Sen sept17

Page 1

SEPTEMBER 2017 ISSUE 391

l

PROTECTING CROWDED PLACES PP 100001158

SEM0917_1cover.indd 1

l The Interview: Dale Acott & Chad Wright, SCSI l Strategy for Protecting Crowded Places from Terrorism l Review: Samsung Wisenet XNO-8080R Bullet l Alarm Monitoring: New Growth Opportunities l Product Review: Genetec Mission Control l New Product: Dahua X820 Industrial Drone l New Product: EyeLock Iris Biometric From CSD l Access Control: High Security Card Technology l Special Feature: Automatic Retractable Bollards l USS Iowa: Protecting the Battleship of Presidents

29/8/17 1:35 pm


Hills_VisionAd_APAC_210x297mm.indd 1 SEM0917_2.indd 2

2017-05-31 3:39am PM 29/8/17 10:07


editorial S E CU RI TY E L ECTR O NI C S & NETWO R KS S E PTE M BER 201 7 ISSUE 391

By John Adams

PROTECTING CROWDED PLACES: A GAME CHANGER? T’S hard not to see the recently released Strategy for Protecting Crowded Places from Terrorism as a game changer for the security industry – not just electronic security people but the entire industry and all its bolted-on support structures of administration and education. There’s no part of the security industry that is untouched by the Strategy for Protecting Crowded Places from Terrorism – consultants, monitoring stations, electronic security distributors and installers, physical security distributors and installers, security officers, security managers, security trainers, security industry associations – all will need to play a significant role if the comprehensive recommendations of the SPCP are to be effectively applied to crowded places nationally. The SPCP espouses a whole of community and whole of business approach to security that’s being driven from senior levels of government and comes with a sting in its tail. Any owners or operators of crowded places who do not comply with the SPCP’s recommendations for the protection of crowded places may be held personally liable in the aftermath of a terror attack. When you run your mind over just a few of the horrific attacks we’ve witnessed over the past 15 months; 137 murdered at the Bataclan Concert Hall in Paris, 49 murdered at the Pulse nightclub in Orlando Florida, 39 murdered at the Reina nightclub in Istanbul, 86 murdered and 432 injured at the Promenade des Anglais in Nice, 6 murdered and 19 injured in the Quebec mosque attack, 23 murdered and 250 injured at the

I

At issue is the underlying truth that law enforcement and anti-terror agencies cannot secure every possible location at a national level... Manchester Arena, as well as attacks on London Bridge and Borough Market, in which 8 were murdered and 48 injured; you can see where the Australia-New Zealand CounterTerrorism Committee was coming from when it wrote the SPCP. You can also see why it is advocating a solution involving partnerships and layers, and why it invokes personal responsibility for defence of crowded places. The SPCP defines crowded places as any location large numbers of people gather – that might be a pedestrian mall on a summer afternoon, a beer garden overlooking the beach, a sports ground, a shopping mall, a train station, a light rail stop, a restaurant, a market, a busy children’s playground. It insists that owners and operators of all such crowded spaces undertake security analyses of such spaces by licensed security consultants in order to assess risk levels, and most importantly, it directs owners and operators of crowded places to undertake the recommendations of such security audits. At issue is the underlying truth that law enforcement and anti-terror agencies cannot secure every possible location at a national level and trying to do so would dilute their primary roles of disruption and rapid response. Instead, the SPCP outlines a way in which the government will assist every organisation exposed to risk to manage that risk themselves in the most effective way possible. Ultimately, SPCP underlines that the responsibility for defence of private space – the physical, electronic and procedural mechanisms of deter, detect, delay and respond to terror attacks – fall entirely onto operators and owners. Something interesting about the SPCP is the complexity of the solutions envisaged. The authors of the strategy were clearly writing with a range of site sizes and complexities in

mind – the classic onion skin is very much in evidence. Site design, fences, bollards, access control, intrusion detection, CCTV, communications, well-trained security response teams. But there’s more to it than that. The strategy also imagines solutions that provide situational awareness to inform response, it insists on complex procedures which must be known by all staff, in real time, all the time. Such stipulations sound easy but they are not and the larger the site, the more complex the delivery of procedural intelligence is going to be. Procedures don’t write themselves but are site and event-specific and communicating them to groups of staff just once, let alone in times of serious threat, is profoundly challenging. Achieving staff-wide, simultaneous procedural response to a specific event would demand something like a Riskworks’ Multiple Integrated Risk Assessment and Control Level Evaluation System supporting every team member of every crowded place. The strategy specifically recognises the private security industry has a key role in defending at-risk crowded places. This is appropriate. The systems and solutions the security industry has developed and supported for decades are made for such worst-case scenarios. At all levels, the systems and technologies required to significantly increase security levels in crowded places exist in multiple highly-evolved forms and they simply need to be applied. At a sobering level, the SPCP is an admission that the current terror threat is real, is pervasive, is metastasizing into extreme sections of the wider community and is not going to go away. This is the reality security people now inhabit and we must assist owners and operators of crowded places to survive in it as fast as we possibly can. n

se&n 03

SEM0917_3ed.indd 3

29/8/17 2:55 pm


SECURECALL 1345 PORTAL

The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes.

- Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.

COMPLETE REPORTING

Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.

PROVEN

Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE

1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.

A

ER OM EL ST AN CU M P R LA

PS

TN

RE

CE

IV

PH OUONE TA LIN GE E /B US RE Y DU ND AN CY

ER

 SC S VI I RT U

AU CM

TO S M SY AT ST IO EM N

SU

PA

TH

 AL

NS

SE

HI

NE

AF

RE

CE

IV

ER

DC

 4 E G DU VOL AL VE LIN KS

OR

D

DC

S

P

C

D D

1300 555 570 sales@scsi.com.au www.scsi.com.au

SEM0917_4_5.indd 4

29/8/17 10:07 am


R

E KS

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.

M S AR NG ES AL ORI EL P T E I IR KU N TR O W C M CEN BA

OPTUS EVOLVE PRIVATE IP SERVICE

OPTUS/TELSTRA WIRELESS PRIVATE IP SERVICE (SCSI APN)

Y AR M S RI CES s P les AC ire ctWsole e r DW SECURE Di Con s les ire A W y ct re wa Di ate G s les ire B W y ct re wa Di ate G

TELSTRA OPTUS CU S DS TOM L E RO /ADS R UT L ER

INTERNET GATEWAY

DT

U3 G L /I AL ITE P AR M

 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.

TECH APP

END USER APP

 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS

SCSI IS PROUD TO ANNOUNCE OVER THE AIR DOWNLOAD SUPPORT USING THE DIRECTWIRELESS NETWORK. Panel List: Concept 3/4000 Type 2 DAS NX4 DAS NX8

DAS NX12 DASNX16 DAS R8 DASR128

PARADOX MG5050 PARADOX SP6000 PARADOX SP7000 PARADOX EVO192

SOLUTION 16 PLUS SOLUTION16I SOLUTION 64 SOLUTION 144

SOLUTION 6000 SOLUTION ICP-CC488 SOLUTION 862

TECOM CHALLENGER V8 TECOM CHALLENGER V10

1300 555 570 sales@scsi.com.au www.scsi.com.au

0 u u

SEM0917_4_5.indd 5

29/8/17 10:07 am


SE A SI MI S NA RS

SECURITY & GOVERNMENT EXPO W W W. S E C U R I T YA N D G O V E R N M E N T E X P O . C O M . A U F O R F U R T H E R I N F O R M AT I O N C O N TA C T M O N I Q U E K E AT I N G E O N 0 2 9 2 8 0 4 4 2 5

S I LV E R S P O N S O R

EXHIBITORS

Intelligent Video Management Solutions

L A N YA R D A N D S P E A K E R S P O N S O R

MEDIA PARTNER

LE ADING INDUSTRY PARTNER

TM

ACT Chapter

SAGE DPS AD_Sept17_2.indd 6

29/8/17 12:16 pm


FREE EVENT

REGISTRATION NOW OPEN

November 9, 2017 Canberra Bringing the latest security products and technologies to government and commercial end users, installers and consultants in the nation’s capital from 12-6pm. CMDR Ainsley Morthorpe will speak on developing physical security strategies for the Australian Navy

Free refreshments 3.30 – 5.30pm

Enquiries please contact Monique Keatinge +612 9280 4425

SAGE DPS AD_Sept17_2.indd 7

29/8/17 12:16 pm


32

64

10

including loitering, sound classification, fog detection, digital auto tracking and tampering. 46: MISSION CONTROL

SEPT 17 22: PROOF OF LIFE SEN editor John Adams speaks with SCSI’s Dale Acott and Chad Wright about the future of alarm monitoring, automation and IoT, the company’s new lifestyle technology play, and the end of the alarm panel as we know it. 28: PROTECTING CROWDED PLACES Australia’s Strategy for Protecting Crowded Places from Terrorism seeks to create a framework that will increase inherent security levels in public spaces but it places the duty of care firmly on owners and operators of crowded places to undertake security audits and implement the recommendations to provide layered security for their sites. Owners or operators who fail to do so are likely to be found liable. 32: SAMSUNG WISENET X XNO-8080R BULLET Samsung Wisenet X XNO-8080R is a 5MP bullet camera with WiseStream II support, a speedy F1.2 motorised varifocal lens with a range of 3.7-9.4mm, 30ips of resolution, H.264 and H.265 compression, 50m IR range, IP67/IP66, NEMA 4X and IK10 ratings against weather and vandalism, and video analytics

SEM0917_8cont.indd 8

Genetec Mission Control is a management aggregation solution designed to bring multiple sub-systems onto a single coherent inherent interface to provide situational awareness and centralised operational response. Mission Control stabilises design-making in moments of extreme pressure through the presentation of holistic intelligence drawn from thousands of security devices and video feeds in real time. 52: DAHUA X820 DRONE Dahua’s X820 is a fast, powerful drone, which combines considerable operational versatility with excellent surveillance capabilities. Fitted with high quality optical and/or thermal cameras, the X820 is designed to answer more questions than most professional users would ask it. 54: EYELOCK IRIS BIOMETRIC CSD now distributes the Eyelock product suite covering a range of iris-based identity authentication, hardware and software solutions to its broad customer base in Australia. 56: CARD SECURITY To the uninitiated prox is prox is prox. You hold the card towards the reader and thanks to the mystical powers of something called RF, the reader excites a card’s antenna, interrogates the identity of its IC, recognises a card, and activates an electric strike to facilitate access. 60: AUTOMATIC RETRACTABLE BOLLARDS Recent events have highlighted the need for

29/8/17 2:27 pm


56

68

60

28

regulars

robust hostile vehicle mitigation strategies. Maintaining a secure perimeter while allowing access can be challenging and retractable bollards are one such way of achieving balance. This article will provide an overview of the purpose, type and considerations for automatic retractable bollards.

10 NEWS Latest business, product and technical news from Australia and around the world. 40: MONITORING

64: PROTECTING THE PROTECTOR

One of the fears for many monitoring stations when it comes to new technology is that the changes will dissipate the market but the latest projections suggest anything but. There’s significant new and organic growth rolling through.

Affectionately known as the ‘Battleship of Presidents’ for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Now a museum, the ship is protected by a security solution incorporating Vivotek cameras and an Arteco VEMS VMS.

68: EDITOR’S CHOICE What’s new from our manufacturers.

66: PREVENTION IS CURE

72: HELPDESK

After multiple terror attacks overseas, 5 attacks and 12 thwarted attacks in Australia in 3 years, security professionals are asking whether the National Terrorism Threat Advisory System threat level should be elevated to ‘Expected’.

SEPTEMBER 2017 ISSUE 391

l

PROTECTING CROWDED PLACES PP 100001158

l The Interview: Dale Acott & Chad Wright, SCSI l Strategy for Protecting Crowded Places from Terrorism l Review: Samsung Wisenet XNO-8080R Bullet l Alarm Monitoring: New Growth Opportunities l Product Review: Genetec Mission Control l New Product: Dahua X820 Industrial Drone l New Product: EyeLock Iris Biometric From CSD l Access Control: High Security Card Technology l Special Feature: Automatic Retractable Bollards l USS Iowa: Protecting the Battleship of Presidents

Publisher Bridge Publishing Aust. Pty Ltd ABN 11 083 704 858 PO Box 237 Darlinghurst NSW 1300 tel 61 2 9280 4425 fax 61 2 9280 4428 email info@bridge publishing.com.au

Our team of electronic security experts answers your tough technical questions.

Editor John Adams Advertising Manager Monique Keatinge Contributors Luke Percy-Dove Maksym Szewczuk Customer Service Annette Mathews tel 61 2 9280 4425 annette@bridge publishing.com.au

Design Tania Simanowsky e: taniasdesign@ optusnet.com.au

22 months A$195.00 (incl GST)

Subscriptions 11 issues per annum One year (11 issues)

Overseas 11 months A$220.00 22 months A$440.00

Australia 11 months A$110.00 (incl GST)

WEBSITE www.securityelectronics andnetworks.com

No part of this publication may be reproduced in any form in whole or part without prior written permission of Bridge Publishing.

SEM0917_8cont.indd 9

29/8/17 2:46 pm


Mobotix Appoints Thomas Lausten CEO

NEWS IN BRIEF SEPTEMBER 2017

GALLAGHER SECURITY WINS NZSA INNOVATIVE PRODUCT OF THE YEAR AWARD

Vlado Damjanovski

GALLAGHER Security has won the NZSA Innovative Product of the Year Award for Gallagher Mobile Connect. Simon Lawrence, the software architect

for Gallagher’s devices software team accepted the award for Gallagher. The NZSA awards recognise excellence and outstanding service delivery provided by those

who work within the security industry. Each award provides an opportunity to recognise and celebrate the exceptional achievements of these individuals, and

the companies that they are employed by. The awards ceremony and dinner was held at Te Papa Tongarewa (The Place of Treasures) Museum of New Zealand.

SECURITY & GOVERNMENT EXPO SOLD OUT: FOYER SPACES REMAIN SECURITY & Government 2017 has now sold all spaces in the function room of the Realm Hotel, according to SAGE organiser, Monique Keatinge. “Given the level of interest, we have opened up an additional 4 spaces in the foyer area near registration and spaces in the hotel lobby near the ASIS seminar rooms will also be made available for those still wanting to be part of SAGE 2017,” Keatinge said. “It’s a matter of first in first served as far as the remaining foyer positions – anyone who wants to bring their security solutions to Security & Government Expo at the Realm Hotel in Canberra on November 9 should contact me as soon as possible.”

Monique Keatinge

STANLEY EL KOMALA JOINS BGW TECHNOLOGIES AS SENIOR PRODUCT MANAGER n STANLEY El Komala has joined BGW Technologies in a senior product manager role.

“We are feeling pretty lucky to have such an experienced person joining the BGW family”

Stanley El Komala

said Mark Shannon, national product manager for BGW Technologies. El Komala joins BGWT with over 12+ years of experience in technical, purchasing and product management roles in the security industry. El Komala has a deep technical base on the complete line up of security technologies as well as having significant experience in operations. With the recent announcement of BGWT being appointed

as a DSC distributor, El Komala will be responsible for driving the Alarm/Intrusion/ IoT product segment for BGW Technologies. In the last 12 years El Komala has held various purchasing, warehousing, engineering and product management roles for Q Video Systems and QSS. “We have some very exciting times ahead as we invest further in the alarms/intrusion market and when we consider how the IoT

technology segment is heating up exponentially, we know that we need the very best people to help us support and drive this part of the BGWT business,” said Robert Meachem, BGWT general manager. “Besides Stanley’s technical depth in technology and the DSC product range, his operational experience will be very helpful in delivering the complete suite of products to the market through our 5 branches.”

10 se&n

SEM0917_10news.indd 10

29/8/17 2:45 pm


Security Group Wins Major SA Water Security Contract p.12 Security For 2028 Los Angeles Olympic Games Will Exceed $US2B p.14 Gallagher F4 Fence Controller Wins Outdoor Perimeter Protection Award p.16 DNA Connect Distributing Avigilon to Australian Market p.18 Melbourne Underground Rail Loop Initiates Security, Fire and Safety Upgrade, Stage 2 p.20

COMPILED BY JOHN ADAMS

NETSCAPE CO-FOUNDER LAUNCHES CLOUD-BASED BUILDING MANAGEMENT SOLUTION n NETSCAPE co-founder and computer scientist Jim Clark has launched CommandScape, a cloud based building management solution that will integrate video surveillance, security, lighting, air conditioning, access control, shade control, energy monitoring, home entertainment and multimedia, and other connected technologies. Importantly, CommandScape is designed to allow easy installation and commissioning for integrators who use the solution to integrate multiple sub systems on behalf of their clients. CommandScape Editor allows users to customize schedules, presets, automations and alerts based on each user’s personal preferences, as well as handling remote maintenance. “There has been limited building management

DAHUA TECHNOLOGY SIGNS DISTRIBUTION AGREEMENT WITH INGRAM MICRO AUSTRALIA

Lyn Cheng

COMMANDSCAPE EDITOR ALLOWS USERS TO CUSTOMIZE SCHEDULES, PRESETS, AUTOMATIONS AND ALERTS BASED ON EACH USER’S PERSONAL PREFERENCES, AS WELL AS HANDLING REMOTE MAINTENANCE.

innovation over the last several years and in turn, there remains a need for a highly secure and integrated control system suitable for commercial properties and large homes,” said Clark. “CommandScape solves that problem with the next generation of security and control that allows users to connect and manage their property though an intuitive application

anywhere and anytime.” CommandScape is based on a customized floor plan represented on a simple and intuitive mobile interface. CommandScape Navigator app allows users to access and manage properties using the same highly secure certificate process invented by NetScape – device-based encryption, offering full management of access rights based on individual certificates.

