range of challenging lighting conditions, including nighttime. Vandal- and Tamper-Resistant Housing Aluminum construction provides reliable strength and durability in both surface and flush mount models.

avigilon.com/h4-video-intercom | asksales@avigilon.com

© 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, AVIGILON APPEARANCE SEARCH and LIGHTCATCHER are trademarks of Avigilon Corporation.

SEM1018_41.indd 1

27/9/18 3:54 pm


● Special report

Acess control

to be able to supress an alarm, only when a series of programmed checks occur to satisfy the alarm status. The programming of alarm points needs to ensure only actionable events are displayed to an operator with clear instructions and a list of actions required for this event. The resolution process should include the operator logging the procedure and response as well as attaching any supporting information to the entry. Integrating sub-systems is one of the big challenges of enterprise solutions and Rushton says multiple levels of integration must be available. “Most integrations require a third party to write the interface between the two systems and test the operation,” he explains. “For example, a large organisation might use a human resources platform to start and terminate staff. Without an HLI, the HR staff might be required to send employee details to the security department to have them manually enter or change employee access details. “However, with a full integration between the portals, the HR staff could simply select the department and the start/stop dates of employment and they could then issue a card to the employee as part of their induction process, this would save a significant amount of time a greatly reduce any errors. There are 2 main pitfalls to third-party interfaces: 1) The level of demarcation, if there is a fault whose problem is it? The security integrator, the HR system, or the interface between them? 2)The second issue relates to software revisions. Once an interface is written and tested, any changes to the software to the HR or security system may cause the interface to cease working, and this would require the interface to be rewritten. Another consideration of any enterprise solution is selection of proprietary or open systems, taking into account which offers best integration and SDK support. “Both types of systems have a place, and manufacturers of both will tell you why their system architecture is better,” Rushton explains. “Open systems include a variety of SDKs or other open protocols, and the process to connect third party products is a relatively simply one. As mentioned earlier the ability to integrate is paramount. If the SDKs are supplied with full documentation from the manufacturer then the need for them to offer whole-hearted support will be greatly reduced. For proprietary systems SDKs are not generally available and the entire integration process is controlled by the manufacturer, with the end user having limited input over competitive pricing and delivery timelines.” According to Hikvision, the main components of an enterprise access control solution are central management server, controllers, card readers, locks, exit buttons, etc, and the key selection considerations of the system are system stability and security. Important features for installers are ease of

set up, good functionalities for different scenarios and excellent post-sales support. Meanwhile, users need ease of operation, system security, system stability and ease of expansion. “When it comes to advantages compared to multiple single-site installations, enterprise access control is managed by a central server,” says Hikvision. “This means the system can monitor all the door status and search logs in the entire system. An enterprise access control system is also much easier to operate, expand, and integrate. “It is possible to upgrade an existing local solution - generally you need to replace multiple single-site devices with enterprise access controllers and create a new database for the whole system. Challenges are like to include things like setting up a perfect database with all user information, alarm linkages and access levels.” Hikvision says it has integrated its access control with CCTV and visitor management. “The general process for the integration with CCTV would be popping up the video clip when there is an access control event that needs to be monitored and reported. The network lag and visit card recycling are always pitfalls. We see that open systems are popular in the market and better integration capability develops a bigger market for enterprise access control.” n

42 se&n

SEM1018_36access.indd 42

27/9/18 3:58 pm


hanwha-security.com

Protection against corrosive elements

Wisenet X Stainless Steel Cameras Compared to conventional materials for surveillance camera housings, stainless steel is more resistant to corrosion in acids and chlorine environments or fire and heat. Wisenet X stainless steel cameras adopted 316L austenitic stainless steel with high toughness, which provides not only long term value by preventing rapid deterioration and premature replacement, also hygiene conditions and aesthetic appearance. Use the stainless steel cameras in special applications such as marine, mining, oil & gas, food processing plant, which are hard to keep watching with human eyes.

· Max. 5Megapixel & 2Megapixel resolution · Max. 60fps & 150dB at 2M, 30fps & 120dB at 5M · Improved bandwidth by WiseStream II · Enhanced video and audio analytics · Stainless steel 316L enclosure

www.eos.com.au

SEM1018_43.indd 1

27/9/18 3:54 pm


● Special report

IP

SECURING IP CAMERAS No electronic security device with an exposed network port can be considered secure without the considered application of network security policy. In this feature, Brendan White of Mobotix, explains threats and strategies for installers, integrators and end users. CCORDING to Brendan White of Mobotix, the greatest vulnerabilities of network devices are unauthorised access and backdooring of undefended security systems but there are plenty of things installers, integrators and end users can do to enhance the security level of their surveillance systems. “By opening a port for the network device to communicate through (over the internet) via port forwarding, most people don’t realise they are essentially opening a 2-way door unless the individual is versed in networking and knows to only allow specific connections to and from the devices in question,” White explains. “For example, if I port forward a generic camera on the following IP Address: 123.456.789.012:8080 (with Port 8080 for

A

IF YOU GOOGLE ‘PUBLIC CCTV CAMERAS’ YOU WILL GET DIRECTED TO WEBSITES SUCH AS INSECAM THAT HAVE WEB CRAWLERS RUNNING IN THE BACKGROUND.

transmissions over the wider internet) and anyone were to ever type this address into their web browser, they could access the camera. “In addition, even if attackers don’t have your user login, just stumbling across your camera’s login page they will be able to execute brute force attacks. These are programs scripted to sequentially test different username and password combinations against anything that is hosting a login domain, whether it be HTTP-based (web page) or software-based. If the infiltrator is also able to figure out what your camera model is, they can assume you are using the DEFAULT USERNAME and can then leave a computer running 24/7 to brute force your camera. This would only be a matter of time, provided they know where to start.” White says that most integrators leave their cameras communicating over the wider internet using HTTP instead of HTTPS – that’s a big no-no. “The only thing you need to know here is that the ‘s’ in HTTPS stands for SECURED,” White says. “Let’s look at an example. Say you access your camera’s login page at 123.456.789.012:8080. An experienced infiltrator (if/when they gain access to your network or router) can initiate a man-in-the-middle attack. When the camera asks you (through the web browser) for a username and password, the HTTP protocol sends this information in raw text. The man-in-the-middle attack allows the infiltrator to sniff these packets of data that you are sending. They will then automatically send the information forward to your intended destination and could do this for weeks, even months siphoning all information you may be using such as banking, dropbox login credentials, camera logins, etc. “What are the chances that someone is going to find my camera’s public IP address and guess the correct port you ask?”, says White. “But can you really say that you are allowed to take this risk on behalf of any of your customers? By adding in networking devices with port-forwarding you are opening up vulnerabilities in the customer’s network. For this reason, we always urge installers to ensure proper protocols are followed and to adhere to the advice of the site’s network administrator as they are aware of the vulnerabilities in networking in general.” There are other risks, too. “If you Google ‘public cctv cameras’ you will get directed to websites such as Insecam that have web crawlers running in the background,” says White. “Have you ever wondered how Google is able to index every website there is on the world-wide web? If you were to purchase a website domain, I can guarantee within a few weeks or a month, your website will be visible via Google Search. Try googling your full name and be shocked at how social media platforms such as Facebook are open to web crawlers – this is an incredible vulnerability and identity issue. You can search the name of a person who uses Facebook, and you can essentially find their Date of Birth, spouse’s full name, etc. “In saying all this, you might think: “Well, why would we want to put any camera over the internet?

