52
THE MAGAZINE WITH THE INSIDE STORY ON SECURITY ISSUE 17 NOVEMBER 2014 06 INDUSTRY NEWS 32 BIG DATA CONVERGENCE Latest developments in the industry 24 SAFE SHOPPING Securing largest Mall in France How security systems empower facility managers 40 THE AVIATION SECURITY THREAT Defeat measures to mitigate aviation terrorism A CLOSER LOOK AT PAXTON’S MARKET-LEADING INTERNATIONAL ACCESS CONTROL ACCESS ALL AREAS

In Security November 2014

Embed Size (px)

DESCRIPTION

The magazine with the inside story on security

Citation preview

The magazine wiTh The inside sTory on securiTy

issue 17 NOVember 2014

06 INDUSTRY NEWS 32 BIg DaTa coNvERgENcE

Latest developments in the industry

24 SafE ShoppINg

Securing largest Mall in france

how security systems empower facility managers

40 ThE avIaTIoN SEcURITY ThREaT

Defeat measures to mitigate aviation terrorism

a cLoSER Look aT paxToN’S MaRkET-LEaDINg INTERNaTIoNaL accESS coNTRoL

accESS aLL aREaS

www.paxtonaccess.ae

Find out more:

Learn how Paxton integrates with leading CCTV, biometrics, intruder and fire alarm systems, SIP and much more

Get great company insight and discuss opportunities for 2015

Find out more about Paxton’s Certified Paxton Installer Programme

Innovative award winning access control and door entry designed to meet the challenges of the security industry

Come See Us at Stand S1 - D38 18th – 20th January 2015Dubai International Exhibition Centre

Visit Paxton, UK Market Leading Access Control Designer and Manufacturer, at Intersec, Dubai

Integration

International team of industry experts Free training and education

Simple yet intelligent products

Paxton

Guarantee Garantie Garantía Garanti Takuu תוירחא 保证

εγγύησ

η G

war

ancj

a W

arran

ty Garanzia

Register for tickets at www.intersecexpo.com

Editor Chris Hewett

Advertising +44 (0)1622 201207 [email protected]

Accounts Jay Kempisty +44 (0)1622 201207 [email protected]

Publisher Wayne Banks +44 (0)1622 201207 [email protected]

Designer Mark Fisher [email protected]

Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 [email protected] www.mebmedia.co.uk

Articles and art may not be reproduced or reprinted without the express written permission of the publisher.

Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

Copyright © MEB Media Ltd – 2014, all rights reserved.

The magazine wiTh The inside sTory on securiTy

06 INDUSTRY NEWS 32 BIg DaTa coNvERgENcE

Latest developments in the industry

24 SafE ShoppINg

Securing largest Mall in france

how security systems empower facility managers

40 ThE avIaTIoN SEcURITY ThREaT

Defeat measures to mitigate aviation terrorism

a cLoSER Look aT paxToN’S MaRkET-LEaDINg INTERNaTIoNaL accESS coNTRoL

accESS aLL aREaS

IN SECURITy I November 2014 I 1

Welcome to the November issue of

In Security and with the Intersec,

Transport Security and Counter Terror

Expos just around the corner, we have a

heavy focus in these areas. This issue’s

Product & Industry News section (starting

on page 8) showcases the latest news

from the industry.

Our cover story this month looks at

Paxton’s multi-site security solution being

installed at Graze Inc. and also a quick look

at their attendance to Intersec in Dubai

(see page 2).

Next how cards have evolved from bar

coded cards just a few years ago to the

new biometric card of today (see page 20).

Later, Bosch secures shopping in the

largest Mall in North-Western France

with its latest security offering.

(see page 24).

In a long line of success stories,

Panomera® from Dallmeier ensures

enhanced security at Naples Airport

(see page 28).

Simon Smith, one of IPSA’s maritime

security experts, explores the intricacies

and nuances of port security (see page 32).

Martin Grigg of the PTS Consulting Group

illustrates how security systems in truly

‘intelligent’ buildings are empowering

facility managers as data gathering evolves

beyond mere aggregation of information

(see page 36).

The British Security Industry Association,

explains why counter terrorism training via

security apprenticeships are vital in

the fight against terrorism (see page 40).

Finally, we look at the threat to aviation

security and crafting defeat measures to

mitigate these threats to our safety

(see page 44).