BRISBANE’S QUEEN ST MALL INSTALLS SECURITY BOLLARDS n BRISBANE City Council has installed concrete security bollards at the Albert St entry to Queen St Mall in the heart of the CBD. Brisbane City Council declined to comment on the security measures. “Brisbane City Council does not discuss security arrangements,” a spokesperson said. “Obviously we do a lot of work around security, but the reality is it’s probably not appropriate for me to talk about those measures,” Lord Mayor Graham Quirk said recently. “But I just want to assure people ... we are doing a lot of work with the Queensland Police Service around security measures. We continue to look for

opportunities where we can to continue to make this place a very safe city, and it is a safe city. We are forever vigilant and will continue to work with Queensland Police to ensure we do what we need to do.” Meanwhile, a Queensland Police Service spokesman said Brisbane residents could rest assured that police regularly worked with the council to provide advice on security measures. “For operational reasons, the QPS does not comment on the specific security advice it provides publicly,” the spokesman said. “While the national terrorism threat level is at ‘probable’, there is no known specific threat to Brisbane.”

DAHUA Technology has signed an Australian distribution agreement with Ingram Micro. The deal comes shortly after Dahua signed a similar agreement with Ingram Micro NZ. Dahua Technology Australia managing director, Lyn Cheng, said the partnership with Ingram provides customers with access to in-house specialist engineering and design teams. “These teams not only specialise in CCTV, they also have significant expertise in designing robust networks which can easily cope with higher security requirements and heavier bandwidth loads required by IP CCTV security devices,” Cheng said. “Another benefit the partnership gives our customers is the advanced ordering and logistics systems offered by Ingram Micro.” Meanwhile, Ingram Micro business manager, Sunny Gandhi, said the new relationship complemented its fast growing security and video surveillance business. “We are providing resellers with the capability to offer full end-to-end security solutions without them needing to have their own in-house specialist engineering and design teams,” Gandhi said.

se&n 11

SEM0917_10news.indd 11

29/8/17 1:18 pm


NEWS SEPTEMBER 2017

SECURITY GROUP WINS MAJOR SA WATER SECURITY CONTRACT n SA Water has awarded AG Security Group a major enterprise security contract that integrates fencing, automatic gates, video surveillance, access control and a security management system. SA Water is the South Australian State Government entity responsible for managing the state’s water infrastructure. The security contract program of works incorporates integrated electronic and perimeter security upgrades across a majority of their sites over a 3-year period. “Our team is excited to continue working with SA Water,” said Michael O’Connell, managing director of AG Security Group. “We are a progressive organisation when it comes to security, so to be chosen as a partner in delivering their

security requirements is a real privilege for us. “To have a single security partner that can integrate surveillance, access control and sophisticated software with their monitored security fencing, automated gates, turnstiles and other perimeter security technologies means the security solution becomes a vital part of a client’s security infrastructure. Further, information gathered by the system is also valued by other teams managing critical functions, such as human resources and safety.” AG Security Group has been servicing utility entities is the energy and water industries for more than 15 years and delivers both electronic and perimeter security solutions with minimal reliability on external contractors. This capability

is favoured by utility groups due to their large number of sites of varying sizes and complexity, in addition to their vast geographical dispersion. SA Water is a utility based in South Australian that manages, maintains and operates (with the assistance of its partners) assets worth $A13 billion, including thousands of kilometres of pipelines

and pumping stations, 30 water treatment plants, 24 wastewater treatment plants, 16 reservoirs with a total capacity of almost 200,000 megalitres, as well as desalination plants at Port Stanvac near Lonsdale and at Penneshaw. SA Water employs more than 1500 people and has its head office in Victoria Square in Adelaide (SA Water House), with

additional staff location across South Australia including offices in Mount Gambier, Berri, Mount Barker, Port Lincoln and Crystal Brook as well as Victoria and New South Wales. SA Water’s customer service centre operates out of the head office in Victoria Square. SA Water House is also the headquarters of the Australian Water Quality Centre (AWQC).

Keep the everyday moving. With extraordinary Sony 4K technology. Little details are important, especially when it comes to making quick decisions. Sony 4K’s cropping and tracking capabilities enable you to follow multiple objects or individuals – and improved analytics mean you can identify issues, share information and control transport flow more efficiently than ever before.

Discover more about how Sony 4K can help transform your business at boschsecurity.com/sonyvideosecurity

12 se&n Medium

Size (W x H) SEM0917_10news.indd 12

SAP No. 185 x 125 mm (+ 3 mm)

Language

EN

Color mode

4c / ISO coated v2 (ECI)

Notes

PDF-Standard: PDF/X-4:2010 29/8/17 1:18 pm


Powerful web based controller, powered by smart devices. Now g rtin Suppo ss Wirele es ic Dev

IN

AU

Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone.

Security Alarm

Access Control

Automation

STRA

L

With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate. For more information simply scan the QR code or visit innerrange.com.

No Software Required

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM0917_13.indd 1

IGNED

IA

S DE

Multiple Devices

Easy Setup with Checklist Prompting

T: 1300 319 499

Send IP Alarms via the Multipath-IP Network

W: csd.com.au

29/8/17 10:07 am


NEWS SEPTEMBER 2017

WESTERN AUSTRALIA POLICE PLANS CCTV, SMS UPGRADE FOR PERTH POLICE CENTRE n WESTERN Australia Police is planning a CCTV and security management system upgrade for the 250-camera CCTV system at Perth Police Centre. Built by BGC and opened in 2013, the $A93 million Perth Police Centre houses up to 500 police officers and support staff and is the biggest WA Police capital works project ever undertaken. The complex contains the Perth Police Station, the Central Metropolitan District Office, the new Perth Watch House and the Northbridge Magistrate’s Court. The Perth Police Centre is 4 storeys high over a single level basement and has a gross floor area of 17,681 sqm. The complex is fitted with an extensive integrated CCTV solution of more than 250 cameras, including

multiple external PTZs, and has a 24-hour control room to manage access to and from the Perth Watch House, which can hold up to 72 people overnight. The centre is home to a range of specialist units including the District Crime Team, Central

Metropolitan Detectives, Traffic Unit, District Forensic Investigation Office, Crime and Intelligence Coordination Unit, Family Protection Unit and Community Policing Unit. Tenders for the project closed August 25th.

THE COMPLEX IS FITTED WITH AN EXTENSIVE INTEGRATED CCTV SOLUTION OF MORE THAN 250 CAMERAS, INCLUDING MULTIPLE EXTERNAL PTZs.

SECURITY FOR 2028 LOS ANGELES OLYMPIC GAMES WILL EXCEED $US2B n SECURITY technology will play a central role in protecting the Summer Olympics in Los Angeles, officials say, with a focus on detection and prevention and a cost that may exceed $US2 billion. Los Angeles Police Chief Charlie Beck told the Los Angeles Times, with detection and prevention more vital than show of force. He expects the traditional threats of

explosives, guns and other deadly weapons would remain, but a new generation of terror and sabotage will likely evolve. “It is tough to say,” Beck said of the future threats. “I would imagine by that time cybersecurity is going to be all encompassing. It will be the financial security of the Games, the financial security of the city, the protection of infrastructure

from hackers.” The 2028 Olympic Games are set to be declared a national special security event and the U.S. federal government, through the Secret Service, will lead a multiple-agency law enforcement effort. Beck said the approach is going to be vital because of the vast numbers of personnel needed over so many weeks. Meanwhile, Mike Downing,

former deputy chief of counterterrorism at the LAPD, told the Times agencies must not react to an attack like the 1996 Atlanta Olympics bombing but thwart it. “It is great to have the firepower, but the prevention side of the equation is so much more important: good intelligence and good disruption,” he said. Downing, now executive vice president of security for Prevent Advisors who advises major venues, said that at the 1984 Olympics he sat atop a building at UCLA with night vision goggles while today, the city can be blanketed with cameras aided by facial recognition technology. “You can put them (IVA-enabled cameras) up and take them down, position them at all major points and use mesh networks to support them,” Downing said.

THREE CROWNS LAUNCHES SECUREGO VSAAS PLATFORM IN AUSTRALIA THREE Crowns Technologies, an offshoot of respected integrator and tech house Coastal Comms, has released SecureGo, a video surveillance as a service platform designed to offer installers, integrators and their end user customers a secure and highly functional cloud-based video management solution. The SecureGo platform is a video surveillance management tool that links cameras in the field to the SecureGo cloud via 4G where they can be accessed by mobile devices and remote workstations over a highly secure private network. According to SecureGo’s Russell Holt, the platform allows connection from any location and is perfect for IoT applications, offering data analysis, alarms, and rulesbased automation and reporting. “Built around Milestone XProtect VMS and supported by our proven network infrastructure, SecureGo is plug and play, requiring no NVRs, and is compatible with more than 6000 camera models,” Holt said. “Our cost per camera has come right down to as little as $0.85 per day per camera, which makes it cheaper than an NVR solution.”

THE COMPLEX I AN EXTENSIVE I CCTV SOLUTION 250 CAMERAS, MULTIPLE EXTE

Russell Holt (left) with Chris Lane

14 se&n

SEM0917_10news.indd 14

29/8/17 1:18 pm


Intelligence runs in the family

CEM Systems’ range of intelligent card readers are some of the most advanced in the industry and are continually kept up to date to reflect the latest advances in security technology. With features including card reader and controller functionality combined in one device, user friendly touchscreens and LCD screens, keypad for added PIN security and internal databases, CEM Systems’ range of multi-technology card readers uniquely provide distributed intelligence within your security system and ensure the highest possible level of system reliability.

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au For more information:

www.facebook.com/HillsLtd/

Call: +44 (0)28 9045 6767 Email: cem.info@tycoint.com CON N E CT E N T E RTA I N S E C U R E Visit: www.cemsys.com © 2016 Tyco Security Products. All Rights Reserved. SEM0917_15.indd 1

29/8/17 10:07 am


NEWS SEPTEMBER 2017

GALLAGHER F4 FENCE CONTROLLER WINS OUTDOOR PERIMETER PROTECTION AWARD n GALLAGHER Security’s F4 Fence Controller has been recognized for its industry-leading innovation, winning the Outdoor Perimeter Protection category at the Security Today 2017 New Product of the Year Awards. The awards honour outstanding product development achievements of security equipment manufacturers whose products are considered to be particularly noteworthy in their ability to improve security. The accolade makes it 2 in a row for Gallagher – the company also winning in the same category in 2016 for the F3 Fence Controller.

Michael Collins, vice president of Gallagher Security in North America, said Gallagher was delighted with the win. “Our strong focus on research and development is the cornerstone of our innovative solutions, helping us redefine what’s possible for our customers and the security industry as a whole,” said Collins. “It’s fantastic to have that acknowledged with this award.” Described as the next generation in highperformance control for the Gallagher monitored pulse fence system, the F4 Fence Controller

was recognized for its superior deter and detect capabilities, while also exceeding global safety standards.

“The New Product of the Year contest gives us a terrific sampling of security solutions, but what is more amazing each year is the

technical savvy that comes along with new products,” said Ralph C. Jensen, editor in chief of Security Today magazine.

They see city streets that are safe and secure. You see smart data that helps to improve public transport. Bosch empowers you to build a safer and more secure world. And with built-in video analytics as standard in our IP 7000 cameras and above, we enable you to use video data for more than security alone. Use collected data to optimise public transport schedules and to improve levels of security.

+1

People counting

Queuing alarm

Find out more at boschsecurity.com.au or email stales@au.bosch.com Alerts only when needed

16 se&n

SEM0917_10news.indd 16

29/8/17 1:18 pm


Complete Security Integration...

Download the free TSP App from

www.tyco-tsp.com

Watch

Touch

Detect

Expand Your Offerings to Cover Intrusion, Video and Access Control with One Single Solution A powerfully complete solution - simple to manage and easy to install. All in-one integrated intrusion, video surveillance and access control gives users greater control through one single and easy to use interface, while giving you a simple and quick to install solution to boost your revenue and amplify your business opportunities.

• • •

Kantech access control + Exacq video surveillance + DSC intrusion All managed and accessed from 1 platform - Choice of Kantech or Exacq users Download the app, scan the shopping bag image below and watch a video of how our products integrate together to give you a powerful, complete solution.

For more information or more products from Australia’s largest range of security systems call 1800 685 487 or visit hills.com.au/ branches for your nearest location nationwide.

For more information:

Pacific office 137 McCredie RoadGuildford, NSW 2161, Australia Tel: +612 8717 2000 © 2017 Tyco Security Products. All Rights Reserved.

SEM0917_17.indd 1

29/8/17 4:20 pm


y

m

wan. s the on

ian by many deo e.

ng from uenca – the m in

NEWS SEPTEMBER 2017

BGWT ENTERS HIRING PHASE AFTER DSC DISTRIBUTION WIN

Rob Meachem

n BGWT’S Robert Meachem says the company is now in a hiring phase after winning DSC distribution recently. “In addition to training our current team members, we are hiring alarm-intrusion specialists, a focused team including senior product manager, technical sales BDMs and customer service personnel around the country,” Meachem said. “We aim to have a number of these roles filled in August and September and SEN readers interested in these positions should contact me or go to our website and lodge their details on our careers page.”

DNA CONNECT DISTRIBUTING AVIGILON TO AUSTRALIAN MARKET n DNA Connect has entered into a distribution agreement with Avigilon to sell Avigilon’s complete array of surveillance solutions to the Australian market. DNA will leverage its existing channel to promote new solutions geared towards emerging end-user requirements, such as ‘Smart-everything, Internet-of-Things (IoT) and Big Data’ integration. DNA has 24 years in the IT industry as a successful distributor of integrated systems, and its mature in-house CustomerConnect, TechConnect and KnowledgeConnect programs. “Developing on our strategy for 2017 to expand our partner channel within the APAC region, we are excited to appoint DNA as value-added distributor in Australia,” said Graham Wheeler, VP Sales for APAC at Avigilon. “DNA’s specializations in IT and analytics will support the development of smarter solutions and will further

help us expand into both industrial and IT verticals.” Avigilon’s video analytics technology can automatically analyze video data from multiple sources to quickly locate persons and vehicles. Users can transform video from a reactive, post incident tool to a proactive tool. DNA has started to integrate Avigilon’s video analytics information into DNA’s existing Big Data and IoT platforms, allowing end-users to make more informed decisions; in effect enabling DNA to offer solutions to their

customers to “digitize the physical world”. “Avigilon is the perfect partner for us to work with to accelerate our goal of helping our channel partners bring the physical and digital worlds together,” said Munsoor Khan, director of DNA Connect. “There is a growing need to integrate video data with IT data to build intelligent analytics systems that make smarter decisions. This is going to be especially important as technology continues to enhance urban environments.

Graham Wheeler

NETWORKING SPECIALIST COMNET RELEASES 2 ACCESS CONTROL SOLUTIONS n COMNET is moving into the access control market with the release of 2 new access controllers, the CNA100 for 2-8 doors and the CNA200 for systems up to 32 doors. the CNA100 can be expended to 32 doors with a software upgrade. CNAccess controllers feature embedded intelligence so there’s no need for dedicated software or PC, allowing users to manage a system

from any location with internet access. There’s support for Wiegand, Schlage AD Series electronic locks, and various card formats and technologies such as proximity, smart card, magnetic stripe and Bluetooth. The CNAcccess line will consist of these two products as well as the complimentary line of reader interface products, proximity readers, power

supplies and accessories. “We’ve spent a lot of time and effort focusing on the next step in the ComNet growth cycle,” said Andrew Acquarulo Jr, ComNet CEO and president. “We were looking for a natural extension of the business. Now that ComNet has been acquired by ACRE, we were able to source a quality product and it gave us a huge advantage in gaining an access control product line that has a great appeal.” “The CNAccess line represents ComNet’s decision to package a quality access control product with an application specific communication solution tailored directly to our customers’ needs,” said

Skip Haight, ComNet VP of marketing. “It is a major undertaking, but we believe there is a great need for these products - adding the CNAccess line will differentiate ComNet from other manufacturers and creates significant value for the user.”

THE CNACCESS LINE REPRESENTS COMNET’S DECISION TO PACKAGE A QUALITY ACCESS CONTROL PRODUCT WITH AN APPLICATION SPECIFIC COMMUNICATION SOLUTION TAILORED DIRECTLY TO OUR CUSTOMERS’ NEEDS

TIM SHARMAN JOINS CONSOLIDATED SECURITY MERCHANTS TIM Sharman has joined Consolidated Security Merchants as WA branch manager. “Tim brings with him a wealth of experience from 20+ years in Security Wholesale and 5 years in security integration,” said CSM’s Wayne Trethowan. “Highly experienced in the WA market, Tim knows the industry from both a wholesale and an integration perspective.” Originally from the UK, Sharman was an electrician by trade and then moved to technical sales. He has many industry qualifications including a Diploma in Video Content Analysis and IP Technology Architecture. “Consolidated Security Merchants is currently expanding operations with its WA branch, moving from Malaga to Balcatta and has appointed of Tony Cuenca as business development manager in the region – the appointment of Tim is a welcome addition to the growing Consolidated Security Merchants team in WA,” Trethowan said.