44 se&n

SEM1018_44ip.indd 44

27/9/18 3:56 pm


Network security breaches can cost dearly. When it comes to data security, we take no shortcuts. au.boschsecurity.com With Bosch video security systems, you couldn’t be more secure. We achieve the highest standards of data security with an approach that considers the entire video security infrastructure: ▶

Every Bosch camera features a built-in Trusted Platform Module for PKI authentication and data encryption

Only secured connections are supported

Password use is enforced at setup

Unsecured ports for automatic discovery are disabled

Unsecured remote communication is disabled

Uploading of third party software is disabled

Firmware updates are allowed only from Bosch signed files Can your organisation afford to use anything less secure? Find out more about our data security measures.

Rethink security. Rethink total cost of ownership. Ph 13000 BOSCH (26724) or email stsales@au.bosch.com.

End-to-end security

Cameras

Data Security_TCO_ad_Oct2018.indd 1 SEM1018_45.indd 1

Storage Devices

Network Communications

PKI

26/09/2018 10:31:19 AMpm 27/9/18 3:54


● Special report

IP

SUBNETS DO NOT STOP NETWORK SCANNERS FROM FINDING YOUR NETWORK DEVICES, SO INFILTRATORS CAN STILL IDENTIFY YOUR NETWORK DEVICES...

It depends on the security capability of the camera. What’s vital is working with manufacturers who value network security. Cameras (and any other networked connected devices must be able to: l Disable web crawler browsing (By blocking common ports/addresses that signatures identify as ‘web crawlers’) l Disable HTTP communication and only allow HTTPS connections (So data sent between any PC and your camera is always encrypted and unreadable by any 3rd parties that may be listening in between) l IP address filtering: Only enable specific network devices to have communications with the camera. For example, you could make it so that in an office environment, only the boss’ laptop and the on-site CCTV computer can initiate connections to the camera. The camera will automatically refuse any connections from foreign network cards that you have not allowed in its whitelist. In terms of the wider internet, it can automatically refuse connections from outside network connections without needing to know who the intruder is l Intrusion detection – after a specified number of invalid login attempts, you can tell the camera to block the IP address of the infiltrator as soon as (For example) 3 incorrect logins are registered and consequently can send the owner or network administrator an email to alert staff of the attempted intrusion. l Certify any recordings made by a camera via X.509 Certificate Signing (a 2048-bit AES public key cryptography encryption which is part of the highest level of encryption in the networking standard) to authenticate that video footage was produced by a specific camera without any modification to the footage allowing camera footage to be officially authenticated in court and legal proceedings, if required. Mobotix cameras offer all these network security capabilities. According to White, the single most important thing installers and integrators can do to ensure their customer’s networked security solutions remain secure are to change the username and password of the network device on the local network and, if the device is exposed to the internet, deploy IP address filtering with white list to only allow authorised addresses. In White’s opinion, password management can be as important as passwords themselves. “Password management defines who has access

to these passwords as well as the way these passwords are stored,” he explains. “Password application refers to the complexity of passwords and how those passwords are transmitted to the network device (via HTTP, etc). One is just as important as the other and your network security is only as good as your weakest link.” When it comes to setting up a VLAN, White says the configuration and complexity is dependent on the network switch (Typically Layer 3). “Generally, you would create a VLAN on your network switch then you would assign specific ports to specific VLANs,” says White. “This is generally used as a way to limit the amount of transmissions being broadcast by all devices within a network. For example, you may find that a large corporate office may have all of their SIP phones running on VLAN1 and their workstations can run on VLAN2. This way, all devices will only be able to communicate to other devices within the same VLAN, without transmitting unnecessary information to other devices and can limit hopping, which is the transmission of data through multiple devices to reach a destination. Hopping can reduce overall network bandwidth communications and prevent bottlenecking.” White says the process of blocking an IP address that makes multiple attempts to breach a password is straightforward when understood. “In general, a network device (if it offers the feature) can take note of specific IP addresses that have numerous failed login attempts,” he explains. “By default, most network devices will allow all devices to communicate with it and when a possible intrusion is detected (identified by failed login attempts), the device can add the offending IP address into a blacklist, sometimes temporary, sometimes permanent, which will outright decline any incoming communications to prevent further suspicious activity.” Something that’s a bugbear for many installers and end users is whether electronic security devices can still be secure if connected directly to the internet. And there’s also a question as to whether subnets offer an inherently higher level of security. “Installing a device on a subnet does offer some protection but only if the subnet being used is not a standard Class A (255.0.0.0), Class B (255.255.0.0) or Class C (255.255.255.0) subnet,” White explains. “Because subnets do not stop network scanners from finding your network devices, so infiltrators can still identify your network devices and may not be able to get into them right away, but if you are using a default subnet you can guarantee they’ll try the defaults and compromise your network. “To prevent this, you can change the access port of the device in question (Not 80) to add an additional layer of security. Otherwise, you may utilise firewalls via the router or switches (even VLANs help in this regard) to prevent unauthorised network discovery of your security devices.” n

46 se&n

SEM1018_44ip.indd 46

27/9/18 3:56 pm


CREATING THE FUTURE OF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support. When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.

• No “Per Seat” Licensing In System Pricing

DSX Access Systems, Inc.

• LAN/WAN Compatible

• Alarm Text Message/ E-Mail Notification

• Smart Card and Biometric Integration

• Hot Swap Redundant Communication Server

• Unlimited Access Levels Per Cardholder

• High Level Elevator Control Interface

• Integrated Photo ID Badging • Backup SQL Server

• Backwards Compatible Architecture

www.dsxinc.com

• Integrated Wireless Locksets

DSX CORPORATE HEADQUARTERS | 10731 Rockwall Road | Dallas, TX USA 75238 | 214.553.6140 | sales@dsxinc.com SEADAN SECURITY & ELECTRONICS | Unit 7, 170 Forster Road | Mt Waverley, VIC, 3149 | (03) 9263-0111 | seadanvic@seadan.com.au | www.seadan.com.au

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

SEM1018_47.indd 1

27/9/18 3:54 pm


â—? Case study

QUT

QUT PARTNERS WITH GALLAGHER Queensland University of Technology is partnering with Gallagher Security to provide safety and security, as well as facilities management, for 46,000 students and 12,000 employees across its 3 campuses.

UEENSLAND University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highlyvaluable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as its technology partner to develop and implement a seamless

Q

48 se&n

SEM1018_48qut.indd 48

27/9/18 3:59 pm


BY J O H N A D A M S

security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage its campuses and simplify operations. Key objectives of the solution are to secure multiple campuses that have open perimeters, protect staff and students and assets, ensure quick identification and response to alarms from multiple systems and to streamline cardholder administration processes. QUT utilises Gallagher technology including intelligent access control hardware and software to manage cardholder access and facility schedules. By integrating multiple systems - including emergency control points and alarms for temperature change, fire, and flooding - into Gallagher’s Command Centre platform, QUT can ensure staff quickly identify, locate, and respond to any potential risks on campus. Utilising Gallagher’s systems improves administration time and training for QUT when it comes to managing tens of thousands of cardholders. The capability to secure and manage facility access, and to immediately identify risks ensures staff, students, and visitors are remain safe and protected on campus. Facilities management is another vital aspect of the solution’s capabilities. QUT’s 3 campuses have diverse physical environments which are essentially open to the public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is in the centre of an urban retail village, residential area and high-school. “Each campus is a large open area, they’re not something you can run a fence around, and that presents challenges from a security perspective” says Adam Wilson, application services manager at QUT. “We rely on the strength of Gallagher’s advanced access control system to manage staff, student, and contractor access in and out of our facilities”. To do this, QUT has 1500 intelligent access control readers across their sites. With the readers communicating directly with Gallagher’s site management software platform, Command Centre, QUT can manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week” says Wilson. “Gallagher Command Centre is very easy to use software that gives us incredible flexibility in defining building and cardholder access schedules, as well as providing reports on how and when our facilities are being used.” The safety of students and staff is the number one priority for QUT and the university works hard to operate safe and secure campuses. Through Gallagher’s site management solution, QUT can integrate multiple systems - including emergency control points and alarms for temperature change, fire, and flooding, and feed the information in to Command Centre. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus.