Mike Tim Sharman Richardson

18 se&n

SEM0917_10news.indd 18

29/8/17 1:18 pm


SEM0917_19.indd 1

29/8/17 10:06 am


NEWS JU S ELY PTE 20 M1B7E R 2 0 1 7

MELBOURNE UNDERGROUND RAIL LOOP INITIATES SECURITY, FIRE AND SAFETY UPGRADE, STAGE 2 n MELBOURNE Underground Rail Loop’s Fire and Safety Upgrade (Stage 2) and Intruder Alarm Project integrates fire control, intrusion detection, access control and video surveillance. The project, which has been taken to tender by Metro Trains Melbourne, will improve the safety of the Melbourne Underground Rail Loop (MURL) stations by upgrading aspects of the emergency management systems and infrastructure. The Stage 2 works have the following scope: * Upgrade station sprinkler systems at Melbourne Central Station, Parliament Station and Flagstaff Station. * Provide a smoke management system at Melbourne Central Station based on mechanical exhaust of smoke through platform ducts located

above platforms. * Provide mechanical smoke management systems at Parliament and Flagstaff Stations based on mechanical exhaust of smoke through the draught relief shafts (no platform ductwork). Roll out of the tunnel intruder alarm system (TIAS) which incorporates the following: * Main Fibre Network Fitted to tunnels, MURL stations, ventilation shafts and substations. * CCTV * GE Challenger security system to key access points across the MURL * Proposed detection system at platform ends. The minimum level of local content set for this project is 74 per cent for the preconstruction and construction phase of the project as well as maximise the use of locally-milled steel

fabricated products where possible. The City Loop (originally called the Melbourne Underground Rail Loop or MURL) is a mostlyunderground, partly surface-level and partly elevated subway and rail system around the central business district of Melbourne, Victoria, Australia. The loop includes the city’s 2 largest (both aboveground) stations: Flinders Street and Southern Cross (formerly Spencer Street); and 3 underground stations: Flagstaff, Melbourne Central (formerly Museum) and Parliament. Melbourne’s 15 radial suburban railway lines feed into the Loop at its north western and south eastern corners. The underground section of the Loop follows La Trobe and Spring Streets along

the northern and eastern edges of the CBD’s street grid. The total length of tunnels in the Loop is 12 km with 10 km of circular tunnels, and 2 km of box tunnels. The four tunnels have an average length of 3.74 km, with a further kilometre of track connecting with surface tracks. Tunnelling of

the MURL began in 1972 and the eventual cost of the project was $A500,000,000 when completed in 1978. This security and safety tender closes on 31-102017, with construction commencing on November 2017 and construction to be completed by December 2019.

www.illuminatedbellbox.com

Illuminate your logo, elevate your brand, deliver the highest quality security. The new Odyssey X Series brings innovation and a modern twist to external sounders, providing unparalleled performance and extensive features to benefit installers and end users alike. Call Security Distributors Australia on 1300 882 101 or email info@securitydistributors.com.au

Half page Ad_OdyX.indd 1

20 se&n

SEM0917_10news.indd 20

28/8/17 10:31 am

29/8/17 1:18 pm


www.lscsecuritysupplies.com.au Tel: 1300 64 62 69

SEM0917_21.indd 1

http://au.ingrammicro.com/ Tel: 1300 651 124

29/8/17 10:06 am


● Regulars

The Interview

Proof of Life SEN editor John Adams speaks with SCSI’s Dale Acott and Chad Wright about the future of alarm monitoring, automation and IoT, the company’s new lifestyle technology play, and the end of the alarm panel as we know it. JA: Before we talk about SCSI’s ground-breaking new solution, let’s talk about telecommunications for a moment. What’s your take on NBN? It’s a facilitator of change – no doubt – but is NBN as we know it good enough to be the roadway of the IoT future? DA: Fixed line services in Australia are generally of poor quality – let’s be honest, the NBN is not a great service – in some cases it’s no better than customers were getting with ADSL. If you compare that to a 4G SIM card which is pulling 80-90Mb with no interruption and no contention, the answer to that question is clear. That’s why we have always had a private wireless network to support our customers – high security, high uptime, no contention. JA: SCSI is a wireless specialist – given this expertise, could you explain to readers what 5G is? CW: 5G is an unknown at present from the point of view of underlying technology because 5G is an operational specification – a benchmark. Because the providers are unlocking capacity from multiple layers of wireless technology as we speak, it’s very hard to establish exactly what is possible. Obviously, it’s going to

Dale Acott (left) with Chad Wright

be better than anything the market has seen before where it’s possible to provide it. And that’s where the impact of new technology, of automation on IP networks comes into the equation. These new technologies allow monitoring stations to give customers a level of functionality they will be prepared to pay for because they will see a clear ROI – enhancements to security, enhancements to safety, improvements in efficiency. JA: From the point of view of SCSI what is the future of your business, is it an Australia-centric business model or do you have your sights set further afield?

CW: We will always do business in Australia but it’s a connected world and we have solutions that meet the demands of a connected world so we are planning to expand OS. DA: The broader business relationship is that SCSI has its sights set on America. We partner with Bold Technologies – we have 5 Bold monitoring stations with more on the way. Bold is a partner with more than 600 central stations and 12 million lines. We want to work more closely with Bold by integrating our products with their technology. The monitoring business is about more than today, it’s about what you can sell and support into the future

22 se&n

SEM0917_22interview.indd 22

29/8/17 5:42 pm


DALE ACOT T AND CHAD WRIGHT WITH JOHN ADAMS

THE TRACK WE ARE PLANNING TO GO DOWN INVOLVES BRINGING THE ALARM PANEL AND THE MONITORING STATION INTO A SMART WORLD AND DOING IT IN A WAY NOBODY ELSE IS DOING IT.

screen router ever made and was the first Wi-Fi router hardware to have Amazon Alexa integration. Our solution delivers everything any user and any installer or monitoring provider needs. We have 2 models suiting both the DIY and integrator installed markets, including professional monitoring, or users can make use of monitoring on demand. You can control any device from its app – view cameras, answer intercoms. You can even manage the smart devices that are accessing the internet via your router. But more than that, it’s about making all this functionality as simple as possible. And it helps customers manage all aspects of their lives. It can control automation, lights, anything you can think of – voice activation, IoT, set up rules – when you arrive home, the lights turn on, air conditioning activates – it’s more than that. Everything can be done from the touchscreen or via the app – you don’t need to pull out a laptop to program it. There’s a basic DIY-style version and a version that is driven by us. So, it’s a hybrid solution in one sense. JA: Will the solution be deviceagnostic? For instance, will it support all Z-Wave devices? – about how you can meet customer’s developing needs. We’ve spent a lot of money over the past 18 months on product development in the professional space with our 4G DTU – we are looking at providing additional services with that. The track we are planning to go down involves bringing the alarm panel and the monitoring station into a smart world and doing it in a way nobody else is doing it. I see the solid-state alarm panel as going extinct. In the future, the controller will be built into a customer’s router. Every household has a wireless router and sensors and other devices will report events via the router in flexible ways

allowing expanded functionality and multiple new business models. JA: And SCSI is going to get involved in providing that smart router solution? CW: We are partnering with a new company on a third gen product. It’s not just a router – this product offers everything a customer might want to manage any aspect of technology that is important in their life. The system supports NBN, Wi-Fi mesh, has professional security monitoring built in, has IoT security built-in, it has ZigBee, professional Wi-Fi sensors, 8-hour battery backup, as well as being the first touch

CW: To all intents and purposes, it will be device-agnostic. Right now, the number of products it already works with is vast – including all certified Z-Wave and ZigBee products, for instance. You can also integrate an existing wired system into the system. Z-Wave security products now have a security standard that they must meet making them a suitable replacement for traditional security devices. We can also add a Bluetooth module if that becomes more prevalent in the future. JA: This product competes with traditional intrusion manufacturers? DA: Yes, it does. Traditional intrusion

se&n 23

SEM0917_22interview.indd 23

29/8/17 5:42 pm


● Regulars

The Interview

manufacturers are falling behind. As a telecommunications company, we’ve spent the last 20 years and a lot of money building wireless modules in parallel with traditional manufacturers that will allow various solid-state alarm panels to handshake with advanced communications technologies. We don’t need to do that any longer. The DirectWireless DTU we sell that is installed alongside alarm panels in the field doesn’t need an alarm panel, there are that many inputs and outputs. It could do the job by itself. What came first with this product is the coolness of an holistic management solution - not security, but the ability to manage everything – not only subsystems connected to the network, but the network itself. To monitor devices accessing the internet via the network, to manage monitoring in real time – to have an alarm event monitored when you need it not when you don’t, to have it monitoring based on event, or time of day, or when you are on holiday. It’s not about the alarm, not just about arming and disarming the system, it’s about managing your life. The cyber security/IoT security aspect of the solution is a key part, too. It’s built-in to the router as a subscription package and you select the security level you want the solution to have using a check box. The system, with everything built-in including cellular data, IoT and professional monitoring will be provided at a low-cost entry point. It does not

matter where you are – if an alarm event takes place, it notifies you on your phone and you can disregard the message, respond yourself, or push the message to the control room to be actioned – you are in control of monitoring on an event by event basis – whether or not you want the control room to action a particular alarm on a particular day. JA: If SCSI also sells the service, who will the monitoring of those customers be handled by? CW: That will go through to our contracted national monitoring provider. Something to bear in mind is that this is not a security product – it’s a 4G data service – we provide the router, backup battery and sensors. JA: How many monitoring station partners does SCSI have in Australia which have an opportunity to come onboard with the new solution? DA: We have over 40 Central Station partners in Australia and we have been telling them about this development in stages for some time – we showed an early version of the product last year and at Security 2017 we told our partners everything there was to know about it. All our control room partners now have the chance to get involved. JA: What is the business model – is it Alarm.com, is it MONI? What is the business of SCSI?

CW: In terms of the business model we are offering our monitoring station partners, this is an opportunity to come on board with the solution but at the same time SCSI (and this is where people may struggle with it – but shouldn’t) will be promoting it directly to the public using a professional marketing company. We have a promotional programme that we have invested a lot in to ensure awareness of the product and its capabilities. At the same time, partners signing up can promote and sell the product direct, they can provide additional subscription based services, they can choose whatever rates they want to charge – we are providing partners with a solution that they can create whatever business model they like. JA: Is this a change of direction for SCSI? CW: Not fundamentally. People see us as a security company but we are a telecommunications company and that’s something our partners can leverage – they can offer customers not just security and automation services, but data services for Internet as well. We are putting a solution of great power into the hands of consumers but we are also putting a solution of great power into the hands of our monitoring partners. At the retail level, we have our prices but partners can price services as they see fit based on the services they choose to provide. They might offer data, IoT and security – when users are selecting a level of service those fees will show up in the app based on the service provider. If an installer is setting up a system for a customer they use the app to select a plan – and that will include monitoring and alarm response, all done via the app. JA: What has the response from the market been? DA: Some people have been challenged by this business model. For some monitoring stations, it’s all about a guaranteed return based on line numbers – but the future is not going to be guaranteed – not in the old way. The future is going to be different and not everyone is going to like it. Considered in this light, some will see SCSI’s new system as a great solution and others will want to stick with what they know – they may find IP-based solutions like this threatening. JA: From what you are saying this is

24 se&n

SEM0917_22interview.indd 24

29/8/17 5:42 pm


RETAIL SOLUTIONS Specialised Cameras for Retail Integrated Surveillance Video Content Based Business Analytics Efficient Centralised Management

(02) 9749 5888

SEM0917_25.indd Security Solutions.indd1 3

eos.com.au

Formerly Samsung Techwin

29/8/17 10:06 22/08/2017 11:00:45 AMam


● Regulars

The Interview

lateral and vertical solution – there are certainly app-based solutions out there but nothing that is quite as connected to the business stack as this seems to be. You’re not just giving users multiple layers of service, you’re giving installers multiple layers of system, monitoring stations multiple layers of solution. And SCSI is getting something, too. It’s a complete re-thinking of the business model from data all the way through to IoT. I would expect something like this to come from Telstra, not SCSI – so you’re right – people do see SCSI as a security company, not a telco. You obviously see real opportunity? CW: We see a massive opportunity – we see Australia as being at the very early stages of an automation revolution but no one is actively driving in the direction we are proposing. For us this is not just about having a quality product and a good service but we think someone has to drive the business forward. We sincerely believe the security industry won’t have the capacity to drive this product and the new marketplace on its own, so we are putting our money where our mouth is promoting directly – we must put our solution up in shining lights so consumers will want and ask for it. Whether they buy it directly from us or from our partners, the security industry will obviously benefit. DA: It’s a real market disruptor – we want all our partners to be on board with it – it’s what’s needed for a future where people can stream any movie they like for 12 dollars a month. We are bringing that future to the market through the security industry, as well as through the wider retail market. We will have retail partners (who will offer monitoring services through our partner monitoring stations). JA: Fundamentally, what this gives installers and monitoring stations – with provision of data services, on-demand monitoring for clients who might never use professional monitoring and IoT services – is new revenue streams to replace rebates? DA: Yes, that’s exactly what it means - the monitoring station will get new revenue streams to replace rebates. Rebates in this country – the payment of a percentage by a telco to a monitoring provider for every call an alarm panel makes – is

a real problem. SCSI has been the biggest provider of rebates to the monitoring marketplace but at this critical junction, I can’t see the back of rebates fast enough. Rebates are still locking businesses to old technology and have seen the price of professional monitoring actually go down over a 20-year period. The NBN will have the impact of ending rebates – that’s one thing the NBN will actually do. JA: Is the Australian market ready for a solution like this? CW: It’s a consumer-based market now and we really see the wider market as being at the cusp of a major change – consumers want something more than the traditional model – they are starting to look for simple products that do everything they want it to do while offering deeper functionality and integration. In the US, the cut-off of old technologies and ways of operating has been much sharper – that’s down to rebates here – they also have more home automation. But we are going to another level, it’s an entire communication system – it’s everything the user could want in terms of comms, security, automation – management of internet traffic and smart devices – everything.

JA: Will some monitoring stations see you as being in competition with them? DA: For some that will be the first thought but we are absolutely not going to be in competition with them – we will still be partnering with the industry as we have always done in the past. We are not a monitoring company and have no desire to be a monitoring company. But we do want to drive the vertical and to be intrinsic to the vertical. Simply, the market is going to go there – to automation, to IoT - and we are going to take the market there – we are going to go further than the market ever has and we are going to take our partners along for the ride. It’s an end-user driven world now and we all need to meet it. We must meet the demand of the market for an improved service, a service that offers more for a customer’s investment and a service that has new sales hooks and that is functionally simpler. I think most our partners will come with us – some may not – but rebates – that revenue has diminished by 40 per cent in the last couple of years and it simply can’t go on. The old monitoring model has been broken for a while and with this new solution, monitoring stations can get in on a much bigger solution with a much larger potential client-base at any level they choose. n

26 se&n

SEM0917_22interview.indd 26

29/8/17 5:42 pm


ion

TRANSPORT SOLUTIONS Specialised Cameras for Transportation Integrated Control Automatic Backup Real-Time Tracking and Remote Monitoring with GPS Integration

(02) 9749 5888

SEM0917_27.indd Security Solutions.indd1 4

eos.com.au

Formerly Samsung Techwin

29/8/17 10:06 22/08/2017 11:00:47 AMam


● News report

Security management

BY J O H N A D A M S

PROTECTING CROWDED PLACES Australia’s Strategy for Protecting Crowded Places from Terrorism seeks to create a framework that will increase inherent security levels in public spaces but it places the duty of care firmly on owners and operators of crowded places to undertake security audits and implement the recommendations to provide layered security for their sites. Owners or operators who fail to do so are likely to be found liable.

USTRALIA’S Strategy for Protecting A Crowded Places from Terrorism is a necessarily pragmatic document that recognises there is a terrorist threat to Australia from groups and individuals with the means and will to carry out such an attack. The document recognises that this threat is persistent and is not confined to any location. Attacks include those with vehicles, knives and firearms such as have been used to devastating effect overseas in concert halls, pedestrian walks, playgrounds, shopping malls, schools, universities, marketplaces, places of worship – anywhere people gather in vulnerable groups. The report states that while government agencies have an excellent record of stopping attacks on Australian soil, they will not be able to stop every attack and that in the event of an attack occurring,

owners and operators of public space – private and government – must protect their own locations. According to the report, owners and operators of crowded places have primary responsibility for protecting their sites and a duty of care to protect people on their sites from all foreseeable threats, including terrorism. The Strategy lays out a national framework called the Crowded Places Partnership, which will provide a consistent approach in each state between all levels of government, police and owners and operators of public space. A range of supporting materials will be made available to assist members of the Crowded Places Partnership that propose guidelines to defend against armed offenders, IEDs, hostile vehicle mitigation and more. The strategy will be reviewed regularly by the Australia-New Zealand Counter-Terrorism Committee.

28 se&n

SEM0917_28crowds.indd 28

29/8/17 1:20 pm


DARKFIGHTER X

THE NEXT LEVEL OF NIGHT SURVEILLANCE USING DUAL-SENSOR IMAGING TO PROVIDE FULL COLOUR IMAGES IN VERY LOW LIGHT SCENARIOS • One lens with two sensors: IR for brightness, Visible light for colour • Spectrum patent Bi-Spectral fusion technology to combine the best of both sensors • 25x optical zoom • Supports H.265+

Hikvision Oceania Unit 14a, 2 Eden Park Dr, Macquarie Park NSW 2113 Tel: +61 2 8599 4233 Email:salesau@hikvision.com

SEM0917_29.indd 1

www.hikvision.com.au

29/8/17 10:06 am


● News report

Security management

OWNERS AND OPERATORS ARE LIABLE The strategy makes clear it is owners and operators of crowded spaces who bear the responsibility for protecting their sites and the first aspect of this responsibility is to undertake a risk assessment or vulnerability analysis and to implement the appropriate mitigations, monitor them for effectiveness and review them regularly. Personal liability can attach to some of these obligations if they are breached, according to the document. The strategy calls for a plan to be implemented by every crowded place that prioritises saving lives and minimising harm while protecting physical assets, information, reputation and elements that could affect the business community. At all times, owners and operators remain responsible for understanding terrorist threats and adjusting their security arrangements to meet them. Owners and operators are encouraged to implement layered security which could include physical and electronic target hardening measures, such as electronic access control, physical counter measures including bollards and trained security responders, video surveillance solutions to monitor space and facilitation of co-ordinated reactions by the security teams to unfolding events. According to strategy, the layered approach works by building multiple layers of defensive redundancy around a site in such a way that failure of any one layer will not compromise overall security of the site being protected. It goes without saying that for many sites, applying layered security is going to be challenging and private security people will need to assist. Furthermore, many sites that up until now have been considered relatively secure will have to go back to the drawing board and beef up security measures or risk liability in the event of an attack. While the strategy does not

RESILIENT CROWDED PLACES CAN DO MORE TO PREVENT A TERRORIST ATTACK, CAN REDUCE THE DAMAGE CAUSED BY AN ATTACK AND CAN RECOVER MORE QUICKLY AFTER AN ATTACK - BUILDING A STRONG SECURITY CULTURE IS CENTRAL TO DEVELOPING RESILIENCE TO TERRORISM.

demand every site install the highest levels of security, most crowded places will need to install additional measures – some will have to start from scratch.