EACH CAMPUS IS A LARGE OPEN AREA, THEY’RE NOT SOMETHING YOU CAN RUN A FENCE AROUND, AND THAT PRESENTS CHALLENGES FROM A SECURITY PERSPECTIVE.

“It’s important that each campus security team has a complete view of what’s happening across the site and receives information immediately on any potential risks,” says Wilson. With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to administer and manage cardholder profiles within Command Centre. “It’s imperative for us to have a system that is simple for people to learn and use - Command Centre provides that for us - for the level of technicality that it has, it’s surprisingly easy to use,” says Wilson. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. As a technology-focused university, QUT continuously reviews and implements new systems and technology as they become available. To keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing software maintenance agreement. “Gallagher’s product development continues to go from strength to strength,” says Wilson. “We’re always keen to have the latest they have to offer.” n

se&n 49

SEM1018_48qut.indd 49

27/9/18 3:59 pm


● Product review

Hikvision

HIKVISION DS-K2604 ACCESS Hikvision has released a number of economical and full-featured 2 and 4-door access control solutions, supported by a suite of devices, from keypads and biometric readers to video intercoms, which integrate seamlessly with iVMS4200. EN got a demo of the Hikvision DS-K2604 access control panel at the Video Security Products’ office in Sydney recently with VSP’s Jim Tscalos. In terms of specifications, there’s a 32-bit processor supporting up to 200,000 users and up to 600,000 events (both expanded). The system supports 8 card readers via RS485 interface and 4 readers via Wiegand interface. The controller has TCP/IP network interface and RS-485 interface, 4 lock relay outputs and 4 alarm outputs for door sensor, exit, button and tamper alarm. Working voltage is 12V DC at 1A. The controller has LEDs to show power supply

S

status, communication status and working status. Operating temperature is -20 to 65C and the controller has dimensions of 370mm long x 345mm high x 90 mm deep. As well as access controllers and readers, the Hikvision access range offers door locks, exit buttons, cards and video intercoms. Something cool is that an alarm system can be connected to the controller and activated by a triple badge of an authorised card. The DS-K2604 is a 4-reader controller but in this case, it’s been wired up with a couple of readers, including a fingerprint reader and a face recognition reader. Once the metal box is open I can see the controller board has a poly cover and all input and output terminals around the edges are clearly marked. Everything seems very familiar – 4 Weigand readers and reader and lock power across the bottom, primary power, battery (not wired up), RS-485 (bus) options on the right side, and button, sensor, E-lock and alarm-in across the top. Poking around inside the box, I can see its tidy cabling work from Tscalos, with shrink on all the connectors.

50 se&n

SEM1018_50hik.indd 50

27/9/18 4:00 pm


BY J O H N A D A M S

“I’ve got 2 reader connectors here – one for a Mifare reader and another for a Weigand,” Tscalos explains. “This panel has 4 relays to activate 4 doors and the controller has a strip for connection, which makes life simpler for the installer. Something to note about this panel is that it’s purely access control – there are no alarm inputs. This makes it ideal for sites which already have an alarm system in place. “The thing about this Hikvision access control panel is that you can incorporate cameras and manage the access control system from the IVMS4200 – this means anyone monitoring the surveillance solution can keep an eye on access control in real time. The 4-door controller has Weigand terminals, inputs, and an 8.5A power supply – this means you don’t need an external power supply for your locks – the system is powerful enough to drive all 4 locks and it can be connected to a fire system so it will failsafe. There’s also LAN connection via an integrated RJ-45 terminal – no need for an expander as well as tamper. “It’s a simple and very functional solution – the strength comes from using it with Hikvision video surveillance. When you use it that way it’s possible to set things up so that when you badge your card at a door, your face comes up on the operator’s screen – they can see the time, the reader the card was badged on, whether or not the card passed authentication – it gives the security operator extra information, allowing them to escalate response if required. “For smaller business, the integration between access control and video surveillance means that reception or a manager can have the system running on a monitor and they can keep an eye on both systems. This allows them to see all the access control events alongside video footage,” Tscalos explains. “It’s very simple to use with IVMS4200. The way the screen displays depends on the number of cameras you have installed, and you can drill down into the access control functionality.” The access control functionality within IVMS4200 is more comprehensive than you’d think. To get to it, you go across the top of the IVMS to find the access control button, click on this and up come all connected doors and you can select event types – duress alarm, card reader tamper, normal card authentication, expired card, invalid card, anti-passback, interlocking door not closed and loads more – that you want to trigger a camera. To view events, you click on the status monitor and up comes a live feed of all your events showing cardholder name, organisation, event time, door location, direction, etc. “This makes the software very handy – it gives very powerful connections between access control and video surveillance that you’d usually have to deploy a large and complex access control solution to get,” Tscalos says.

Jim Tsacalos

THE SYSTEM CAN ALSO SUPPORT VIDEO INTERCOM WITH NO ADDITIONAL SOFTWARE REQUIRED, MAKING IT A VERY FLEXIBLE SOLUTION FOR MANY APPLICATIONS.

There’s also a range of professional readers which includes advanced prox card readers with and without keypad, high security biometric fingerprint readers, standalone terminals and elevator control and, according to Tscalos, these are competitively priced as well. “They are half the price of readers from other manufacturers and the quality is high,” he says. “The system can also support video intercom with no additional software required, making it a very flexible solution for many applications. Something else that’s great with Hikvision access control is its affordable biometric readers that can use fingerprint and face recognition, making them very secure, as well as affordable.” As part of the demo, I register my face on the reader – it’s a 3-button setup, then save. Once Tscalos comes out of menu and the reader goes back to operational mode, I stand in front and boom, I’m authenticated. Enrolment was fast and easy, and the performance is flawless, even when I put myself slightly side on, the reader still recognises me. We do the fingerprint and that’s not so quick – the non-contact nature of face recognition makes it very appealing. “This 4-door system and the 2-door version you can see beside it are ideal for those customers who have moved into a premises that already has an alarm system but they decide they want to add video surveillance, access control and video intercom in an affordable package,” Tscalos says. “They don’t want to buy an integrated alarm and access control solution, they just want to handle 2-4 doors - this is the system for them.” n

se&n 51

SEM1018_50hik.indd 51

27/9/18 4:00 pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

Get Ready for 5G Disruption At CEDIA recently a roundtable led by CE Pro editor Jason Knott discussed 5G communications, describing it as network disruption, pointing out that the people most likely to be impacted and the people who stood to benefit most if properly prepared, were installers.