DETER, DETECT, DELAY, RESPOND The strategy calls for deterring an attack with physical and electronic target hardening, including fencing, perimeter security lighting, warning signs, security patrols, CCTV cameras, vehicle security barriers and bollards. Terrorist attack detection systems are described as CCTV cameras, intrusion detection systems, active reporting by staff, security teams or the public, vehicle screening and searching, canine explosives detection, X-ray machines, metal detectors and explosives detection systems. The security solutions implemented must delay terrorists using security fences, environmental barriers, vehicle security barriers, pedestrian and traffic access points, trained staff interventions and rapid security response. And there must be a response to attacks via trained security staff, reliable emergency communications systems and comprehensive security plans that are understood by all staff and security personnel, regularly exercised and compatible with local emergency services plans. The breadth and depth of the various security solutions and measures suggested in the document relates to the different risk levels and disparate size of crowded places envisaged by the authors – a large sports ground on one hand and a busy local pub on the other. The report recognises the expense of security and states that owners and operators must prioritise the highest risk areas of their crowded place and should try to incorporate security measures into site design where possible to reduce costs. Also considered vital under the strategy is fast recovery from terror attack – that means adjusting operations to ensure minimum exposure of high risk assets to the most vulnerable areas of a site. There must be a business continuity plan, a high level of training, as well as cross-training of skills. There must be documented procedures so staff can readily perform unfamiliar tasks, relocation bases outside the primary location, remote access to IT services incorporating backup, alternative essential equipment and out of hours contact for critical personnel. According to the strategy, resilient crowded places can do more to prevent a terrorist attack, can reduce the damage caused by an attack and can recover more quickly after an attack - building a strong security culture is central to developing resilience to terrorism, states the strategy. n

30 se&n

SEM0917_28crowds.indd 30

29/8/17 1:20 pm


ATTENTION INTEGRATORS GOLD CLASS MOBILE ACCESS PROMOTION Upgrade your customers to experience the benefits of GOLD CLASS MOBILE ACCESS on their mobile device.

Increase your own income.

AT NO COST

Complimentary award winning HID Readers and Credentials Exclusive to ISCS

“Only having to carry one device for so many daily tasks is excellent.” ALISON BROWN Facilities, Operations & Events Manager, Netflix

AN ARA PRODUCTS COMPANY

HID Mobile Access®

Secure, convenient access control via your mobile device

ISCS is Australia’s HID Platinum Partner distributor

Contact

goldclass@iscs.com.au or 1300 111 010 and quote code GOLDCLASS Any size company considered, new or existing customers

SEM0917_31.indd 1

29/8/17 10:06 am


â—? Product review

Samsung

SAMSUNG WISENET X XNO-8080R BULLET Samsung Wisenet X XNO-8080R is a 5MP bullet camera with WiseStream II support, a speedy F1.2 motorised varifocal lens with a range of 3.7-9.4mm, 30ips of resolution, H.264 and H.265 compression, 50m IR range, IP67/IP66, NEMA 4X and IK10 ratings against weather and vandalism, and video analytics including loitering, sound classification, fog detection, digital auto tracking and tampering.

32 se&n

SEM0917_32samsug.indd 32

29/8/17 2:40 pm


BY J O H N A D A M S

AMSUNG’S XNO-8080R 5MP bullet camera with WiseStream II support is a capable all-rounder, specifically designed and built for tough outdoor applications. Everything about the spec is hardy – holding this camera in the hand is a pleasure and I get no sense of shortcuts in construction. Fortunately for SEN, manufacturers tend to send us their top-end gear to play with so it’s never hard to get excited about the high-quality cameras we test. Some are better than others and the 8080R is definitely in the better group. Typical Samsung, this camera is wonderfully built – everything fits together very nicely and the cable arrangement is tidy, although the RJ45 port inside the base of the camera requires a tight loop during installation. Physically, the beautifully built castaluminium housing is 2.2kg and the dimensions are 391cm x 368.6cm. The 8080R has IP67 and IP66 ratings against weather, IK10 rating against vandalism and an integrated poly sunshade, which can intrude into the angle of view when extended at full wide. Temperature range is -40 to 55C and maximum power draw (PoE, 12V DC or 24 V AC) is 12.5W. Optically, the 8080R has a fast F1.2 aperture motorised varifocal lens with a focal range of 3.7mm to 9.4mm. The lens has the usual magnesium fluoride coating on at least the first element – possibly additional elements, too, given its solid resistance to flare. When it comes to sensing, the 8080R delivers a resolution of 2560 x 1920 pixels from its 1/1.8-inch progressive scan CMOS sensor. Minimum scene illumination in colour wide open at a focal length of 3.7mm and an aperture of F1.2 is .07 lux at 1/30th sec – in monochrome with IR activated, it’s 0 lux. The Wisenet X series has WDR number of up to 150dB in some cases – the 8080R is 120dB – and there’s H.264 and H.265 Part 10 compression options in a range of resolutions. Camera functions include day/night and IR, backlight compensation, wide dynamic range, contrast enhancement, digital noise reduction, digital image stabilisation, de-fog, motion detection in 8 polygonal zones, gain control, white balance, contrast, lens distortion correction, electronic shutter, digital PTZ; flip, mirror and hallway views; and IVA. The IVA capabilities include loitering, direction detection, fog detection, digital auto tracking, sound classification, tampering, motion detection and handover. The camera has SD/SDHC/SDXC slot, alarm input

S

TYPICAL SAMSUNG, THIS CAMERA IS WONDERFULLY BUILT – EVERYTHING FITS TOGETHER VERY NICELY AND THE CABLE ARRANGEMENT IS TIDY...

Subject at 25m, focal length 9.4mm

Digital zoom at 9.4mm

Plates at digital zoom

Plates and D of F.

se&n 33

SEM0917_32samsug.indd 33

29/8/17 2:40 pm


● Product review

Samsung THE 3.7MM TO 9.4MM MOTORISED VARIFOCAL IS IDEAL FOR THE STREET WORK THAT TYPIFIES OUR TESTING GROUND.

Lane at 9.4mm

and output, alarm triggers on alarm event, motion, network failure, and audio, with alarm events including file upload to ftp, email, local or remote storage, external output or a remote PTZ preset. This camera has an internal web viewer and up to 20 users can access the camera simultaneously. There’s bi-directional audio and there are a couple of audio compression formats to select from, including G.711 and G.726.

CAMERA PERFORMANCE

With digital zoom

Back at 9.4mm at night in colour

How is the performance of the XNO-8080R? It’s strong, considering the constraints of the camera’s compact focal range. The 3.7mm to 9.4mm motorised varifocal is ideal for the street work that typifies our testing ground. As mentioned, I leave the camera at 9.4mm for most of the test and find the long end and some digital zoom does a great job in lane and on street. The cameras elevated resolution makes digital zoom a bonus – I can wind in a few mouse clicks and still be at full HD on the monitor. I have the bitrate locked at 6Mbps – not low but nothing a local link cannot happily handle. Is the extra bitrate worth the extra detail? Yes, it is. I mess up when testing this camera – going from the wide end to the long end in the lane I miss the little focus icon under the zoom slider and wrongly assume the process is automatic. This mistake makes me think the camera is softer optically and digitally for an hour or so of testing. It’s only when I spin the camera around that I go searching for the focus button. Once I find it, performance is considerably improved. The 8080R exhibits mild longitudinal chromatic aberrations in form of purple fringing around high contrast edges – at F1.2, this is a fast lens, and that speed is contributing. The setup I like best in variable scenes is WDR locked into its lowest setting. For this application, medium and high WDR are too warm and impact on overall colour rendition. In the lane, I find backlight compensation is sufficient to dig detail out of variable scenes but out front in deep shadow and full sun, BLC is not sufficient. The camera exposes for the near side, over exposing the far side of the street. WDR low is the answer. I’m driving the camera using the usual SEN test bed – a Dell 9020 Optiplex i7 – and we have no other cameras operating on the network. Something I notice with the 8080R is some latency that’s a bit longer than usual – around half a second, in my

In night mode, shutter speed drops

34 se&n

SEM0917_32samsug.indd 34

29/8/17 2:40 pm


ComNet is the Solution to Your Communication Challenge

GUARANTEED PERFORMANCE TODAY - AND TOMORROW

When network

dependability is critical, the transmission products you choose today affect how your network performs tomorrow. ComNet – Communication Solutions for the Long Term • Only ComNet Offers a Complete Fiber Optic, Copper, and Wireless Communication Solution • ComNet Products are • Exclusive • Experienced ComNet Customer Care Specialists Who Understand Your Application are Here to Support Your Every Need

www.comnet.net ComNet Products are distributed by: Tel: + 61 3 9378 2450 | Fax : + 61 3 9337 9905 www.allguard.com.au | info@allguard.com.au 25 - 27 July 2018 | Stand K9 Melbourne Convention & Exhibition Centre SEM0917_35.indd 1

sales-europe@comnet.net | +44 (0)113 307 6400

30/8/17 12:37 pm


● Product review

Samsung

WHAT I SUSPECTED WAS EXCELLENT DEPTH OF FIELD LOOKING UP THE LANE IS CONFIRMED AS MULTIPLE GROUPS MOVE THROUGH THE SCENE TENS OF METRES APART. estimation. Viewing the live stream latency is not an issue and the video stream itself flows smoothly at 25ips. I kick off the test looking up the lane in the late afternoon. I notice some CAs, high levels of detail in brickwork, modest barrel distortion at full wide, strong colour rendition, a pleasing tendency to expose for the focal point – the sky is over exposed, which is ideal. After spending a little time at 3.7mm I go through the process of zooming in to 9.4mm on the motorised zoom. This process involves hopping into setup, then video and audio, and then focus setup. Once you’ve clicked to required focal length, you need to hit the little focus button. Next, I swing the 8080R down the lane to view a road plant that’s between 40-50 metres from the lens. Colour rendition is very good. What I suspected was excellent depth of field looking up the lane is confirmed as multiple groups move through the scene tens of metres apart. It’s not just that the depth of field is strong – the higher resolution of the 2560 x 1920-pixel sensor is coming into play here, too, as is my selection of a slightly longer focal length.

Something to note is that the 2560 x 1920 image stream is displayed in 4:3 aspect ratio on my 16:9 full HD monitor. Performance holds well as light levels fall. Noise in static scenes is very well controlled. As light levels fall the colour temperature shifts to cooler tones (I am still at WDR low and I decide to stay there to help with street lights and headlights). I am still getting good detail of clothing with no excessive blurring as we approach 5.30pm, which is twilight in Sydney this time of year. About 5 minutes later pedestrians begin to smudge a little and fifteen minutes later, we have full streetlighting in the lane and our detail is back again. At 5.46pm, the camera switches over into night mode. I have a play with this for a while – light at the lens is sub-2 lux, and IR is now activated. The shutter speed has slowed down too – it must be

36 se&n

SEM0917_32samsug.indd 36

29/8/17 2:41 pm


EVOLUTION BUILDING ACCESS CONTROL SYSTEM

NEW FEATURES COMING IN

2017!

Cloud Stage-1 Solution: l Multiple backup locations (local and cloud)

l FTP backup location (send database to ftp server)

l Updating the SPR CCTV DVR interface two h265.

l This is one of the first to move to

FRTWEAERE!

SOF CATCHES NO

the new codec technology. We suspect the large brands (HikVision and Dahua) will follow suit soon. One the updated SDK is available we will upgrade their interfaces. Cloud Stage- 2 Solution: l Running Evolution in on a virtual cloud desktop

l Moving more of the software and communication to the cloud.

SIGN U P TO OU R N E WS L E T T E R FO R T HE LATEST NE WS AND INFO ! E MAIL KATIE @C STEC H . BIZ TO SI GN UP N OW! CS Tech_FP ad sept17.indd 1

29/8/17 4:23 pm


● Product review

Plates in colour 4 lux at lens

Pedestrains at 4 lux

In night mode – plates

Some blur – note IR strength

Samsung at 1/50th of a second and I am experiencing slight motion blur at 50m. I lock the camera into colour and lo and behold, the motion blur has gone. There’s more than sufficient light in the lane to give excellent colour rendition but I am not getting faces, even close to the lens, nor plates, though control of headlight blooming is good. Something I notice as a pedestrian comes up the lane is the camera’s tendency to escalate ISO in areas of the scene experiencing movement – it’s more pronounced with vehicles but more on that later. Next morning, I swing the camera back around to check out WDR performance – it’s strong. There’s plenty of detail – in fact, I have a plate at about 60m into morning sun, as well as tons of fine detail from adjacent surfaces. This is great performance. Depth of field in these conditions is very good, too. It’s not just good from close to the lens to the plate but it remains tight off into the distance and this comes down to the strong resolution, not only the solid WDR performance. Shifting the camera to the front balcony is instructive, too. I begin out here with standard settings and noting the over exposure on the bright side of the street, I activate WDR low, which improves depth of field by levelling the exposure. The overall scene is a little on the warm side but it’s a big improvement. This is a great scene to test cameras destined for the street, with plenty of foot and street traffic, and a proper depth of field – out towards 100m by the time we are at Albion Street. It’s here I start to get a real appreciation of the camera’s ability to look deep into scenes and snare plates and faces. That relatively modest focal length is part of the reason for this performance but the other part is the increased resolution. I’m driving through the browser and find myself rolling in the digital zoom with the mouse wheel and pulling the image to frame cars and pedestrians – this capability makes the 8080R a real weapon for live street surveillance. I also notice that I get more than usually good levels of detail over the road of pedestrians in the brightest part of the scene. It’s not crystal clear but I’m getting borderline court admissible faces and high levels of clothing detail. With images captured under digital zoom I’m getting court admissible face recognition at 25m, which is exceptionally good. Close to the camera, I’m getting excellent face recognition and the more I make use of digital zoom during captures, the better these images prove to be. Depth of field is always great, too. As the afternoon wears on, I start getting a little blur/noise around fast-moving objects – arms and feet – on the shaded side of the street but plates of fast moving vehicles remain and I find the camera is able to hold them much later into the evening than I’d have expected for a higher resolution sensor. This camera is able to get a plate at around 45kmph at 5.24pm when I measure 20 lux in the

38 se&n

SEM0917_32samsug.indd 38

29/8/17 2:41 pm


WDR performance is outstanding.

5.30pm is the camera’s tendency to boost ISO around movement – I mean really boost ISO. It was this boosting of amplification that snared me the plates at 5.24pm and while it helps with detail later on, it’s not sufficient to give me plates unless they are black and white – in such cases I find I can get a couple of digits or letters, not the full plate. The camera goes over into monochrome at 6.05pm (I have IR activated) and while I think night mode is giving me more contrast in low light, I’m not getting faces or plates, though I can see clothing, bags, the presence of spectacles, hair colour and association between pedestrians deep into the scene. Flare off numberplates gives me a sense of the IR range of the 8080R – it’s solid, especially up to 30m.

CONCLUSION

Here it is at closer range.

deep shade outside the office door – this is the best low light performance when it comes to plates I can recall out here – bear in mind that I’m using digital zoom and capture to snare the images. I’m still getting faces at this time of day, too, but fifteen minutes later, motion blur is taking its toll in sub-10 lux colour. While I’m not longer getting clear faces, I have clothing detail and full situational awareness. Something I notice out here from about

In short, the Samsung 8080R offers good colour rendition, great depth of field and low blur in good light that’s held almost until night mode. I rate the ability to snare moving plates in colour at around 10 lux as being the best I’ve tested – this is at a focal length of 9.4mm. The 2560 x 1920-pixel resolution pays dividends in this form factor – I’m able to get clear face recognition down under 10 lux, though there’s a point at which this ability fades – it’s between 7-4 lux. The focal range is ideal for the street, giving investigators the ability to get faces past 25m and useful detail towards 50m at the long end – both in good and failing light. The 8080R performs very well in terms of WDR, too, returning images replete with high levels of detail and devoid of blooming or veiling flare. The excellent physical specification makes the 8080R a worthy competitor in the external bullet camera market. n

I ALSO NOTICE THAT I GET MORE THAN USUALLY GOOD LEVELS OF DETAIL OVER THE ROAD OF PEDESTRIANS IN THE BRIGHTEST PART OF THE SCENE.

se&n 39

SEM0917_32samsug.indd 39

29/8/17 2:42 pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

New Growth One of the fears for many monitoring stations when it comes to new technology is that the changes will dissipate the market but the latest projections suggest anything but. There’s significant new and organic growth rolling through.

ROM the top, growth in smart homes is significant – global revenues are projected to be around $US15 billion by the end of this year. Further, IHS Markit says 10 per cent of homes will incorporate smart controllers by 2025. This comes off a low base – smart home penetration was just 1 per cent in 2010 and it will reach 7 per cent by the end of 2017. The global market size for smart home devices is forecast to be worth $3.3 billion by the end of 2017, reaching $9.4 billion in 2021 on the way to $15 billion in 2025. EMEA and Americas regions are expected to represent more than 70 per cent of revenues for smart devices over the next five years, Asia is expected to dominate in terms of unit shipments. In 2021, the Asia region is expected to represent about 46 per cent of unit shipments. Leading the unit shipments in Asia in 2021 will include light bulbs, air quality sensors and video cameras. Smart homes are defined as

F

40 se&n

SEM0917_40monitor.indd 40

29/8/17 1:21 pm


KEY TECHNOLOGICAL TRENDS THAT WE’RE GOING TO BE SEEING OVER THE PERIOD INCLUDE THE ONGOING INTEREST IN VIDEO VERIFICATION IN THE RESIDENTIAL MARKET FOR INTRUSION ALARMS. those which include thermostats, lighting, security and entertainment, according to IHS Markit and each home with a smart controller has 6 connected devices. This is a relatively loose definition and the roll-call of big players suggests ‘smart home’ as a concept is somewhat opaque. Some smart home solutions are greater than others. According to IHS Markit, Nest, Amazon, Honeywell, Xiaomi and Netgear rounded out the top 5 for smart home revenue, accounting for 36 per cent of all sales in 2016 when excluding appliances, according to the device database of the IHS Markit smart home intelligence service. The top 5 players for unit shipments in 2016 accounted for 34 per cent of global unit shipments and included Xiaomi, Amazon, Honeywell, Nest and Koninklijke Philips N.V. Globally, 19 manufacturers had more than 500,000 annual smart home device shipments in 2016. Forty-six manufacturers had more than $10 million in revenue in 2016, when excluding appliances. The top smart home devices to watch in terms of unit shipment growth, include radiator valves, air quality sensors, smart speakers and appliances. Taken as a separate entity, and with due recognition that it is a different market to that in Australia, Freedonia projects the U.S. alarm systems market will reach $4.9 billion by 2021, starting at $3.8 billion in 2016, with a CAGR of 5.1 per cent between 2016 and 2021. What’s driving growth in U.S. alarms isn’t new technology but something old-fashioned. “The biggest driving factor…is going to be the continued growth of construction activity going forward,” Katherine Brink, industry analyst, Freedonia Industry Studies, told Security Systems News recently. Brink added that this factor effects both residential and non-residential. Both sides of the alarm systems market show demand between 2016 and 2021, according to Brink, “but non-

residential markets will account for slightly more, with about 52 per cent of demand growth.” The market growth is slowing down but is still encouraging. Meanwhile, fire life safety systems accounted for 57 per cent of the total demand in the U.S. alarm market in 2016, according to Freedonia. Intrusion held 39 per cent of the market’s demand that year, and PERS made up 4 per cent of the demand. In 2021 Freedonia predicts that the demand will be 55 per cent for life safety, 40 per cent for intrusion and 5 per cent for PERS. Freedonia highlighted PERS as in interesting segment of the market. “It’s a very dynamic market and it’s one where there’s been a lot of technical advances. So, it’s something that we wanted to highlight as a point of interest even though its effect on the overall market is limited,” Brink said. Freedonia valued the U.S. PERS market at just $155 million in 2016, and forecasts the market segment to reach $220 million by 2021 at a CAGR of 7.3 per cent. Growth will be driven primarily by an above average increase in the number of people over the age of 65, which is the demographic most likely to utilize these devices. In addition, there is a persistent interest among elderly individuals to age in their own homes, rather than to move in with a relative or to an assisted living facility, according to Freedonia Group. Elderly people are far more likely to utilize PERS alarms, since they are at home alone all or part of the time. These and other trends are presented in Security Alarms Market in the U.S, a new study from the Clevelandbased research firm. Value gains will benefit from the introduction and rising popularity of a variety of value-added features, including: l Medication reminders, dispensing, and compliance monitoring l Fall detection l Vital signs sensors l Voice panic detection.

se&n 41

SEM0917_40monitor.indd 41

29/8/17 2:19 pm


Proudly brought to you by

● Regulars

Monitoring

Your Monitoring Specialists

1300 130 515

www.bensecurity.com.au

THERE’S ALSO BEEN A LOT OF INTEREST IN ALARM SYSTEMS THAT ARE INTEROPERABLE, ESPECIALLY ON THE COMMERCIAL SIDE. Video verification will play a role in the overall security alarm market, according to Freedonia. “Key technological trends that we’re going to be seeing over the period include the ongoing interest in video verification in the residential market for intrusion alarms,” Brink said. “There’s also been a lot of interest in alarm systems that are interoperable, especially on the commercial side, but

also on the residential that can connect with smart homes.” PERS devices also have use cases outside of the senior market, Freedonia noted, such as with abuse survivors or latchkey children. A potential challenge for PERS systems is the competition from smart phone apps that seek to provide a similar service, according to Brink. System replacement might be a challenge for the U.S. alarm market to 2021, Brink said. “There’s not always consistent replacement rates, not only for intrusion alarms, but also for the life safety alarms as well. Even though

there’s recommended replacement times — especially for life safety alarms — building owners don’t always necessarily replace them on time,” Brink said. Meanwhile, Freedonia sees a rising interest in self-monitored alarms in the residential market, which might “act as a gateway product,” according to Brink. “A lot of individuals who are looking into self-monitored alarms may install them and then find that they would prefer to go ahead and just pay the extra money to have them monitored, to get the full benefits, rather than relying on themselves and possibly missing alerts,” she said. n

42 se&n

SEM0917_40monitor.indd 42

29/8/17 1:21 pm


1

Receive alarm notifications and control your alarm system like never before - anywhere at any time. SkyCommand delivers alarm notifications and the freedom to control security areas, lights, heating/cooling and door access. Features: - Instant notifications for alarm events to your mobile phone - Arm and disarm your security system remotely - Supports multiple sites and security areas - Remotely turn on and off locks and appliances - Notification and event history - App pin entry and lock Utilising T4000 high-level integration to an Integriti, Inception or Concept system, SkyCommand provides powerful control over door access, security and automation.

Available now on:

Third party alarms systems can also be controlled using the output on a T4000 via a key-switch input on any third party alarm panel.

Multiple Sites

Easy Access

Multiple Areas

T: +61 3 9780 4300 E: IREnquiries@innerrange.com W: innerrange.com

SEM0917_43.indd 1

Simple Control

T: 1300 319 499

Notifications

W: csd.com.au

29/8/17 10:09 am


● News report

ISCS

HID MOBILE ACCESS READER In a world where we rely so heavily upon our mobile devices, it makes sense that your security and access control should follow suit, according to ISCS.

ROM smart phones and tablets to wearable devices, leveraging mobile technology for door access, parking facilities, gates, as well as networks and other enterprise applications, is an obvious progression in the world of access control. According to Netflix Facilities Operations and Events Manager, Alison Brown, “Only having to carry one device for so many daily tasks is excellent.” It’s seems surprising then, that many businesses have not yet experienced the benefits of ISCS Gold Class mobile technology. Managing director of ISCS, Stuart Harmer, says the organisation is so excited by the technology, it is offering a limited time promotion that will not only allow end users to experience the convenience of Gold Class Mobile Access, but integrators will have the opportunity to increase their passive income. “The convenience that mobile connectivity offers is changing the way we live, work and play so for a limited time, ISCS is offering new and existing customers and integrators the option to install one free HID Mobile Access Reader for up to 5 users,” Harmer said.

F

BY EXTENDING ACCESS CONTROL TO A MOBILE DEVICE, WE ARE ALLOWING THE END USER TO SECURELY ACCESS THE WORKPLACE USING A DEVICE THAT IS ALMOST ALWAYS ON HAND.

“We are so confident that end users will enjoy using HID Mobile Access so much, that they will seriously consider rolling the system out throughout their entire business.” Just like the traditional access control, the Gold Class Mobile Access system works with Gold Class Mobile Access Credentials which are assigned to staff members via email. By simply downloading the HID Mobile Access app, staff will have instant access to a range of secure access points and network access points. This not only makes access control convenient for staff, it also positions businesses with a more modern and professional image. Powered by HID’s award-winning Seos technology, the Gold Class Mobile Access system uses HID Mobile Access to offer user convenience, operational efficiency and higher security. By tapping their mobile device or using the twist-andgo gesture, employees will have more convenient and efficient access. Administrators can also save time through using the HID Mobile Access portal, which allows operators to create, manage, issue and revoke credentials over the air. Using advanced Seos credential technology allows operators to go beyond technical security protections, as overall facility security is elevated by the simple notion that users generally guard their mobile phones more closely than their access cards. “By extending access control to a mobile device, we are allowing the end user to securely access the workplace using a device that is almost always on hand,” Harmer said. “From the parking gate, to the front door and beyond, HID Mobile Access can help organisations meet the growing demand for convenience.” Integrators and end users have the option to implement the system as a pure mobile solution or integrate it into an existing card-based access control system, allowing flexibility among users. The technology, which supports the widest variety of mobile devices in the industry, not only allows users to open gates and doors, but is designed to allow users to log on, open electronic locks, securely release documents from the printer and much more The award-winning Seos credential technology is based on ISO standards and used organisations around the world that rely on solutions that have the ability to encrypt the communication of classified or sensitive data. And Harmer says the HID solution also supports the widest variety of mobile devices in the industry, so users can define the mobile experience that is right for their organisation.n

44 se&n

SEM0917_44mobile.indd 44

29/8/17 1:22 pm


SEM0917_45.indd 1

29/8/17 10:09 am


â—? Product review

Genetec

MISSION CONTROL Genetec Mission Control is a management aggregation solution designed to bring multiple sub-systems into a single coherent inherent interface providing situational awareness and centralised operational response. Mission Control stabilises decision-making in moments of extreme pressure through the presentation of holistic intelligence drawn from thousands of security devices and video feeds in real time.

ENETEC Mission Control is a decision support system that provides organizations with new levels of situational intelligence, visualization, and complete incident management capabilities. It allows security personnel to make the right decision when faced with routine tasks or unanticipated situations by ensuring a timely flow of information. Mission Control empowers organizations to move beyond simple event and alarm management by collecting and qualifying data from thousands of sensors and security devices, spotting the most complex situations

G

46 se&n

SEM0917_46mission.indd 46

29/8/17 5:38 pm


MISSION CONTROL GIVES OPERATORS HOLISTIC, UNIFIED, AND MAP-CENTRIC VIEWS OF THEIR ENTIRE SECURITY INFRASTRUCTURE. and incidents, and guiding security teams in their response following organization-specific processes and compliancy requirements. Designed to work seamlessly with Security Center, the company’s unified security platform that combines video surveillance, access control, automatic license plate recognition (ALPR) and communications management, Mission Control also aims to simplify the operator’s tasks and decision-making process when handling routine activities and undesirable situations. Mission Control allows real-time collection of thousands of events that can be used to identify and create incident categories that map to

specific operational and security environments. It features multi-layered rules to analyze incoming sensor and security data to trigger meaningful incidents allowing security teams to monitor meaningful incidents as opposed to discrete or unrelated events and alarms. Mission Control also allows security teams to visualize incidents at their precise location and with greater detail through interactive graphical maps, to investigate situations by visually exploring the immediate vicinity of an incident, to manually trigger incidents directly from a map when operators detect a potential issue and to undertake complete incident management. Operational and security situations can be monitored from a dedicated Incident Monitoring Task, which allows staff to view detailed information for each incident with a real-time dashboard and to respond to incidents with clear processes and standard operating procedures (SOPs). Teams can rely on system behaviour that automatically adapts in reaction to an incident and gives greater insights to situational awareness with powerful searches and auditing capabilities. Ideally suited to meet the operational needs of larger, multi-site deployments in markets such as higher education and transportation, Mission Control gives operators holistic, unified, and map-centric views of their entire security infrastructure. Mission Control also moves beyond the capabilities of traditional security platforms, enabling organizations to manage the entire lifecycle of incidents and situations, from monitoring incoming sensor data and detecting incidents, all the way through to resolution and auditing. Based on their unique needs and environment, security and operations departments can create incident categories and the multi-layered rules that trigger each, and automate system actions to address them. They can further assign automated workflows and standard operating procedures (SOPs) to incident categories, which are triggered when an incident is detected to guide the response of the operator to ensure compliance with internal and external policies. Once triggered by events, incidents launch workflows that drive system behaviour and guide operator responses through the entire lifecycle of the incident using SOPs. In addition to comprehensive incident management, Mission Control will offer operators the ability to manage both active and historical incidents, run reports for analysis purposes and continuous improvement, as well as for auditing purposes.

TEST DRIVING MISSION CONTROL I got a test drive of Genetec Mission Control from Genetec’s Lee Shelford at Security 2017 Exhibition. What struck me most about the solution was its

se&n 47

SEM0917_46mission.indd 47

29/8/17 5:41 pm


● Product review

Genetec IN MISSION CONTROL, IF WE’RE GOING TO TRIGGER A THREAT LEVEL OF RED FOR OUR DOOR INCIDENT, THEN WE NEED TO KNOW THE INCIDENT IS SERIOUS AND WE NEED TO KNOW IMMEDIATELY.

polished nature – the simple way it’s possible to create procedures, the way incidents feed into and inform decisions and the structure Mission Control brings to events. “We’re going to look at Mission Control and to do so we log into Security Desk,” Shelford explains. “The key thing around Mission Control is that it’s not a PSIM, which is typically a presentation layer sitting on top of multiple sub systems, where you pay for every layer and if you change anything in the stack then you change everything in the stack. “Security Centre is the platform, and Mission Control sits on top of that. Being the same piece of software enables us to go into existing security customers and just turn the licence on then bring in the Mission Control functionality. There’s one config tool and it’s a lot easier to visualise because it’s still part of Security Desk. “Obviously, the licencing is part of it – if you have paid for licensing of CCTV or access control in Security Center, you don’t get charged for it in Mission Control and nothing integrates directly with Mission Control, everything integrates in Security Centre - that’s still the core platform and that’s the key differentiator making it so quick and easy for us to install. It also explains why operating Mission Control via Security Centre simply involves a couple of additional tasks.” According to Shelford, these new tasks are incident monitoring within Security Desk, which starts incidents coming through. Within config tool is the incident configuration. “Let’s raise an incident in the system and imagine it’s on a security platform somewhere in an airport,” Shelford says. “The alarm comes through as it would do normally, there’s video footage and audio capability and you can see different incidents over here appearing that would typically guide the operator through. “Let’s consider a missing child incident in a shopping centre. We have a map of where the child

was last seen – the operator can right-click on the menu and create the incident. Now we have the basic overview of the incident going on, colour coding, icons and here we have standard operating procedures that over the next couple of releases of software will become dynamic – is there really a missing child? If no, then it’s a false alarm. If yes, the standard operating procedures continue. With a missing child, we may have a dozen standard operating procedures each calibrated differently.” According to Shelford, Mission Control can get considerable levels of information out of the system that help the customer with operational efficiency. “For instance, perhaps a process took 15 minutes when it should have taken 5 minutes,” he explains. “Mission Control allows us to look at those steps and try to optimise processes not only within a control room, but within standard operating procedures that might have been in the back of the security team’s mind for 10 years. “The reason that we wanted to bring decision support into Security Center is because in a fastmoving control room environment where there is a serious threat we want the system to lead operators through those standard operating procedures – it reminds them what their next move should be and makes sure things are done in the right order, Incidents can be locked into a sequence, can include digital media that offers assistance – it’s very flexible.” According to Shelford, not every event demands law enforcement response - it could just be as simple as a maintenance issue. “For instance, a camera’s gone off-line and the system can shape a very specific response that is tracked,” he says. “Is there power to the camera? Check the power supply, make sure the power supply’s okay. Have you checked the camera? Camera’s faulty, or lens is faulty. You can add some notes. The next person or supervisor can access that report and add to it as the camera is repaired, checking the time frame of the repair and recommissioning has the same field of view. “Now let’s look at a Door Forced alarm. One of the nice things about Mission Control is filtering out the noise in a busy control room where staff get overwhelmed by event traffic. Let’s imagine a scenario in a large international airport where someone has pressed a crash bar leading out onto the runway. Is it kids playing or something

48 se&n

SEM0917_46mission.indd 48

29/8/17 5:41 pm


SEM0917_49.indd 1

29/8/17 10:09 am


● Product review

Genetec

WITH MISSION CONTROL, IT’S POSSIBLE TO ENSURE THE MAINTENANCE STAFF ONLY ATTEND A REAL MAINTENANCE EVENT BUT THERE ARE ALSO RELATED CAPABILITIES. more serious? We have an alarm event but what’s happening at the door? Is it open? Has it been accessed? “If we can combine sensor information we can show the crash bar has been actioned, the door sensor has activated and a tripwire VMD has gone into alarm on the sterile side of the door. Now we know someone has stepped through that door and we can action instant high-level response. It helps using Boolean logic not binary on/off when managing multiple alarm events in real time. In Mission Control, if we’re going to trigger a threat level of red for our door incident, then we need to know the incident is serious and we need to know immediately. If this incident is going to be a threat level yellow alarm – the door is loose and was bumped or caught by the wind – then we can action the appropriate code and the maintenance team will check it out.” Shelford says it’s not always about high security events. “One of the other nice things about Mission Control is its ability to reduce the number of people out doing phantom maintenance tasks on very large sites, often on foot,” he says. “Let’s imagine that in our door scenario a worker is on the other side of the runway doing some maintenance. After a crash bar alarm event that proves to be a fault, normally they would have to go all the way back to the control room to report the issue and flag the maintenance and then go back out, find a missing or damaged bolt, go back into the workshop to find a replacement bolt and go back out again. “With Mission Control, it’s possible to ensure the maintenance staff only attend a real maintenance event but there are also related capabilities. Coming out next year is a mobile app and using this, staff will be able to take a picture of a broken component

with their mobile phones in the field so the bolt can be found by workshop staff in preparation for a repair. Mission Control helps manage large incidents but it also makes smaller time-wasting incidents more efficient.” “One of the nice things that we’re doing, not only for Mission Control, but for Security Essentials, is improving our reporting period. So, our reports are good, they’re granularly searched, the reporting forms are always the same, no matter what section are in, like access control or CCTV. The operators know the look and feel they’re looking for when they get information. Now were bringing in more graphical reporting in Security Centre – bringing in dashboards in the application itself. “For example, there are going to be dynamic reports with more information within Security Centre,” Shelford says. “Further, we’re going to be using Microsoft Power BI, not only for our business intelligence but also with Mission Control. This gives a very quick and easy visual overview of everything that’s going on in the environment. That could be on a big screen in a control room, or in a location showing the operators and the control supervisors how well they’re doing, if they’ve had a threatening incident that’s been outstanding for 10 minutes, that makes it easy to take control of. “We’ll start seeing this more and more with Genetec, not just with Mission Control, but throughout the whole portfolio,” he explains. “We are focused on getting more information and data from multiple different systems and data points, and pulling that information together in a way that makes sense for security operators.” n

FEATURES OF MISSION CONTROL INCLUDE: l

U nified Monitoring, Command, and Control

l

P roactive Planning and Preparation

l

D ata Ingestion & Collection

l

A utomated Analysis & Qualification

l

E nhanced Visualization and Situational Awareness

l

C omplete Incident Management

l

C omprehensive Reporting and Auditing.

l

S calable Data Ingestion & Correlation

50 se&n

SEM0917_46mission.indd 50

29/8/17 5:41 pm


• Avigilon Control Centre 5 & 6 • Standard and Enterprise editions • Avigilon Control Centre (ACC) SDK Version 5

• Milestone XProtect 2014, 2016, 2017 • Professional, Expert and Corporate editions • Milestone Integrated Platform (MIP) SDK 2014

Talk to Interlogix today about TecomC4, an integrated software solution. Learn more at tecomc4.com.au

UTC Fire & Security Australia Pty Ltd trading as Interlogix is part of UTC Climate, Controls & Security. © 2017 United Technologies Corporation, Inc. All rights reserved.