E’VE experienced plenty of disruption in the electronic security market over the past 5 years and now it’s time to get ready for wireless-based network disruption from 5G. According to a Cedia roundtable, security and smart home installers have 12 months to prepare themselves to take advantage of the changes. Perhaps that time-frame is a little tight but disruption there will certainly be. The International Telecommunication Union (ITU) has developed draft technical specifications for 5G which include but are not limited to 1 Gbps data rates for hotspots, 100 Mbps download and 50 Mbps upload for wide-area coverage, massive connectivity (1 million connections per square kilometre), ultralow latency (1 millisecond), high reliability (99.999 per cent for mission critical ultrareliable communications), and mobility at high speeds (up to 500 km/h). There’s no point pretending any of this will come easily but there’s no point ignoring the fact that 5G offers providers such an eyewatering business proposition there is simply no chance they will not try to leverage it – particularly in high density metro areas if it’s possible to get around the challenges that built structures pose to 5G communications. According to the roundtable, 5G is the

W

most impactful trend in home technology over the last 2 decades and smart home installers and distributors need to start thinking about its implications for IoT, content delivery and mobility. According to Frank Defilippis, integrator’s advocate at Dish Network, the company has bought $US20 billion worth of wireless spectrum over the last 20 years as it plays a long game of getting into the wireless business. According to Defilippis, there’s “nothing but opportunity,” and use cases for 5G’s various bands include low-speed, longdistance comms for such applications as agricultural controls, alongside shortrange but fast comms for driverless cars or drone networks. Something that will push 5G forward is that it’s not about a big spend. 5G radios are inexpensive with 10-year battery lives and networks can be very fast. Most importantly, Defilippis says, integrators already own the relationships that touch so many of the services enabled by 5G. “Pay attention and get ready,” he advises. Meanwhile, integrator Joe Whitaker of The Thoughtful Home described 5G as: “the most impactful trend we have seen in 20 years.” According to Whitaker, when 5G comes along, cellular wireless

technology will empower anything with a chipset and he says that considering 5G networks can support millions of devices simultaneously: “It’s not just about your cell phone being directly connected to that wide area network – it’s your watch, it’s your shoes, it’s your everything else,” he says. Whitaker insists the security and home automation industry is the only industry capable of deploying all of these endpoints and connecting them with content, devices, people and services: “We’re the conduit for all of that in the home,” he says. Meanwhile, Mark Vogel, whose

52 se&n

SEM1018_52monitor.indd 52

27/9/18 4:00 pm


Proudly brought to you by

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

IT’S NOT JUST ABOUT YOUR CELL PHONE BEING DIRECTLY CONNECTED TO THAT WIDE AREA NETWORK – IT’S YOUR WATCH, IT’S YOUR SHOES, IT’S YOUR EVERYTHING ELSE.

company Hauk Technology manufactures signal-transparent surfaces allowing satellite, 5G and other wireless signals to pass through roofs and other obstacles that might otherwise thwart these delicate radio waves, says advances there will help facilitate 5G. According to Vogel, because 5G operates at higher frequencies than earlier generations (3–300 GHz), it can be impaired by obstacles like torrential rains and buildings. Hauk opens a virtual window to the finicky signals with an RFfriendly membrane applied to the exterior of a building, doubling as a skylight or

blending into the rooftop material. “We’re looking forward to wireless communities and wireless in our homes,” Vogel says. “Behind our panel, that’s where all the data is received in a house and its then amplified and distributed as needed.” And Ron Fleming, who is a former CEDIA VP and now at Voxx Accessories, says vendors “all believe the opportunity is limitless”. “It’s an opportunity to not only upgrade the product, but to upgrade the functionality of the product…and get the consumer excited about all the additional capabilities,” Fleming said. Fleming told

the roundtable security that home automation integrators were ideally placed to get consumers excited about 5G and they should get educated about the technology because clients are likely to turn to them when the reality of M2M device-to-cloud solutions sets in. Meanwhile CE Pro editor Jason Knott acknowledged 5G’s impending role in everything from low-rate IoT to high-speed video and pointed out that too few people were talking about it seriously, given its potential impact. “We’re talking about this 5G networking disruption, but not a lot of other people are talking about it,” Knott said. n

se&n 53

SEM1018_52monitor.indd 53

28/9/18 10:19 am


● Product review

Qolsys IQ Panel 2

QOLSYS IQ PANEL 2 REVIEW

EN got a run-through of the Qolsys IQ Panel 2 with Stanley El Komala, senior product manager, intrusion, BGWT recently. Someone described the Qolsys IQ Panel 2 as the ‘Swiss army knife of security solutions’ and that’s apt. This system has profound depth, especially when it comes to programming and then managing its surprisingly comprehensive specifications. IQ Panel 2 straddles security and automation, with a full spread of dedicated security and life safety devices available, while the system also supports Z-Wave devices. Although the panel can be addressed via the app and web interface – El Komala has

S

QOLSYS IQ Panel 2 is a security and automation solution distributed locally by BGWT, that incorporates multiple wireless paths, loads of peripherals and a swathe of functionality that gives security installers the capability to build serious security and automation solutions.

54 se&n

SEM1018_54qolsys.indd 54

27/9/18 4:01 pm


BY J O H N A D A M S

PANEL COMMUNICATION LEVELS ARE EXCEPTIONAL, WITH VISUAL AND AUDIO FEEDBACK AT EVERY TURN.

notifications running on his Apple smart watch – we drive the system using the integrated controller/touchscreen user interface. Just for clarity, I’m going to describe this unit as the user interface from now on, even though it incorporates full controller functionalities, storage, comms and lots more. This was an interesting demonstration – I’d come to BGWT with no expectations and I wasn’t expecting to find a system that felt so familiar yet so advanced. Usually, it’s possible to nail the nature of a solution within the first 10 minutes or so but instead of first impressions, I got first, second, third and fourth impressions as El Komala peeled back layer upon layer of functionality. There were surprised bursts of laughter over some of the more unexpected features. The physical specification of this system is impressive – at its heart, IQ Panel 2 is running a Qualcomm Snapdragon chipset and Google

Android OS, and the backend is familiar and polished Alarm.com. The controller/user interface is slender, has a large 7-inch screen, high resolution of 1200 x 800 pixels and multi-gesture control. Something El Komala mentions that I don’t appreciate until later is that the user interface only displays options for attached devices and this streamlines system management. This is a wireless system, so you’d expect the RF capability to be solid and it doesn’t disappoint. There are 6 wireless paths, including 4G LTE cellular (global roaming SIM), dual-band Wi-Fi 802.11 AC, encrypted security RF, Z-Wave Plus, Image Sensor and Bluetooth LE 4.0. Wireless means installation is flexible – you can locate the controller anywhere it suits your client. Because wireless communications are so important, the user interface can display the quality of the wireless connection between device and panel in graphical form – it’s a very simple way

se&n 55

SEM1018_54qolsys.indd 55

27/9/18 4:01 pm


● Product review

Qolsys IQ Panel 2

of seeing how reliable device comms is likely to be during the installation process. Neat features you don’t expect abound the user interface has a built in glassbreak sensor, built-in motion detection from the integrated 5MP camera and is capable of pairing with up to 5 devices. There are remote wireless firmware updates and a builtin router. You get 242 user codes, support for 119 Z-Wave Plus devices, 128 security devices using S-Line encrypted 319.5MHz, support for up to 80 locks, up to 6 thermostats, up to 6 garage doors and up to 10 outputs of your customer’s choice. There are 2 hardwired zones, 8GB of flash memory onboard, a microSD slot, 2 x 1W speakers, stereo microphones, internal piezo siren, tamper switch, 3200aH Lithium polymer battery, wall or table