TecomC4_integrationsAd_Sep2017.indd 1 SEM0917_51.indd 1

21/08/2017 1:26 pm 29/8/17 10:08 am


● New product

Dahua

DAHUA X820 DRONE

Dahua’s X820 is a fast, powerful drone, which combines considerable operational versatility with excellent surveillance capabilities. Fitted with high quality optical and/or thermal cameras, the X820 is designed to answer more questions than most professional users would ask it.

IG, fast and powerful, the Dahua X820 is a carbon fibre drone designed to be used for a range of surveillance tasks, from checking alarm events to monitoring, developing fire fronts or searching for lost hikers in rugged terrain. Perhaps what was most interesting is the spec. This drone is a monster with a potential 1500m ceiling (where authorised), a 5000m takeoff altitude, nearly 40 mins of flying time, a 10km remote control range and a top speed of 90kmph. I got a walk around of the X820 at Security 2017 with Dahua’s Tony Lagan, who said the drone was designed for any industrial application users required. “This is a highly capable drone that can handle serious applications in law enforcement and industry – utilities, mining, high security sites, as well as monitoring rugged terrain,” Lagan says.

B

52 se&n

SEM0917_52drone.indd 52

29/8/17 1:58 pm


BY J O H N A D A M S

THIS IS A HIGHLY CAPABLE DRONE THAT CAN HANDLE SERIOUS APPLICATIONS IN LAW ENFORCEMENT AND INDUSTRY – UTILITIES, MINING, HIGH SECURITY SITES, AS WELL AS MONITORING RUGGED TERRAIN.

“There are 3 heads for the drone – the optical camera is a 6MP with a 30x optical, there’s 3-axis gyro stabilisation, there’s thermal, and a 1080p live stream. There’s a bigger brother with payload capacity of 30kg and the same service ceiling.” Alongside its 6MP sensor, the Dahua X820’s optional thermal camera is ideal for monitoring early outbreak of fire, as well as searching for missing persons. Another neat feature is that the X820 will broadcast its video feed live at 1080p resolution if the drone is locked to hover above an incident or threat. In terms of dimensions, the X820 is large enough to be robust but compact enough to be transported in a typical small SUV. It has operating dimensions of 940mm x 940mm x 521mm and packaged dimensions of 600mm x 430mm x 720mm. Net weight is 3.3kg and maximum take-off weight is 10kg, allowing the X820 to lug serious payloads – food and water and comms devices to stranded hikers, for instance. Hovering power is 768W and hovering time is 35 minutes with an accuracy of half a metre in the vertical plane and .2 of a metre in the horizontal place. Alongside its top speed of 90kmph, the X820 has a super-fast ascent speed of 54kmph, a descent speed of just under 10kmph, a tilt angle of 25 degrees, the ability to operate in wind strengths of up to 50kmph and an operating temperature range of -20C to 60C. The camera sensor is Sony’s 1/1.9-inch STARVIS CMOS, with an effective pixel size of 2560 (H) x1920 (V) for a total of 6MP. Compression is H.265 or H.264 and you can choose resolutions of 6MP, 5MP, 3MP or 1080p, depending on the application. There’s an electronic shutter with speeds of between 1/1s~1/30,000s and the lens has a focal length that ranges from 6mm to 180mm, offering horizontal angles of view between 61.2 and 2.1 degrees – that’s equivalent to 30x optical, making the X820 a 90kmph flying PTZ. S Speaking of PTZ, the pan range is 168 degrees at 130 degrees per second, while the tilt range is -90 to 45 degrees at a speed of 130 degrees per second, all with an accuracy of 0.1 degrees. The optical camera features electronic image stabilisation, 128Gb SD card slot. Other features of the camera system include live broadcasting at 1080p with an optical zoom range of 12x and duplex audio with an onboard speaker with an effective distance of 100m.

Meanwhile, the optional thermal camera has a resolution of 640(H) x 512(V) with a pixel size of 17um and a thermal sensitivity of ≤40mK. The camera has a fixed focal length of 19mm. Thermal measurements at low gain range from -40C ~ 550C or at high gain, from -40C ~ 160C. The thermal camera has a pan range of ±168 degrees and a tilt range of 90 ~ 45 degrees. Pan and tilt speeds are 130 degrees per second with an accuracy of 0.01 degrees. Encoding of thermal imagery is H.264/MJPEG to a 128Gb microSD storage card. The X820’s remote controller has a maximum transmission distance of 5km, while the PC Ground Station can push 10km and features a 13.1-inch touch screen. n

FEATURES OF DAHUA X820 DRONE INCLUDE: l

Max Flight Time: 38mins

l

Max Speed: 25m/s

l

Max Transmission Distance: 10km

l

Max Flight Height: 1500m

l

PTZ Accuracy: ±0.01 degrees

l

atellite Positioning Systems: GPS/Beidou/ S GLONASS.

se&n 53

SEM0917_52drone.indd 53

29/8/17 1:58 pm


● New product

Eyelock

EYELOCK IRIS BIOMETRIC

CSD now distributes the Eyelock product suite covering a range of iris-based identity authentication, hardware and software solutions to its broad customer base in Australia. YELOCK’S technology provides an unprecedented level of convenience and security with unmatched biometric accuracy, making it the most proven way to authenticate identity aside from DNA. EyeLock’s proprietary iris authentication technology looks at more than 240 unique iris characteristics and provides a fast, user-friendly experience. EyeLock is one of the only companies in the world to utilize dualeye authentication. “We are really excited to have partnered with Eyelock in Australia” said Mark Edwards, general manager products & marketing at CSD. “The iris identity authentication products are fast, easy to use and in coming months with have a deep integration to Inner Range’s Integriti security and access control system. Stock is on the way and demonstration systems will be both mobile and in branch by the end of August. “Traditionally, iris recognition systems have been slow to authenticate and overly expensive but this range from Eyelock makes non-touch something-that-

E

you-are, biometrics affordable. In a society where we are all becoming paranoid to touch fingerprint readers due to the perceived germ factor, Eyelock provides a cost-effective solution.” EyeLock has achieved significant technological breakthroughs and solved integration challenges that have historically been a barrier to massmarket adoption of iris authentication technology. In addition, the company’s approach provides maximum flexibility by offering designs that have either on-board or host-based processing and illumination. Algorithm performance capabilities for speed and accuracy have been validated by Novetta, a leader in advanced analytics technology and independent biometric testing, as unmatched in the market. EyeLock’s reference designs have working distances of up to 60 cm with a false accept rate of 1 in 1.5 million for single eye authentication and a false reject rate of less than 1 per cent. EyeLock uses video based technology to look at more than 240 unique characteristics in each iris. In real time, EyeLock’s proprietary algorithm converts the characteristics to a code that is unique only to you. The code is encrypted forming a unique template and each time the user looks at an EyeLock product, an EyeLock algorithm matches the newly created template to the existing template. The EyeLock platform has been developed to adhere to a specific chain of provenance in order to authenticate. EyeLock’s algorithm first establishes liveness, then initiates the process of authentication. nano NXT is the latest generation of EyeLock’s revolutionary access control solutions. According to EyeLock, nano NXT renders all other access control peripherals obsolete by revolutionizing how identities are protected, authenticated, and managed. An optional SDK is available to customers who want to customize their security solutions to integrate seamlessly with existing applications. The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. Thanks to its high security capabilities, nano NXT can be used in a variety of environments including commercial/enterprise, corrections, data center, education, financial services, government, healthcare and hospitality facilities. EyeLock nano NXT is 20.34cm x 12.71cm x 7.14cm in dimensions, weighs 1.36kg, draws 7.5W PoE or 13W using 12-24V DC, has a standoff distance of 30.48cm, a vertical capture distance of 13.20cm and a horizontal capture distance of 16.51cm. Mounting height is 137.16cm and the operating temperature is 0-40C. Communcations is full duplex 10/100Mbps Ethernet and there’s a single data input port and an output port, each supporting Wiegand, F2F, OSDP or PAC. There are 2 relays (30V DC @4A (grant/deny), external card reader power output of 5-12V DC at 200mA maximum, a 2-gang black box mounting and compliance with UL-294, ULC-S319, CE, FCC. n

54 se&n

SEM0917_54eyelock.indd 54

29/8/17 1:58 pm


Protect what’s most valuable

The new Avigilon H4 Fisheye camera line offers a complete, high-resolution, 360-degree panoramic view with no blind spots. This cost-effective, easy-toinstall solution is designed to provide broad coverage with fewer cameras.

• Available in 6 and 12 megapixel resolutions • High Definition Stream Management (HDSM)™ technology • 360o control with Avigilon Control Center (ACC) software • LightCatcher™ low-light technology • Integrated with content adaptive IR technology

Learn more at avigilon.com/H4Fisheye

© 2016-2017, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, HIGH DEFINITION STREAM MANAGEMENT (HDSM), LIGHTCATCHER and TRUSTED SECURITY SOLUTIONS are trademarks of Avigilon Corporation.

SEM0917_55.indd 1

29/8/17 10:08 am


● Access control

Cards

CARD SECURITY To the uninitiated prox is prox is prox. You hold the card towards the reader and thanks to the mystical powers of something called RF, the reader excites a card’s antenna, interrogates the identity of its IC, recognises a card, and activates an electric strike to facilitate access.

UT there are variations between 125kHz read-only prox and higher frequency technologies like 13.56mHz Mifare, whose higher frequency and smart processor offers more security. When it comes to all important issues of cost, 125kHz prox to Mifare is not a huge jump in price, while Mifare to DESfire is a bigger jump for far higher levels of security and greater operational flexibility. The prevalence of 124kHz proximity revolves around cost convenience and ignorance. For very little cost difference you can get a much more secure solution – you can go for slightly more security or much more, depending on budget. 125kHz proximity has been around since 1990 – it’s basically a physical RFID chip and you present it to an EMI field, the antenna inside is excited and responds with a signal that is identified by the reader. There’s a 26-bit format, which comprises of a site/facility code and the card number – site code from 0-255 and card number from 0-65500 – which is 16,702,000 possible permutations but prox has been around for a long time. In addition, installers will often label a site, Site 1 and then Card 1, Card 2, Card 3, Card 4, etc, so if there’s no deliberate attempt to increase the complexity of a customer base, then there are many, many duplications. It’s human nature for a Site to be Site 1 and Cards to be 1-100. You have to wonder, how many sites like this are out there? Further, 125kHz prox is a read-only technology – there’s no or very little encryption. There is certainly a place in the market for this low security technology but if you want a system that offers security then you’re best to move to higher frequency options. When it comes to 13.56 mHz Mifare you are getting a smart card so you can write data to the device. A 1Kb smart card will have data spread over 16 sectors, each sector able to hold its own

B

WHILE THE ENCRYPTION ALGORITHM FOR MIFARE CLASSIC HAS BEEN COMPROMISED, DESFIRE USING TRIPLE DES/AES AND HAS NOT BEEN COMPROMISED – SO IT’S MORE SECURE. application and set of encryption keys. Worth noting is the fact that every Mifare card has its own unique identifier hard stamped from the factory. What happens with Mifare is that it can either just read from the card which is not great security, or you get that serial number and along with the key in the reader is encrypted as a further key to lock up a sector so the card and the facility number are each locked in a secure location. This gives an encrypted key that must be unlocked in order to discover the code. Of course, Mifare Classic, which works this way, was hacked in 2008, so better providers go a step further in that they combine the encrypted

56 se&n

SEM0917_56cards.indd 56

29/8/17 2:53 pm


BY J O H N A D A M S

key with the card serial number and apply an algorithm – key diversification – what this means if that an attack does compromise a Mifare system, only that one card is compromised. It’s a lot more flexible than prox because you can use multiple applications, you can have a sector for base building, a sector for tenancy, a sector for biometrics, a sector for time and attendance. Most secure of all is DESfire, which while it’s a type of Mifare card, is significantly different. A 4k DESfire card has 4 times the amount of data so you’re not restricted in card layout, you’re not restricted to the 16 different fixed-size sectors. Instead you’re allowed up to 28 applications and they can vary in size. Any card can have 20 apps

and any app 15 files inside, the benefit being a solution that is much more flexible and more dynamic. The other main difference is that while the encryption algorithm for Mifare Classic has been compromised, DESfire using Triple DES/AES and has not been compromised – so it’s more secure. It’s the only completely secure RF technology and is projected to remain secure until 2030, based on current technological trends. Central to the operation of DESfire access control credentials is the 3-path mutual authentication process. The key difference between read-only prox and DESfire is that it waits for a card to enter the field, then sends a request saying are you a DESfire

se&n 57

SEM0917_56cards.indd 57

29/8/17 2:53 pm


● Access control

Cards IT GOES WITHOUT SAYING THAT IF IT’S WEIGAND COMING OUT OF THE BACK OF THE READER THE SYSTEM IS VERY INSECURE, REGARDLESS OF HOW SECURE THE CARDS AND READERS ARE AND THIS VULNERABILITY APPLIES TO ALL SYSTEMS.

card, it says yes here is my CSN, then the reader asks for a key, the card references the key using a random number, the reader decrypts and sends the de-encrypted number back with another number that’s been encrypted. The card then responds and says yes, you decrypted that properly, and delivers a decryption of the second number. Once all the handshaking is done, the reader can access the card data and the door can be opened. There’s more data so it’s a longer read process (80 milliseconds) and a reduced read range but the result is far higher security.

CARD SNIFFING Most readers would know that 125kHz prox is a compromise that offers convenience and low cost. We’ve run a dozen articles in SEN over the years pointing out the problems with facility code duplication. But sniffing is something else again. A few years ago at BQT when I saw how easily prox cards can be defeated, it became clear that 125kHz is only secure if noone is trying to get around it.

The test I saw involved a power source, antenna and a controller all bought without effort or expense. Using this group of devices, including a high frequency antenna, it’s possible to read a person’s card when it’s in their pocket or bag, and then turn the device to write and use it to open a door. The sniff was undertaken by bringing the antenna into range of the card. It’s all so simple and instantaneous and it really works. Once you have the information it’s very easy to decrypt the 26-bit information, you know what the facility code is, you know what the card number is - it’s very simple. Mifare classic is harder to breach but a university research team in the Netherlands employed a logical shift register to find keys and walk through a controlled door a few years ago. When presented to readers, the cards appear on the system as an existing user – it’s frightening stuff. Something that relates to card security is Weigand attacks. It goes without saying that if it’s Weigand coming out of the back of the reader the system is very insecure, regardless of how secure the cards and readers are and this vulnerability applies to all systems. A person can get up into the ceiling, find the Weigand data and sniff the data off the data cable and using the data to reverse engineer a card and gain entry or do a replay attack. It’s not specific to any card technology it applies to all systems. To get away from that users require encrypted data – such as that out of BQT Solutions’ DESfire reader – to provide a much bigger random string. This means the identification numbers are always changing and that means even if a sniffer gets the numbers they are not going to match the next output from the reader – they can’t be predicted. The majority of Australia’s 125kHz proximitybased access control solutions contain an inherent security weakness that installers, integrators and consultants are duty bound to point out to end users. Going with 13.56mHz Mifare credentials does offer more security but for high security sites – genuine high security sites – Mifare is not enough to guarantee protection. If you’re serious about access control you’ll need to think about DESfire. n

58 se&n

SEM0917_56cards.indd 58

29/8/17 2:54 pm


The New Camera Line Mx6 Creates More Possibilities. More Images, in All Light Conditions, in Every Standard.

More Intelligence Is on the Way. The new Mx6 6MP camera system from MOBOTIX offers increased performance. A frame rate that is up to twice as fast than that of other cameras allows it to capture quick movements even better and simultaneously deliver sharp images in MxPEG, MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6 camera line is faster, more flexible and higher-performing, opening up new application and integration opportunities for to you to meet all requirements.

MOBOTIX AG • Pyrmont NSW, Australia • www.mobotix.com

mx_Ad_Mx6_au_170505-A4.indd 1 SEM0917_59.indd 1

05.05.17 10:02 29/8/17 10:08 am


● Special report

Bollards

AUTOMATIC RETRACTABLE BOLLARDS Recent events have highlighted the need for robust hostile vehicle mitigation strategies. Maintaining a secure perimeter while allowing access can be challenging and retractable bollards are one such way of achieving balance. This article will provide an overview of the purpose, type and considerations for automatic retractable bollards.

UTOMATIC retractable bollards serve a myriad of applications which are by no means limited to the realm of ‘hostile vehicle mitigation’. While many retractable bollard products are designed for impact resistance, sitting squarely in the high security realm, the purpose and applications of retractable bollards is wide and varied. They may be used to complement existing security measures, such as gates, to create a vehicular ‘lock’ preventing entry, egress or to create greater standoff distance. Additionally, automatic retractable bollards are increasingly being used as architectural and aesthetically pleasing access control barriers suited for car parks, outdoor shopping malls and activated boulevards. In such applications, bollards are used to delineate pedestrians from vehicles while providing pedestrian permeability, permitting entry to authorized service vehicles, limiting foot traffic to areas for afterhours shopping, festivals and community events like food stalls and markets. Anecdotally, there is also increased interest from high net worth individuals installing retractable bollards to protect their exotic car collections.