THE PHYSICAL SPECIFICATION OF THIS SYSTEM IS IMPRESSIVE – AT ITS HEART, IQ PANEL 2 IS RUNNING A QUALCOMM SNAPDRAGON CHIPSET AND GOOGLE ANDROID OS, AND THE BACKEND IS FAMILIAR AND POLISHED ALARM.COM. mount, custom chimes, emergency/panic function, 4-day weather app, Bluetooth touchless disarming for 5 devices and a photo frame function. As El Komala tweaks the demo system I notice there’s voice support to assist installers with programming. Something else I notice is the depth of programming. It’s instructive that I take more than 100 photographs of the system during the demo and around 50 per cent of them are of different user interface screens, despite the fact there are so many devices to play with. According to El Komala, Qolsys IQ Panel 2’s wireless options expand installation possibilities – which setup you go for really depends on the requirements and communications platforms covered by a customer. He also points out that arriving later in the year will be a Power G wireless module, which will be an upgrade to the IQ Panel 2. PowerG is added to an existing slot, so there’s no need to change the controller to enhance capabilities. “As you can see the user interface is very compact and there’s a full spread of devices including reeds, wireless PIRs, smoke sensors, reed/shock sensors, flood sensors, garage door closers, thermostats, light dimmers and more,” says El Komala. “Support for Z-Wave is a real strength and the system supports smart switches, as well as being able to control air conditioning using an IR communication device which addresses split systems directly and gives full functionality. There’s a wireless repeater for larger applications and there are cameras, compatible locks, Skybell intercoms, smart light bulbs and more Z-Wave devices. Programming of these devices with IQ Panel 2 is second to none.” The heart of the system is the user interface, which gives you situational awareness of system status visually, as well as by voice and tone alerts. And of course, you can set up notifications to give granular reporting of any event that takes place in real time via the app, with reports arriving by cellular and Wi-Fi simultaneously. The app is another strong interface, giving full control, as well as a detailed event history. But the user interface is the star of this show. One of the great things about modern alarm and automation solutions isn’t just their expanded capabilities but the ease of accessing capabilities that have always been there but could never be used to their full potential. Features that were set up once by the installer during commissioning and locked in stone can now be tweaked on the fly by users

56 se&n

SEM1018_54qolsys.indd 56

27/9/18 4:01 pm


– that includes useful things like device or area bypassing – and all this facilitated by a very simple user interface, which allows you to simply check the devices you want to leave out. You can also hop into status and see instantly the state of all system devices – name, status, battery, history. Functionality like this is supported with plain English feedback from the controller, which ensures you’re never in the dark about system settings. Panel communication levels are exceptional, with visual and audio feedback at every turn. Even the arming countdown is displayed as an icon, leaving users in no doubt where they stand in relation to operational commands. Supporting ease of use are 14 separate video tutorials that show you how to handle every aspect of the system – lights, locks, weather, photo frame, system tests, camera, energy management and lots more. As El Komala points out, you don’t have to know how to programme the system before you start installing IQ Panel 2 but you’ll have learned by the time you finish. The functionality is icon-based, and it’s layered. At the top are more general things like Z-Wave status, activity monitor, interface status, automation. You dip down through advanced settings to reach user management, system tests, panel re-boot, edit sensors, power down, sound and Bluetooth device management. You open the system page to access cellular, Wi-Fi, Z-Wave,

Ethernet and internal storage and then tap each to access the detail underneath. In the case of cellular, the dropdown displays carrier, cellular connection, cellular signal strength, IMEI, etc. “Enrolling Bluetooth devices is a simple process of Bluetooth pairing – you touch pair on phone and user interface, the device is enrolled and the system confirms success – you can pair up to 5 mobile phones,” says El Komala. “It’s not like geofencing, which works at greater distance but once you arrive at home the system will sense your device and disarm, making getting in and out of the home easier. The system can also secure via Bluetooth or it can be programmed to secure itself by closing garage doors, locking door locks, then arming automatically at local sunrise and sunset.” Installing Z-Wave and security devices is simple, too. The sensor requests to be added to the sensor list and you simply OK this. The next page shows you the comms type – in this case it’s SecurityRF-433 – you can nominate sensor type, tweak delays, name the sensor, nominate chime types if applicable, enable voice prompts and more. Managing enrolled sensors is just as easy. “Programming and managing all these sensors is handled using swipe gestures,” El Komala explains. “You already use these gestures to drive Android or iOS applications, so it’s intuitive to find the same thing in this user interface.”

se&n 57

SEM1018_54qolsys.indd 57

27/9/18 4:01 pm


● Product review

Qolsys IQ Panel 2

Something I’m especially enamoured with is the fact this IQ Panel 2 incorporates a split system air conditioning control device. The way this works is that an IR repeater is located facing the system and is addressed directly by the user interface or app. It’s not just on/off, either. The device, which costs around $150, lets users control their air conditioning mode – heat, cool, or auto. The system communicates with the repeater via Z-Wave and the repeater communicates with the air conditioning system using IR, says El Komala.” It’s a simple and elegant way to handle a piece of automation that used to demand hard wiring.” As well as air conditioning, Qolsys IQ Panel 2 can manage smart light bulbs, light dimmers, as well as the Skybell wireless video intercom. This brushed stainless unit communicates events and video footage directly to the user interface, allowing homeowners to answer the door, communicate with the visitor via audio while confirming identity with video, then open the door to allow access. Rather cool, the Skybell has integrated motion sensing along with a camera, microphone and speaker. Skybell can alert the home owner to the presence of a person outside the front door,

Stanley El Komala

AS WELL AS AIR CONDITIONING, QOLSYS IQ PANEL 2 CAN MANAGE SMART LIGHT BULBS, LIGHT DIMMERS, AS WELL AS THE SKYBELL WIRELESS VIDEO INTERCOM.

whether they press the doorbell or not, which is a nice safety feature. The ability to drive wireless Yale bolt locks enhances the system’s capabilities considerably. These locks include an integrated backlit keypad, so they can be opened with a code and it’s possible to secure all locks in the system all locks simultaneously. The same applies to garage door closers, which work with any standard tilting door. Video is a key element of the user interface and it’s well provided for. Cameras are displayed in a list and you select one to see the camera view. Video of events is also available via the Alarm. com app where it’s saved and displayed in the form of a list. “One of the great strengths of this system is the ability to support a very large number of devices, while allowing complex functionalities and giving users considerable detail for drilling down,” El Komala says. “And it’s very well supported by Alarm.com with a comprehensive app, as well as a detailed browser interface.” Qolsys IQ Panel 2 is right up at the top of the list when it comes to the latest and greatest security and automation solutions. It’s not just that there’s a huge number of devices supported and multifarious comms paths. There’s also enormous power in the user interface and it’s all accessible power – you’re not doing Bletchley Park with a code book in one hand when it comes to programming and managing the system. Instead, everything is seamless, accessible to the point of being obvious, while the system communicates with you every step of the way. n

FEATURES OF THE QOLSYS IQ PANEL 2 INCLUDE: l

6 wireless paths including Z-Wave Plus, 4G LTE, encrypted security

l

Panel has inbuilt camera, glassbreak & motion sensors, microphone, stereo speakers

l

Supports 119 Z-Wave Plus devices & 128 security devices, 80 locks

l

2 hardwired zones, 8GB of flash memory onboard, a microSD slot

l

Internal piezo siren, tamper switch, 3200aH Lithium polymer battery

l

Bluetooth touchless disarming for 5 devices

l

Supports Skybell video doorbell with motion sensing

l

Remote wireless firmware updates, built-in router

l

Alarm.com remote application and web browser

l

Detailed system, comms and event reporting.

58 se&n

SEM1018_54qolsys.indd 58

27/9/18 4:01 pm


RECOGNISING EXCELLENCE

#securityawards Organised by:

2018

AUSTRALIAN

Security Industry The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals. www.asial.com.au/securityawards2018 Date: Thursday 18 October 2018 | Venue: Sydney’s Doltone House Hyde Park Entertainment Sponsor:

Lead Dinner Sponsor:

2018

SEM1018_59.indd 1

27/9/18 3:54 pm


● Analysis

IT Security

THREATENING CLOUD? Cloud throws up opportunities and pitfalls at the same time. According to experts, huge growth is coming but end users need to get educated to ensure they get solutions that offer dependable data security.

UST a few years ago, cloud was an enigmatic buzzword, a platform that was more conceptual than actual; certainly not the place where businesses would trust their infrastructure and business continuity. But that’s all changed with the introduction of the major players into cloud hosting. AWS, Microsoft Azure and Google Cloud have become accessible, big brand solutions for small and medium sized enterprises to use and benefit from cloud

J

computing’s promise of low OPEX and scaleable up server use. SaaS has kept pace with new opportunities as new subscription services offer a plethora of technologies and applications in monthly payment schemes, or as used data stream models. Clearly a tipping point is under way. A recent McAfee study found that in 15 months, 80 per cent of all IT budgets will be committed to cloud apps and solutions, yet just 23 per cent of organizations today trust public clouds to keep their data secure. These 2 opposing realities point to a critical challenge. Trust in public clouds is an inhibition to greater uptake – fear is driven by security threats. There are also menacing regulations, like the recent US Cloud Act, that have sent a chill through those using US data centres and cloud platforms. However, armed with a security-first philosophy, the cloud’s benefits can be realised, and its dangers mitigated, and cloud can be used in private and hybrid

60 se&n

SEM1018_60analysis.indd 60

27/9/18 4:04 pm


solutions to connect on-premise with public clouds in a secure way.

THE THREAT IS REAL Recent data breaches didn’t surprise anyone who eyed the cloud suspiciously. In 2017, Pro Wrestling organiser WWE had 3 million records compromised in a data breach on an Amazon Server. Six years later and we’ve now come to realise how serious the dropbox 2012 data breach was. Hackers tapped into more than 68 million user accounts – email addresses and passwords included – representing nearly 5 gigabytes of data. Stolen credentials reportedly made their way to a dark web marketplace paid in bitcoins. Dropbox responded by requesting a sitewide password reset from the user base. They also promised an ongoing commitment to data security. Then there was the situation that Yahoo found itself in where more than one billion user accounts were compromised in an attack. This includes first and last names, email addresses, dates of birth, and questions and answers to security questions. This incident is on record as the largest data breach in history and unrelated to a separate incident which exposed 500 million accounts months prior. The cloud has proved itself to be a place that needs security. Meanwhile, Skyhigh has collated data from 30 million users and their findings are telling, showing that 18.1 per cent of Cloud-based file sharing and collaboration contained sensitive data from a variety of sources - from financial reports, payment information to health, revealed by merely searching the internet. The average enterprise experiences 23.2 Cloud related threats per month – an increase of 18.4 per cent from 2016 and nearly every organisation gets at least one threat per month. But there’s an irony, as Gartner’s Jay Heiser, vice president and cloud security lead, explains. “Contrary to what many might think, the main responsibility for protecting corporate data in the cloud lies not with the service provider but with the cloud customer - we are in a cloud security transition period, in which focus is shifting from the provider to the customer,” Heiser wrote recently. These observations bring home that there is an urgency and end users have more to do than they realise in the domain of security, both onpremise with physical next generation firewalls, or using virtual firewall instances in secure zone configurations. “We’ve seen an increase in our customers using our virtual firewalls to deploy in the cloud, no doubt about it,” says Mattias Nordlund, product manager at Clavister, a cybersecurity vendor based in Sweden. “What we see is that data centres are becoming more ‘cloudified’ and that in turn attracts customers who want to reap the benefits of cloud computing and data storage. This is a good thing, but we need to ask the hard questions: do you really know who your neighbours are in that cloud? “Do you believe that you should just leave your

Mattias Nordlund

WHAT WE SEE IS THAT DATA CENTRES ARE BECOMING MORE ‘CLOUDIFIED’ AND THAT IN TURN ATTRACTS CUSTOMERS WHO WANT TO REAP THE BENEFITS OF CLOUD COMPUTING AND DATA STORAGE.

data unprotected in the cloud?” Nordlund asks. “Our position is simple. That you should use a virtual instance to protect against east-west threats – that there are things you can do to create a firewalling of your organization in that realm and it’s a minimum requirement should you choose that route”. Clavister was one of the first to create a virtual firewall in 2008 and has spent 20 years creating cybersecurity solutions for over 20,000 customers in 154 countries. This means Norlund is part of a team that’s being confronted with the cybersecurity challenges of secure cloud daily. “I would say that our customers in the Nordics are slightly more advanced in cloud than other parts of the world and so we’ve had to learn how to handle the problem,” Nordlund says. “For instance, we have a large MSP that uses our solution brilliantly to protect their customers and we’ve learned a lot from that. Our experience is that there needs to be education on the topic and that cloud solution providers, as well as their customers, need to take security serious and not simply believe the cloud platform will provide all the answers. “We have surveillance providers that use both our physical and virtual NGFWs to secure those large streams of data going to the cloud and once you map the level of risk, they completely understand that they need to take more steps by way of security.” Clavister’s Jan Nahlbom, concurs. “Education is so important,” he says. “For instance, we have a roadshow with one of our partners happening next month and one of the main topics we’ll be discussing is the newly legislated US Cloud Act, which states that if you store your data in the cloud with any US cloud provider or data centre, your data can be exposed to the US government upon request. “We at Clavister have a strict no back-door policy which means that we’d never allow our customers’ data to be given over to authorities, so we’d advise using a non-US based cloud solution for a start.” n

se&n 61

SEM1018_60analysis.indd 61

27/9/18 4:04 pm


● Regulars

Products

Editor’s choice INNER RANGE RELEASES CONTROL4 INTEGRATION FOR INCEPTION l INCEPTION is now capable of integrating with the Control4 building automation platform as a security and access control device. Inception’s intruder detection and access control features can be integrated seamlessly into a smart home or business system. Control4 is a smart home platform that brings many of the smart devices in a home together, allowing information and interactions from multiple systems to be coordinated together in one place. Control4 delivers an elegant and affordable way to control and automate lighting, music, video, security and comfort seamlessly throughout the entire home. The integration provides full area state and control, input state syncing, output control and door control via Control4. Inception can be used to trigger automation or be controlled via the Control4 interface. Distributor: Central Security Distribution Contact: 1300 319 499

COMNET CTS24 ADVANCED SWITCH

What’s new in the industry.