A

60 se&n

SEM0917_60bollards.indd 60

29/8/17 2:00 pm


M A K SY M S Z E W C Z U K

BOLLARD TYPES Automatic retractable bollards generally come in 2 varieties; pneumatic (air pressure) and hydraulic (oil pressure) control. Each has its advantages and disadvantages based on purpose, site requirements and current manufacturer offerings, though they can both be supplied in commercial grade quality with high degrees of reliability. Motor-driven electromechanical type actuation is recently becoming increasingly common as the technology matures and becomes more reliable. Manual and semi-manual types are also available where budget might be a concern. These manual types are lowered and raised by hand with the use of handles or cordless drills. Automatic retractable bollards are also popular with users, due in part to their fast operation (typically taking several seconds to fall or rise). This being much quicker than other access controlled barriers, such as sliding gates, which may take several seconds per meter to open or close. Retractable bollards may be provided in a range of security ratings based on the purpose and risk mitigation required. Ratings are generally specified in 3 ways. Firstly, they will be tested and rated against an impact test specification for vehicle security barrier systems; secondly, they will be modelled and engineered for impact but not tested under an impact test specification and thirdly; they will be tested for access control only, with no quantification of impact. The engineered impact rating is typically expressed as vehicle weight and impact speed with a corresponding kilojoule energy impact rating. Impact rating specifications range from access control only type bollards with no rating to impact engineered (designed for impact but not tested). Lastly, the highest category would be rated (tested) bollards rated to UK PAS68, US DOS K and increasingly to IWA-14 international impact standard rating. Such rated bollards must be able to withstand impacts upwards of 7.5 tonne vehicles travelling at 80kmh which must continue to operate by retracting after impact.

FURTHER CONSIDERATIONS A typical engineered bollard solution for either hydraulic or pneumatic for two bollards spaced at 1.2m centres to cover one vehicle lane may cost approximately $40,000 to $60,000 to supply and install. This might be considered a mid-level security solution. Smaller diameter bollards or those for access control may cost closer to $20,000 to $30,000 for the supply and install of 2 units. Equivalent electro-mechanical actuation bollards reside in the lower price category, though larger 254mm diameter units would increase cost considerably from the base models. The cost for high security PAS68 tested and rated models would increase the cost to approximately $60,000

to $80,000 for 2 units installed. As a budget, civil works for excavation, reinforcement and concrete would cost approximately $15,000 or more in addition to the bollard supply and install cost. By way of comparison, manual retractable bollards would cost approximately $1000 to $3000 with civil works costing similar amounts per bollard. Automatic bollards are typically controlled through a control cabinet which houses the power equipment, such as a transformer, and access control equipment, such as the control board. On most commercial, non-proprietary products, this is designed to take a dry contact input from a client’s existing access control system. This allows new bollard installation projects to be easily interfaced to existing access control and building management systems. Increasingly, clients such as councils and public art or cultural facilities are choosing to include card reader bollards with card readers or key switches in proximity to the retractable bollards which allow operational staff to raise and lower the bollards in direct line of sight to any possible obstructions or security concerns around the bollard line. Alternatively, control of bollards can be timed or controlled from a security control room. When introducing a new access control point, often the biggest challenge lies in educating users (staff, public, visitors) in process and procedure. Who is responsible for raising and lowering the bollards? What safety mechanisms are in place to prevent unauthorised intrusion or prevent inadvertent raising of bollards while stationary vehicles are above? There are many factors involved in training staff and educating users on bollard operation, which may include signage and engineering controls. Safety mechanisms include such items as induction road loops or photoelectric beams which detect vehicles above the bollards and prevent use until the roadway is clear. An operational statement is a useful method used to document opening, closing and operational process in the context of the bollard purpose.

se&n 61

SEM0917_60bollards.indd 61

29/8/17 2:00 pm


● Special report

Bollards WHEN INTRODUCING A NEW ACCESS CONTROL POINT, OFTEN THE BIGGEST CHALLENGE LIES IN EDUCATING USERS IN PROCESS AND PROCEDURE.

Automatic retractable bollards are complex electro-mechanical systems. The access control equipment (e.g. control and power boards) must be housed within ingress protected security cabinets or in the case of the bollards, drainage control mechanisms such as sump pumps or gravity drains, which will prevent bollard shrouds from flooding. The access control interface and bollard control panel should ideally be housed within 10m of the bollard location. Due consideration should be paid to specifying IP-rated equipment enclosures where moisture or water ingress, dust and rubbish could cause issues. For high security applications, placement of control equipment within a secure zone is highly recommended.

UNDERGROUND SERVICES When designing the retractable bollard system and equipment placement, particular attention must be paid to existing in-ground services such as power, water and data, which may affect the location or positioning of the bollards. In all cases, a ‘Dial Before You Dig’ check should be undertaken in conjunction with an underground services scan. During installation, power and data will need to be provided to the access control panel and bollard control cabinet, ensuring that conduits between devices are sufficiently protected from tamper or accidental impact. This requirement will need planning to coordinate services and ensure sufficient, stable, power and data is provided to the equipment. The footings required for automatic retractable bollards are substantial in size as they are critical to the function, stability and security of the bollards. With both fixed and retractable bollards, the footing provides a large, dense mass which absorbs the impact of vehicles, transferring the force of an impact

into the ground. The cost of footings, consisting of excavation, formwork, reinforcement, concrete and waste removal, is often underestimated and overlooked in retractable bollard projects. Footings are often up to 2m deep to accommodate the bollard sleeve and drainage sump pump, while the length and width of the footing is dependent on a few factors, including the soil/ground condition and the security rating of bollards. High security bollards often require substantially larger footings to absorb the stronger impacts for which rated bollards are designed to stop. Depending on the environment and desired look, a range of finishes may be available. Stainless steel is often the preferred choice, providing a classic, professional finish for the products. This can be further specified as standard finish 304 grade, 316 marine grade, or electropolished for a mirror-like finish. Alternatively, mild steel bollards may be available in a galvanised, powder-coated or wet sprayed finish. LED flashing lights, traffic lights, reflective tape and audible warning sirens are often specified to provide users with an additional level of cautionary effect while bollards are in operation.

EQUIPMENT PLACEMENT AND SELECTION Automatic retractable bollards are frequently specified by architects, consultants and security personnel as both access control only and impact rated access barriers. In addition to the range of architectural finishes available, there are several reasons for this - retractable bollards can be hidden below ground when not in use, negating the need for surface-mounted alternatives like boom gates. They can also match other adjacent fixed bollards for a uniform look. Bollards provide pedestrian permeability, where delineation of vehicles and people is an issue. This consideration is critical to environments where clean and modern aesthetics are required. Further, automatic bollard control may be incorporated into and operated by a client’s existing access control system. Consideration should be given to control equipment placement as it should be readily accessible for maintenance while being within sufficient proximity to the bollards to prevent loss of signal or hydraulic/pneumatic pressure. Use of safety devices and creation of an operational statement is also critical to ensuring safe user adoption of the system. n Maksym Szewczuk is a security consultant working at Arup, specializing in security risk treatments and physical security solutions. You can contact Maksym on Maksym.szewczuk@arup.com

62 se&n

SEM0917_60bollards.indd 62

29/8/17 2:56 pm


Experience the latest in open platform integration‌ Challenger10

Exclusive to Hills

TecomC4 is the dynamic new open platform software that can be combined with Challenger panels, TruVision cameras and more, to create a powerful security solution with a modern, easy to use interface. Contact Hills to arrange a demonstration.

For more information on these and other best-in-class solutions from Hills call us on 1300 HILLS1 (445 571) or visit hills.com.au

facebook.com/HillsLtd/ C O N N E CT E N T E RTA I N S E C U R E

SEM0917_63.indd 1

29/8/17 10:09 am


● Case study

USS Iowa

PROTECTING THE PROTECTOR Affectionately known as the ‘Battleship of Presidents’ for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Now a museum, the ship is protected by a security solution incorporating Vivotek cameras and an Arteco VEMS VMS.

OMMISSIONED in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theatre where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve for

C

another 4 decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a firsthand look at the 16-inch calibre guns that earned the Iowa its nickname of the ‘The Big Stick’ as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. The job of securing the Battleship USS Iowa museum is the responsibility of security manager

64 se&n

SEM0917_64iowa.indd 64

29/8/17 2:00 pm


Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed recently when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organisation, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. During 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software, I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly.

WITH THE NEXT SOFTWARE, I’M ABLE TO CONFIGURE ALERT AREAS AFTER HOURS SO IF ANYBODY WERE TO TRY TO COME ON THE SHIP IT WOULD ALERT ME.

After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarise himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” he said. n

se&n 65

SEM0917_64iowa.indd 65

29/8/17 2:00 pm


● Special report

Security management

PREVENTION IS CURE After multiple terror attacks overseas, 5 attacks and 12 thwarted attacks in Australia in 3 years, security professionals are asking whether the National Terrorism Threat Advisory System threat level should be elevated to ‘Expected’.

AST week a senior risk manager asked me if the National Terrorism Threat Advisory System threat level was going to change. He had heard that it was to be escalated from ‘Probable’ to ‘Expected’. The move, while yet to happen, appears more than justified given the recent arrests in Sydney and the deployment of temporary bollards in central Sydney and Melbourne. There is ample evidence of a terror threat, even if the exact type of threat is unclear. Until now, most indicators of a credible threat have involved individuals using knives, firearms and motor vehicles as weapons. This is based on what we have already seen in Australia as well as incidents that have occurred in the UK, France and other areas of the world. The threat to our airlines is somewhat surprising given the level of complexity involved in

L

66 se&n

SEM0917_66luke.indd 66

29/8/17 2:01 pm


BY L U K E P E R CY- D O V E

such an attack and goes against what we have seen up until now. Just last month, our Prime Minister Malcom Turnbull shared that authorities have now stopped 12 planned attacks in Australia in the last three years. In his address to Parliament on June 13 this year, he also noted that there have been 5 attacks to date on Australian soil. While not recognised as a terrorist incident, the 20 January Bourke Street Mall tragedy certainly mimicked one. It was one of Australia’s worst mass casualty events since November 2011 and highlights the challenges our industry faces in protecting public spaces.

HOW TO MANAGE URBAN TERROR THREAT? The National Terrorism Threat Advisory System set our threat level to ‘Probable’ in November 2015. At the time, the federal government changed the alert system from 4 tiers to 5. ‘Probable’ is comparable to a ‘High’ rating under the old system. Regardless of the current official rating, it is evident that some form of terrorism incident is expected. This is not an hysterical position, but a reasoned reflection that all indicators point to an intentional, mass casualty event occurring. As always, the question is where and when? This is not an isolated view. Many security industry peers and the senior executives we deal with each week expect some form of major terrorist incident in Australia. Many of our largest companies are already planning for the alert level to be raised or, worse still, an incident to occur. Any escalation in alert level will immediately affect Australia’s private security industry. The key question is, are we ready to deal with such as attack? If it does happen, we’ll see an immediate increase in the need for security officers. But more of the same is not necessarily better, or particularly helpful in managing risk. What we will need is guards who know their roles, are trained observers, and can engage with people in a way that is both helpful and inquisitive. By this I mean that they need to be able to determine if people have a valid reason for accessing a property without coming across as intrusive or aggressive. I’ve seen it done overseas with great effect. If there is any suspicion of malicious intent, the security guard directs the individual away from others. What we don’t need is guards who are disinterested, pass the time on their mobile phones and are left at their post for hours. We need to be smarter than that. But I can’t see that we are. Week after week, we conduct operational security reviews and consistently see the same issues, which include: l Inattention by guards l Lack of interest by guards l Guards being left at posts for too long l Lack of training l A client’s expectations differing to the provider’s

COLLECTIVELY, WE NEED TO ADDRESS EVERY SECURITY SHORTCOMING THAT CAN HELP PREVENT OR MINIMISE THE IMPACT OF A SERIOUS INCIDENT OCCURRING. lL ack of critical incident planning and preparedness lL ack of cohesion between systems and processes l Lack of client/provider communication l Poor induction processes l Inappropriate or incomplete standing orders lP oorly documented processes and escalation paths.

* Luke Percy-Dove is the director of Matryx Consulting and a recognised expert in solving complex security challenges including counter-terrorism security. Luke is passionate about all things security. He is also an established writer and commentator in the security field and on the latest technology trends and developments in the physical security space.

Australia’s level of security guard training is nowhere near appropriate to manage the terrorism risk. That is not to be critical of my own industry. I’m simply acknowledging that pushing for the cheapest price has repercussions. You can’t expect premium security without paying a premium price. The other challenge is finding more guards. Where will they come from? Most crisis management plans that we review expect their providers to produce extra resources on demand. But if we wake up tomorrow to a terror attack or the federal government escalating the threat level, every major organisation in Australia could be implementing their plans at the same time. How does the industry cope with that? The top 6 security manpower providers account for more than half of all guards in this country. We do not have an infinite supply of good reliable people just waiting to be deployed around the country. It simply isn’t there. So, what should we be doing? The first step is to accept that a terrorist attack on Australian soil is now expected. Any formal escalation within the National Terrorism Threat Advisory System should not influence the processes that big business should have in place by now. Collectively, we need to address every security shortcoming that can help prevent or minimise the impact of a serious incident occurring. n

se&n 67

SEM0917_66luke.indd 67

29/8/17 2:01 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

FLIR FB-SERIES THERMAL BULLET l FLIR Systems has introduced the FLIR FB-Series O fixed bullet thermal security camera designed for short to mid-range perimeter protection. The FLIR FB-Series O offers plug-and-play integration with FLIR United VMS and certified by other major third-party video management solutions, making it a versatile solution for new or existing security systems. The FLIR FB-Series O thermal security camera features a 320x240 resolution thermal imaging sensor that detects potential intruders in total darkness, and through sun glare, smoke, dust, and light fog. Three separate lens options – 93, 49 and 24-degree field of views – provide narrow-to-wide coverage of fence lines, building perimeters, and open areas. The FLIR FB-Series O integrates with FLIR analytic encoders such as FLIR ioi TRK-101 that help distinguish humans and vehicles, and FLIR ioi TRK-101 P PTZ Tracker that hand-off targets to thermal or visible pan-tilt-zoom (PTZ)-enabled cameras on the same network. Simultaneous IP and analog video outputs are also available for use with network and legacy analog systems. Advanced automatic gain control (AGC) and FLIR’s Digital Detail Enhancement (DDE) provide optimal image quality in all scenes and by integrating with FLIR United VMS thermal configuration, alarm notifications are easily managed. Distributor: FLIR Systems Contact: +61 3 9550 2800

SONY SNC-VB642D DUAL LIGHT CAMERA l SONY SNC-VB642D is an IP66-rated, easy to install bullet fixed network camera that captures crisp, low-noise Full HD images, even in challenging low-light conditions. The sensitive 1/2.8-inch type Exmor R CMOS image sensor is teamed with XDNR processing, improving low-light performance and achieving the minimum illumination of 0.006 lux (30 IRE) in colour mode. Video can be captured at a high maximum frame rate of 60fps – allowing smoother, more accurate viewing of moving objects such as people or vehicles. View-DR expands dynamic range for significantly improved imaging in high-contrast and strongly backlit scenes, like sun-drenched offices or car park entrances. The camera can see in conditions of complete darkness, with built-in IR (infrared) illumination that’s coupled with Advanced IR technology to capture near and far-away objects without overexposure. According to Sony, the SNC-VB642D can clearly capture objects in total darkness at distances up to 100m (30 IRE) from the camera, and also comes with SD card storage, and even a built-in sunshade to help cut glare.

PARADOX TM70 FROM CSD l PARADOX introduces the TM70 which is a user-friendly, 7-inch colour touch screen keypad with an impressive resolution of 800 x 400 pixels. The TM70 supports Spectra, Magellan, EVO and their next generation Swan panels. Built with a sleek design and low-profile of just 15mm the TM70 is perfect for any environment. Exciting features include a screen saver, adjustable brightness with auto dim mode, indoor temperature display, bus voltage reading, multi-partition control and the ability to work as a digital picture frame. This keypad is great for all users. For more information contact your local CSD branch. Distributor: CSD Ph: 1300 319 499

Distributor: Bosch Security Systems Contact: 1300 BOSCH (26724)

68 se&n

SEM0917_68prods.indd 68

29/8/17 2:01 pm


NETWAY SPECTRUM 8-PORT ETHERNET OVER FIBER POE SWITCH l ALTRONIX NetWaySP8WPX Hardened PoE Switch with Dual SFP (Fiber) Ports is the latest addition to the company’s recently introduced NetWay Spectrum Series. Designed for long distance applications, the NetWaySP8WP is a highly cost-effective all-in-one solution that includes an 8-Port hardened PoE switch, 115W power supply/ charger with an enclosure that accommodates batteries. The unit features 2-SFP ports allowing you to connect multiple units and create a fiber ring. Each port is rated at 30W (PoE/PoE+), 2-ports are configurable for 60W (Hi-PoE) and embedded LINQ Network Communications Technology provides remote diagnostic monitoring, control and reporting. Proudly Made in the U.S.A. and backed by a lifetime warranty. Distributor: Altronix Contact: info@altronix.com

TRUVUE WI-FI VIDEO INTERCOM DOOR PHONE FROM CSM l TRUEVUE Wi-Fi door phone, distributed in Australia by CSM, lets you answer the front door or gate from your smart phone and allows you to hear, talk to and see your visitor from an Android or IOS mobile device, using Wi-Fi or 3G/4G, anywhere around the world. A lock release output allows you to remotely release a door or gate from your smart phone app. The TruVue Wi-Fi video door phone includes a proximity card reader allowing staff, residents and home owners the ability to unlock the door or gate on arrival, by presenting a card or keyfob to the Wi-Fi door phone. Also Included in the kit is a battery operated wireless doorbell chime unit which sounds every time the door phone call button is pressed. Up to 38 different chimes can be selected. TruVue Wi-Fi video door phone features tamper and motion detection alarms that can be sent to the mobile device app, the ability to automatically and manually capture photo snapshots and video footage and view the Wi-Fi video door phone live video at any time. In terms of construction, the unit is robust with an aluminium body and a plastic rain shield.

CSD RELEASES EYELOCK NANO NXT l CSD introduces the eyeLock Nano NXT Iris recognition system, which is an outstanding Biometric reader that uses video-based technology to look at more than 240 unique characteristics in each iris. This exciting eyeLock technology eliminates the use of traditional access cards with the scan of an eye. The Nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy, providing a safe and secure way of validation and access control for all users in commercial and enterprise environments. The Nano NXT is PoE, web interface configured and supports single or dual factor authentication using an external Wiegand or OSDP connected reader. Distributor: CSD Contact: 1300 319 499

Distributor: Consolidated Security Merchants Contact: +61 3 8545 9813

se&n 69

SEM0917_68prods.indd 69

29/8/17 2:01 pm


● Regulars

Products

Editor’s choice

What’s new in the industry.