VESTA REAL TIME SECURITY l WHETHER your client is a homeowner or a tenant, living in a flat or a mansion, Vesta wireless security systems are simple to use, affordable and reliable. Vesta allows your client to monitor and manage their home remotely with a smart-device and the internet. Vesta systems are more than just your regular security alarm system, they use quality motion sensors with built-in colour cameras to detect intruders. If an intruder enters a property, the system doesn’t just sound an alarm, it automatically activates the cameras and takes a series of images, which it then sends directly to the client’s smart device. The Vesta Portal app also allows them to remotely arm and disarm the system, take additional snapshots, check the status of their detectors, as well as viewing a history of events. CSM is now distributing this exciting new range of Vesta kits to suit a broad range of applications. Distributor: Consolidated Security Merchants Contact: 1300 663 904

l COMNET CTS24 advanced switch is currently in production and will be available to ship to clients around October. Part of the next generation of ComNet switches, the CTS24 is a 26-port hybrid layer 2 managed Ethernet switch, with two 10/100/100 or 1000FX combo ports, 24 10/100 modular ports, PoE up to 30W per port and 3 chassis options. There are 3 integrated power supply options, 2 x 1GB combo ports on all models, 8-port modules in RJ45, SFP, coax or UTP. The unit’s operating temperature is 0-50C. The CTS24+2 series allows for flexibility in combining standard copper, optical, and extended distance Ethernet in one rack mounted chassis configuration. The optional PoE allows the user to customize a solution to fit a specific application in a 1 RU rack space. Distributor: ComNet/Allguard Contact: +61 3 9378 2450

62 se&n

SEM1018_62prods.indd 62

27/9/18 4:05 pm


AXIS ADVANCED 5MP STAINLESS AND 4K DOMES l AXIS has launched advanced 5MP stainless steel and 4K dome cameras in its Q35 Series. Developed for solid performance in challenging light conditions and tough environments, the new models are based on top-quality half-inch sensors and the latest image processing, AXIS Q3518-LVE delivers 4K, and the stainless-steel AXIS Q3517-SLVE delivers 5 MP at 30ips. This includes support for Axis OptimizedIR illumination, Forensic WDR and Lightfinder technology. The new models also support Axis Zipstream technology, which preserves important details in full image quality, while reducing the storage and bandwidth needs by an average of 50 per cent or more. The advanced AXIS Q35 cameras have been designed to withstand the harshest conditions, with stable operation in extreme temperatures from -50 C to +60 C. AXIS Q3517-SLVE features a marine-grade stainless steel casing that is highly resistant to the corrosive effects of salt, detergents and other chemicals. AXIS Q35-LVE/-SLVE cameras are IK10+ rated and have been tested to ensure they can withstand 50 joules of impact.

NORTEK ELAN INTELLIGENT VIDEO DOORBELL l NORTEK Elan Intelligent Video Doorbell just released by Nortek Security & Control offers advanced analytic technologies to the residential security market, Nortek says the product can be used by integrators to help homeowners add a high level of security to their homes’ front doors. The Intelligent Video Doorbell can seamlessly integrate into Elan’s Surveillance systems for video recording and monitoring, and Elan states the product was developed to set up easily through the company’s Elan Discover technology. With this technology, Elan’s home systems can auto-discover the door station, and once it is discovered it utilizes an auto-configuration function that facilitates its integration into Elan systems. Once the door station is integrated into an Elan system, the product acts like a surveillance camera to capture video for the security system’s network video recorder (NVR). In addition, the Elan Intelligent Video Doorbell camera tamper feature sends users a notice if the camera is covered by a hand, tape, a cloth and more. Distributor: BGW Technologies Contact: +61 2 9674 4255

Distributor: Hills Contact: 1800 685 487

HIKVISION DS-2DE4220W-AE

AVIGILON H5 AI-POWERED CAMERAS

l HIKVISION DS-2DE4220W-AE is an affordable 20x PTZ available

l AVIGILON H5 cameras powered by the latest Intel Movidius Myriad X VPU feature Avigilon’s next-generation AI and video analytics technology. “We are developing our H5 smart camera platform to run sophisticated deep neural networks on the device itself, providing it with powerful new abilities to learn, detect and notify operators of events that may need further investigation,” says Dr. Mahesh Saptharishi, Avigilon’s chief technology officer. “Like Avigilon, Intel is at the forefront of AI technology innovation and Intel Movidius VPUs will help us further expand the application and use of AI and video analytics to solve real-world challenges.” “Intel Movidius VPUs enable power-efficient hardware acceleration for deep neural networks. The collaboration on this technology with Avigilon will usher in a new generation of video analytics capabilities with deep learning approaches,” says Jonathan Ballon, vice president, Internet of Things group at Intel. “Distributor: Avigilon - Central Security Distribution

as in-ceiling, surface mount and outdoor pendant/wall mount. The camera is impact-rated IK8 and IP66 and there’s 24VAC power in, RJ45 network socket, analogue BNC adapter, RS485 and alarm in/out connectors. There’s a 1/2.8-inch progressive scan CMOS 2MP sensor coupled to a 4.7mm to 94mm power zoom lens giving 20x optical zoom and there’s 16x digital. Pan rate is 1-160 degrees per second and variable tilt rate is 1-120 degrees per second. There are 256 presets, 8 patterns with embedded presets and preset freezing. There’s a 128GB microSD slot, a flying lead attachment to let an installer use a handheld monitor. Minimum scene illumination is 0.05 lux at F1.6 with AGC on in colour and 0.01 lux at F1.6 with AGC on in monochrome. This will vary on zoom as aperture closes from F1.6 to F3.5 at the long end. Maximum resolution is 1920 x 1080p at 30ips and compression is H.264 or MJPEG. Power supply is 24V AC or PoE+ (802.3at) and there’s a maximum draw of 18W. Distributor: Central Security Distribution Contact: 1300 319 499

Contact: 1300 319 499

se&n 63

SEM1018_62prods.indd 63

27/9/18 4:05 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: We’ve had a camera installed on a pole mounted to one of our buildings hit by lightning and this has highlighted the fact none of our external cameras are protected. What would you recommend to reduce potential damage? A: Buildings are different to remote pole mounts, which would need to be grounded independently, with camera grounded to grounded poles. A remote pole could also be fitted with a low resistance path to ground via a lightning rod, fat cable and buried metal matrix. In your case, which action you take depends on whether the building is fitted with an external lightning protection system. If it is and the camera is not within the protected volume, then you need an air termination rod installed at the pole with cabling installed inside the metal pole. If in-pole cabling is impossible then cable needs to be run in a metal conduit that’s electrically connected to the pole. Whether or not you need surge protectors in the cable run depends on cable length. None if the run is only a couple of metres, some if cabling is longer. There should also be lightening equipotential bonding at the entry point for cabling as it goes from the junction box on the pole into the building. If buildings have no external lightning protection,

Our panel of experts answers your questions.

it’s possible the lightning risk is very low and can be mitigated by installing surge protectors between the junction box and camera. Alternatively, your buildings may need to be professionally grounded. Q: Is push or pull the most secure for sending alarm event data to end users? A: Push applications can send system status data, including alarm event data to end users 24x7. This means there’s virtually no delay between the alarm event and notification received by management or security staff. As soon as a pushregistered mobile device is powered up it automatically sends its metrics to the controller and that means alarm events can be reported faster. And with push, the polling tasks are distributed among the devices and that means there’s linear scalability. The central collector simply listens for updates from registered mobile devices and stores data it receives. Push technology is inherently secure against remote attacks since it does not have to listen for network connections that might leave it open to opportunistic hacking. The configuration required for devices is relatively simple. When it comes to latency, the low overhead and distributed nature of the push model permits data to be sent more frequently, allowing the management system to react faster to changes. In addition, many push protocols are implemented on top of UDP, providing non-blocking, low-latency transport.