HIKVISION LAUNCHES 50X IR SPEED DOME l HIKVISION has released a new speed dome with a 50x zoom lens, giving it the ability to pick out more details over wider areas. The camera is also the first product to have optical image stabilisation to compensate for image drift. With a zoom lens that can go from 6.6mm to 330mm, objects can be seen greater distance than before. This gives the operator a lot more flexibility to track and check people or objects in and around their area. The camera also boasts Eagle Eye focus technology, making the image clear, even when zooming. This speed dome is the first Hikvision camera to use the new Optical Image Stabilization technology, making the image clearer than ever. When the lens is stable, the image is focused on the centre of the sensor, but when the lens shakes that focus drifts away from the centre. This causes blurring on the image. The camera uses a gyroscope to measure the vibration and send that information to a processing chip. This then uses an algorithm to make an adjustment to the IS lens to correct the drift. Other features include 2MP resolution, with H.265+ compression, up to 500m IR distance, rapid focus and a 1/2.8-inch progressive-scan CMOS chip. Distributor: Video Security Products Contact: +61 2 9557 7946

SUREVIEW, TYCO INTEGRATE SUR-GARD AND IMMIX VIDEO VERIFICATION l SUREVIEW Systems has partnered with Tyco Security Products to deploy Tyco’s Sur-Gard (SG)-System 5 with their Immix platforms. The combined solution will provide video verification capabilities as part of a single platform, according to an announcement. The SG-System 5 alarm receiver supports the visual verification features for DSC PowerSeries Neo, Tyco Security Products’ wireless intrusion platform. These devices have the capability to send a visual clip along with the digital alarm that, via the integration with Immix, can be instantly viewed and acted upon by a monitoring agent, according to the announcement. Video alarm verification is growing in importance to support reduction of false alarms,” said Chris Masse, “technical sales manager, Tyco Security Products. “Our partnership with SureView Systems makes it easier for central station operators to automatically manage video while helping save money by reducing unnecessary response to alarms without reducing security.” The integration enables monitoring stations using Immix and SG-System 5 to receive digital alarm events with video and blend this with a range of other device integrations supported by Immix including video, video analytics, two-way audio, remote access, GPS location aware devices and others. The result is a plug-and-play solution that combines the capabilities of multiple disparate security systems to enable monitoring station operators to automatically receive live video clips and audio files from a variety of sources.

GENETEC, ALUTEL INTEGRATION BRINGS MOBILITY TO SECURITY CENTER l GENETEC announces that its technology partner Alutel Mobility, a manufacturer of mobile access control systems, now offers extended access control capabilities to open areas, transport facilities, construction sites, mining, oil and gas operations and education establishments without having to rely on physical readers or installations. Alutel Mobile is available now for Genetec Security Center, the company’s unified, open-architecture platform that combines access control, video management systems and automatic license plate recognition (ALPR). Using the Genetec software development kit, Alutel developed integrated functionality in Security Center Synergis that allows its mobile readers and virtual zones to function the same way as a traditional, wired and wall-mounted card reader unit. These mobile units can synchronize cardholder information, badges, schedules, and access rules, while also reading barcodes and QR codes, which trigger alarms and generate valid and invalid access events, depending on rule configurations, according to the company. Installed on smartphones and tablets, Alutel Mobile can extend access control readers from globally recognized hardware manufacturers to multiple credential types. Distributor: Hills Contact: 1800 685 487

Distributor: Tyco Security Products Contact: +61 4 6776 3544

70 se&n

SEM0917_68prods.indd 70

29/8/17 2:02 pm


DAHUA PTZ NETWORK CAMERAS l DAHUA has added 5 new mid-to-long range PTZ cameras to its Pro Series and Ultra Series. These new PTZ network cameras feature an ultra low-light, 2MP sensor, exceptional wide dynamic range, Starlight technology, and backwards-compatible compression options. PTZ cameras are widely used for applications that require real-time tracking of people or vehicles with an appropriate level of zoom to identify fine details up close. The continuous movement that PTZs endure requires more bandwidth than a stationary camera. Thanks to the latest in video compression standards, the new 2MP PTZs offer H.265 for improved encoding efficiency while preserving high-quality video. H.265 can save up to 50 percent on bandwidth and storage when compared to standard H.264. The cameras also support MJPEG and H.264 for backwards compatibility. The new Pro Series mini-PTZ is offered at a cost-effective price point, boasts ease of installation, and has IR illumination and a 25x optical zoom lens. Three of the new Pro Series PTZs feature a 30x zoom, true wide dynamic range, and auto-tracking functionality, meaning the camera can follow a subject automatically without the need of an operator. The new Ultra Series PTZ features a resilient metal housing for tough environments, auto-tracking, a powerful 40x optical zoom lens, and an IR distance of up to 200m (656.7 feet). Distributor: Dahua Contact: overseas@dahuatech.com

VICON VAX 2.9 FROM SENSATEK l VICON Industries has announced the release of VAX 2.9, the latest update to its powerful and versatile IP access control solution. VAX Access Control provides centralized monitoring and management of access to doors, elevators and other protected spaces located throughout facilities of any size, including multi-site installations. A web-based interface with responsive design provides users with complete and secure control from PCs, laptops, tablet and smart phones. New to version 2.9 is the ability to create custom map-based interfaces that display physical placement of VAX devices, through which users can immediately call up associated data and video. Map images can be imported as PNG, GIF or JPEG files, and then populated with icons representing doors, elevators, inputs, outputs and cameras. Clicking on an icon provides real-time status of the device (i.e., door open) and other information, such as related live and recorded video (if integrated with a VMS solution) and reporting of activity at that location over a specified period of time. VAX supports an unlimited number of maps, and maps can be linked to provide intuitive navigation between rooms or buildings using the arrow keys. Monitoring the system via the map interface provides the simplest and most natural way for users to engage with the system. Also new to VAX 2.9 is a User Time Tracking Report that provides a summary of total hours that specific individuals spent within a defined area.

NETWAY SPECTRUM SERIES PRODUCT DESCRIPTION l NETWAY Spectrum Series hardened PoE switches and Ethernet over fiber media converters accommodate single or multi-mode fiber, as well as composite cable, combining fiber with copper to simultaneously deliver low-voltage power and data at distances up to a mile. Features rack mount media converters for head-end installation, and a wide range of indoor and outdoor models with single or multiple SFP Ports for remote deployment and embedded LINQ Network Communications Technology. Lifetime warranty. Made in the U.S.A. Distributor: Altronix Contact: infor@altronix.com

Distributor: SensaTek Contact: 1300 560 026

se&n 71

SEM0917_68prods.indd 71

29/8/17 2:59 pm


● Regulars

Help desk ■ Below are the approximate recommendations for rest times (complete rest, that is) between sets according to your goal, per the National Streng th and Conditioning Association (NSCA). *Note that since fat loss depends primarily on diet, there is no official rest-period prescription for it, although we feel that both short and long rests work, depending on the program.

Q: Our application is vulnerable to vehicle attacks and we’ve been reading about whether defending our site against such attacks simply shifts the nature of the attack to something lower tech – knives, motor scooters, acid, etc. What does SEN think? A: Truck attacks such as Nice, which had a devastating death toll of 80, with hundreds badly injured, suggest public space should be thoughtfully defended from encroachment by heavy vehicles. Attacks with edged weapons in a crowded place are of a different order – members of the crowd who are capable of reacting have a chance of doing so. Police officers with side arms can eliminate such threats – in Cambrils one police officer killed 4 ISIS-inspired terrorists armed with knives on the street before they could attack unarmed civilians. Not so with vehicles, particularly trucks. Isolate people from traffic. Use earthworks, concrete structures, sunken fountains, etc. If you need controlled vehicle access points, bite the bullet and install automated rising bollards with local and remote control. At entrances search bags. Use magnetometers. At peak times have well-trained first responders on hand, as well as armed police officers in attendance and/or in close contact. Pressuring government for the global application of FCAT technology in heavy vehicles is worthwhile, too.

Our panel of experts answers your questions.

Q: From the point of view of image quality, would you argue hemispheric cameras are the best option to provide all-round surveillance in bigger areas – such as shopping centres, airport retail precincts, universities and the like? Or are we better to think about multiple cameras with smaller fields of view? Q: Let’s get this straight right from the start – hemispheric cameras with 360-degree fields of view spread their pixels. Depending on sensor size this pixel spread will render the image soft from very close in to quite close in – less than 10m and in some cases closer still. As light falls, detail will be lost earlier, too. Depending on what you are trying to achieve, this softness in larger applications may mean no courtadmissible face recognition. The trade-off will be situational awareness of a profound nature – at no time will a subject in the target area leave the field of view. What this means is that you need your hemispheric view to be able to identify dress or general features of individuals you’ve already identified at an entry point using a camera with a much narrower angle of view – 8-10mm for a 1/3rd of an inch sensor. If you get these 2 aspects right, then hemispherics will save you money through reducing the number of cameras and associated infrastructure required. Optically, hemispheric lenses have a very small hyper focal distance – this means pretty much everything in the scene will be in focus. In terms of flaws, any wide

lens will be at risk from flare. Hemispheric CCTV cameras also have lashings of an optical aberration called barrel distortion – magnification decreases the further you go from the optical axis. With a hemispheric, the presence of barrel distortion is deliberate – the lens has a tiny focal length and a massive aperture angle. Generally speaking, surveillance cameras deliver multiple image streams from a hemispheric camera – a single fisheye, then a range of images where the curvilinear scene is adjusted to a rectilinear format. There will obviously be some loss of detail at the edges, top and bottom where pixel input is shorn off by software. Correcting software that relies on averages will also introduce softness to the final output. There are other alternatives to panoramic cameras when you are looking for complete coverage of an area – you can use multi-head cameras, each with a narrower angle of view, with the output stitched together by software in-camera. There are pros and cons to this approach. The sharpness of multi-head cameras is certainly better but much depends on the purity of the software stitching – you’ll need to undertake objective testing to establish which is best for you. It may be that in more compact applications, a quality panoramic camera does a more integrated job at a lower cost while multiheads are better for large spaces. Q: Something I see a lot of with video surveillance is a complete lack of detail in the dark regions of a scene.

72 se&n

SEM0917_72help.indd 72

29/8/17 2:52 pm


This need not be at night, either. It can happen when part of the scene is overexposed. What do you think is the cause of this loss of detail and how can it be rectified? A: It sounds like crushed blacks – essentially the black point of an image is being shifted so the dark regions of the scene are devoid of light – and thus of detail. It’s important to bear in mind here that crushed blacks are not about tone but about detail. This may be caused by improper camera settings, or by poor monitor calibration. Blacks may also be crushed in software in order to enhance the appearance of the lighter part of the scene – reducing the appearance of over-exposure and increasing contrast and saturation. During our tests, we notice some cameras do relatively well with challenging light levels in variable scenes but others exhibit issues with crushing blacks. Most CCTV cameras are about increasing wide dynamic range, not decreasing it but the camera may be at default. If you believe a camera is crushing blacks to expose for the bright part of the scene at the expense of the dark parts, apply WDR. You’ll see the appearance of the image change noticeably as blacks are lifted – this lifting relates only to image tone, not to detail. You’ll see an overall lightening, brightening and warming of the entire scene. Sometimes this change can be too much – try applying back light compensation instead of WDR – it’s less intrusive and may retain better image balance if backlight is not too extreme. Excessive crushing of blacks is not just an in-camera software issue. When video

cards convert signals, they will always introduce some distortion of greyscale range and unless you know how much you can’t calibrate to correct it. I think it’s also fair to acknowledge that crushed blacks are a feature of poor quality and poorly calibrated monitors. Most monitors are never calibrated properly, or are calibrated once and left to drift. Further, older flat monitors all suffered badly from crushed blacks no matter their calibration - given many security departments use screens until they fall off the wall, the presence of crushed blacks (read loss of detail in dark areas) is pretty much guaranteed. Q: Can we install PIRs in challenging environments in a way to ensure they never false alarm or should we install dual technology? A: Depending on the challenges, there’s nothing wrong with installing PIRs in a way that allows them to operate in challenging environments – as long as catch capability is not impaired. There are a number of installation tips that will keep false alarms to a minimum while allowing PIRs to work to their maximum potential. Successful use of passive infrared detection demands a stable IRE environment so as soon as you get into the installation environment look around and make certain there are no heaters or powerful lights in the room likely to generate excessive infrared energy levels. PIRS can’t be located facing unfiltered sunlight and nor should they be used anywhere there will be sudden temperature changes on surfaces within the target area. Exposure to glass surfaces

should be space divisions in office or home environments - not perimeter glass - unless a verandah keeps direct sun off. Other potential problems with PIRs include humidity, unsuppressed electrical equipment that could cause interference (this includes things like fluorescent lights), and dirt and dust in the environment. You can effectively seal PIRs and conformal coat their boards if you’re installing them in tough environments like bathrooms, garages or covered ways. Another mistake is to install PIRs in environments in which cats, dogs, birds and flying insects are present unless the sensors have been specifically designed to resist these false alarm signals through sensitivity adjustments, microprocessor control or lens design. Q: SEN talked a lot about cloud in the last issue but obviously, bandwidth is a key issue in holding many of us back from exploiting enterprise cloud applications in the way would like to – worthwhile use of cloud is beholden to infrastructure. Is there a workaround for poor bandwidth in your opinion? A: To some extent there is a work-around. We’d be thinking about competitive 4G wireless links and hybrid cloud. Managing cloud is not so difficult in the city as in regional areas but there’s still considerable contention for wired and wireless services. A recent trip to the U.S. revealed Wi-Fi services in California public spaces that were faster than SEN’s synchronous (24/24) naked DSL service which lies within a few hundred metres of a major exchange and just a few kilometres from the centre of Sydney. Australia is certainly a poor performer when it comes to bandwidth.n

se&n 73

SEM0917_72help.indd 73

29/8/17 2:52 pm


SEPTEMBER 2017 ISSUE 391

events

l

PROTECTING CROWDED PLACES

SECURITY l The Interview: Dale Acott & Chad Wright, SCSI l Strategy for Protecting Crowded Places from Terrorism l Review: Samsung Wisenet XNO-8080R Bullet l Alarm Monitoring: New Growth Opportunities l Product Review: Genetec Mission Control l New Product: Dahua X820 Industrial Drone l New Product: EyeLock Iris Biometric From CSD l Access Control: High Security Card Technology l Special Feature: Automatic Retractable Bollards l USS Iowa: Protecting the Battleship of Presidents

PP 100001158

+ SECURITY & GOVERNMENT EXPO

+

& GOVERNMENT EXPO

Security and Government Expo 2017

Date: November 2017 Venue: The Realm Hotel, Canberra Contact: Monique +61 2 9280 4425 Security and Government Expo is a one-day expo with space for 20 companies to promote their technologies and products in the nation’s capital. SAGE brings together government and commercial end users, consultants, integrators and installers in Canberra and the ACT to see the latest security solutions in a relaxed and informal atmosphere.

Smart Summit Asia Date: November 30 - December 1 Venue: Suntect, Singapore Contact: el: +44 (0) 330 3353900 The Smart Summit is a 2 day conference and exhibition covering the Internet of Things (IoT) ecosystem and its impact on the digital society. With 4 in-depth event tracks and over 80 leading speakers, no other IoT event covers the Smart Home, Smart Cities and Industrial Internet of Things in as much detail.

Security 2018 Date: July 25-27 Venue: 2018 Mebourne Convention and Exhibition Centre Contact: +61 3 9261 4662 Security Exhibition brings the largest selection of electronic and physical security suppliers in Australia to one destination for three days to showcase innovative solutions from 100s of leading brands.

SecTech Roadshow 2018

=

Dates: May 2018 Venues: Melbourne, Brisbane, Sydney, Adelaide and Perth Contact: Monique Keatinge +61 2 9280 4425 SecTech Roadshow in it's 4th year takes leading distributors and wholesalers on a national tour.

DAILY, WEEKLY, MONTHLY.

SEM0917_74events.indd 74

29/8/17 2:03 pm


SIMPLY THE BEST! SIMPLYTHE THEBEST! BEST! SIMPLY

UNRIVALLEDVIDEO VIDEOQUALITY! QUALITY! UNRIVALLED UNRIVALLED QUALITY!

H.265Coding Coding H.265 H.265 Coding RealTime Time4k 4kStreaming Streaming Real Real Time 4k Streaming InstantPlayback Playback Instant Instant Playback IntuitiveSmart SmartGUI GUI Intuitive Intuitive Smart GUI NewEESeries SeriesEnterprise EnterpriseCameras CamerasNow NowAvailable AvailableInIn8MP 8MP4k 4k New New E Series Enterprise Cameras Now Available In 8MP 4k NewCost CostEffective EffectiveSSSeries SeriesCameras CamerasNow NowAvailable AvailableInIn4MP 4MP++8MP 8MP New New Cost Effective S Series Cameras Now Available In 4MP + 8MP

PH1300 1300663 663904 904 PH sales@csmerchants.com.au PH 1300 663 904 sales@csmerchants.com.au www.csmerchants.com.au sales@csmerchants.com.au www.csmerchants.com.au www.csmerchants.com.au

SEM0917_75.indd 1

29/8/17 10:08 am


Intelligent Video Management Solutions Intelligent Video Management Solutions

p p u u n n r r w w h h d d v v l l z z y y s s e e k k G G t t o o r r x x f f

a a

Licence Plate Plate Search Search Licence Track a a vehicle vehicle across across Track one or or multiple multiple sites sites one 2 2

B B 3 3

C C

The The next next generation generation intelligent intelligent video video management management

4 4

0 0 4 4 5 5 8 8 4 4 7 7 6 6 0 0 5 5 8 8 1 1 9 9 4 4 0 0 8 8 9 9 6 6 1 1 0 0 7 7

1300 319 499 1300 319 499 csd.com.au csd.com.au VIC: Mulgrave, Tullamarine NSW: Seven Hills, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta VIC: Mulgrave, Tullamarine NSW: Seven Hills, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta SEM0917_76.indd 1

29/8/17 10:08 am


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.