Conversely, with pull architecture, a user loads a page onto their browser and requests services from a remote server. Pull protocols can potentially open devices on a system to remote access and denial of service attacks. There’s operational complexity, too. A pull-enabled system needs to be configured with a list of registered devices and security credentials required by the devices when they request data. Then firewalls need to be configured to allow bi-directional communication between poller and agents. Q: Is there any value for a young tech in buying expensive 1000V insulated screwdrivers and other insulated tools? Or is it ok to use uninsulated equipment? A: It’s worth pointing out that there’s a lot of hoo-haa around insulated tools from manufacturers but what we are talking about are tools with specially designed insulating covers and sheaths that expose the user to a minimum of metal that might potentially become a live conductor. Just using insulated tools doesn’t eliminate risk entirely - only common sense and careful safety procedures can do that. I think the question here should be is it best for a young tech to buy insulated tools or uninsulated – we’d recommend insulated. And when it comes to cost, if you’re dedicating your life to installing electronic security solutions and you think you might wind up on the hot side of 240V AC (after the proper training), then high quality insulated tools are a worthwhile

64 se&n

SEM1018_64help.indd 64

27/9/18 4:06 pm


securely mounted on drag-reducing poles.

investment. Does a young tech need $2000 worth of Wiha or Klein, or can they can get away with using low cost insulated screwdrivers from Britool or Witte, along with a compact insulated shifter and various cutters, testers, hooks and probes for those times they decide there may be an issue? There’s a case for both options. Something to take into account is that good tools will last a lifetime, while cheap tools that aren’t cared for will rust or fall to pieces rapidly, especially if you park your van at the beach. Should you go for insulated gear, be sure to cover off some of the quirky things you might find yourself needing if you spend time fiddling around in tight spaces – things like tweezers, hooks and little clamps can get used more often than you expect if you’re reaching into tight spaces. Also try to buy pliers and cutters with pronounced guards to protect against fingers slipping forward onto metal jaws. Q: We’ve had some issues with an inherited surveillance pole that moves around so much when wind strengths get above 20 knots it’s impossible to view footage from the cameras. The pole looks strong but there’s a lot attached to it, including multiple cameras and lights and a junction/ control box. Do we need to replace the entire pole or might moving some of the attached cameras around reduce the issue? A: Without seeing the application it’s only possible to generalise about the issues you face. Any time you are installing cameras and housings in high wind

areas seriously consider side mount configurations. It does sound like wind pressure may be inducing a harmonic. As well as moving cameras around the pole to reduce drag, you could also move some of the attachments lower where wind speed will be reduced. You need to make sure cameras are symmetrically-mounted in line with the horizontal rotating axis when pole mounting. This reduces imbalance on the horizontal tilting axis of the pole, ensuring a significant decrease in wind loading. You’ll also find this configuration has no requirement for springs and counter balancing weights. Reducing wind loading will decrease vibration and mean much improved performance. Try to keep the poled equipment as small as possible to reduce wind resistance. As well as correct placement, any pole mount application demands powerful and robust equipment

A: Over the last few weeks there’s been a lot of talk about cyber security risks with IP cameras. Is there a core group of things installers and integrators need to do to avoid the risks on behalf of clients? Q: Education is a key thing. Buying a book is highly recommended. Books aren’t just information heavy, you’re not as distracted by notifications as you read them. You don’t want network security to be something you don’t understand. In terms of defence, you need to be careful of port forwarding vulnerabilities. Be sure to change passwords – most cameras force you to do so on setup. You then need to manage passwords – there are automated apps for this now. Be sure that you use HTTPS, not HTTP. Disable web crawling and block unauthorised attempts to access ports after 3 attempts. You can also filter IP addresses, use X.509 Certificates to authenticate recordings and use VLANs. Stay in contact with manufacturers, which more than ever, are focused on ensuring the cyber security of their cameras. This will involve keeping firmware up to date. And stay up with the latest cyber security threats. Q: Would you use 125kHz readers and cards or do you think 13.56Mhz is the best option for access control as far as credential security is concerned? What about biometrics? A: Older technologies like 125kHz proximity, magnetic stripe, barcode and CSN (Card Serial Number) readers are best avoided. You also want a secure connection to the access control host, so avoid Wiegand and clock and data. Encryption for card reading and for host communication is vital. The 13.56Mhz frequency cards offer additional functions, as well as enhanced read range. Think seriously about the use of smart devices as a credential – many mobile devices have biometric authentication and users are clearly more comfortable authenticating themselves to a device they own than they are handing biometric markers over to others. Regardless, the latest biometric readers are something else to seriously consider. There’s a new generation of fingerprint and face recognition readers coming through, and given they eliminate the ongoing cost of managing huge card libraries, they are well worth considering. n

se&n 65

SEM1018_64help.indd 65

27/9/18 4:06 pm


OCTOBER 2018 ISSUE 403

events Secutech Thailand

l The Interview: Dean Monaghan, Convergint Technologies l Case Study: RMIT Reaches For Infiniti l News Report: FHDistribution Launches in Australia l Cyber Security: Securing IP Cameras l Case Study: QUT Partners with Gallagher l Product Review: Hikvision DS-K2604 Access l Alarm Monitoring: Get Ready for 5G Disruption l Product Review: Qolsys IQ Panel 2 Review

+

PP 100001158

ENTERPRISE ACCESS CONTROL

Dates: November 8-10, 2018 Venues: Bangkok International Trade and Exhibition Center Contact: +886 2 8729 1099 Secutech Thailand is a premier platform to showcase the latest innovations and build up strategic partnerships with the supply chains of security, smart home and fire and safety products.

SECURITY & GOVERNMENT EXPO

Security and Government Expo 2018

Date: November 8, 2018 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with over 30 companies promoting their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

+

ISC West Dates: April 9-11, 2019 Venue: Sands Expo, Las Vegas, NV, USA Contact: Outside the US call +1 203 840 5602 or email inquiry@isc.reedexpo.com ISC West is the largest security industry trade show in the U.S. allowing you to network with more than 30,000 security professionals, with technology encompassing everything from access control to unmanned vehicles from more than 1000 manufacturers and distributors.

SecTech Roadshow 2019 Dates: May 2019 Venues: 5 city Australian tour Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in its 5th year takes leading electronic security manufacturers, distributors and wholesalers on a national tour.

Security 2019 Exhibition & Conference

= DAILY, WEEKLY, MONTHLY.

SEM1018_66events.indd 66

Date: July 24-26, 2019 Venue: International Convention Centre, Sydney Contact: +61 3 9261 4662 Security Exhibition & Conference offers Australia's largest showcase of cutting-edge security technologies from more than 150 exhibitors.

27/9/18 4:05 pm


Scalable, seamless security in one source WIN-PAK® 4.6 - Integrated Security Solution Honeywell's WIN-PAK 4.6 software solution provides a cost-effective way to integrate and manage access control,video surveillance and intrusion detection through a single interface.

FEATURES AND BENIFITS • Eliminates disparate systems and interfaces • Increases situational awareness • Eliminates costly false alarms • Scales as your business grows • Minimizes onboarding and training costs • Minimizes server deployment costs • Minimizes maintenance & system supervisory costs

SEM1018_67.indd 1

27/9/18 3:54 pm


Formerly samsung

THE PROFESSIONALS CHOICE

Now available at Anixter and CSD.

SYDNEY

02 9333 0800

SEM1018_68.indd 1

MELBOURNE 03 9264 0000

BRISBANE

07 3113 4200

PERTH

08 9499 8000

1300 319 49 CSD.COM.AU 27/9/18 3:54 pm


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.