Chris Hewett, Editor

Contents02 Cover Story – Access all areasGraze - Net2 provides International, multi-site security solution

06 Product & Industry NewsThe latest news and views from the industry

20 Put a finger on itHow cards have evolved from bar coded cards just a few years ago to the new biometric card of today

24 Safe shoppingBosch secures shopping in the largest Mall in North-Western France

28 Clear skiesPanomera® from Dallmeier ensures enhanced security at Naples Airport

32 Any port in the stormSimon Smith, one of IPSA’s maritime security experts, explains port security

36 Big data convergenceMartin Grigg illustrates how security systems empower facility managers

02

24

32

Commentary

40 Counter terrorism trainingSecurity Apprenticeships vital to counter-terror efforts

44 The aviation security threatLooks at crafting defeat measures to mitigate the threats to aviation security

06

36

36

20

40

44

2 I November 2014 I IN SECURITy

Access all areasINTerNATIoNAL AcceSS coNTroL LeADerS, PAxToN,

LAuNcHING AT INTerSec, DuBAI

CO

vER

STO

Ry

“Paxton has become a market leader through its efforts to listen to and exceed the expectations of its customer base”

visitors to Intersec, 18th – 20th January 2015, can look forward to finding out more about Paxton, the UK market leader of electronic

IP access control and door entry equipment, who will be launching their UAE division at the trade fair.

Having previously exhibited on partner stands at Intersec, in line with its international expansion, 2015 will see Paxton showcase its innovative and intelligent product

range, from its own stand, S1-D38, located in the British Pavilion.

The Paxton stand should be the first stop for those wanting to learn more about the company and understand the factors behind its global growth. Paxton’s international team of industry experts will be on hand to give insight to new customers who are interested in Paxton’s full range of access control solutions, including its award winning IP ready door

entry system, Net2 Entry. On stand demonstrations

will enable delegates to see for themselves how straightforward the products are which have been designed to be easy to use, install and maintain. Kit will be available to purchase through Paxton’s dedicated network of distribution partners, Mayflex, Anixter, Norbain and NIT.

visitors to the show can find out more about the company’s free training and installer focussed

IN SECURITy I November 2014 I 3

workshops which launched in the UAE this year. The Certified Paxton Installer Programme has trained over 4000 installers from 2000 companies globally since January 2014, and will continue to support the company’s increased presence in the region and Paxton becoming an LLC company in 2015.

Dan Drayton, Paxton’s Export Sales Manager, says: “I can’t think of a better or more engaging way to continue our journey in the UAE than at Intersec, the leading international meeting platform for the Security & Safety industry.

Paxton has become a market leader through its efforts to listen

to and exceed the expectations of its customer base, and our stand at intersec has been designed with this in mind.

I look forward to meeting new and existing customers face to face, hearing what they have to say about the industry and providing a greater insight into the company, our products and training opportunities.”

Paxton will be in the British Pavilion at stand S1-D38 during Intersec, Dubai.

n For more information about the company and its training please visit www.paxtonaccess.ae

Paxton design and manufacture intelligent and innovative products to provide the best solution for a large number of security concerns. One recent site who contacted Paxton for assistance was graze, a healthy and nutritious mail-order snacks service. Read on to find out more about how our products can be used.

Subscribers to graze tailor their orders by telling graze their likes and dislikes, and subsequently receive a monthly, fortnightly or weekly delivery in a letterbox sized container. Founded in the UK in 2008, graze now have three sites in the UK and one in the USA with a steadily increasing work force.

RequirementsGraze needed a complete security solution that could be implemented in the UK and USA to secure their premises without numerous sets of keys. Andrew Middlecott, Operations Director says: “Our sites became increasingly difficult and expensive to manage with the growing requirements of the company – access and security-wise. It reached the stage where there were 10 or more people who needed about 10 keys each, plus everyone else with specific keys, which cost more than £600 a set. If someone lost a set of said keys, all the locks had to be changed and new keys cut”.

The Case Study

g

4 I November 2014 I IN SECURITy

Type of site: Commercial – production, distribution, head office and fulfilment

Number of users/doors: 400 users 31 doors (across the 4 sites)

Solution required: • To be completely keyless • Networked solution to control

and restrict the movement

of different workers • Ensure staff safety

Result: • Customer confidence

using Net2 • Timezones controlling

the movement of different shift workers

• Scalable solution as the company grows

• Securing four sites as one • Intruder alarm integration

Paxton products used:UK• Site one - 15 x Net2 plus

contol units • Site two - 5 x Net2 plus

control units • Site three - 6 x Net2 plus

control units

USA• Site four - 5 x Net2 plus

control units

Solution Installation company Soundandsafe.com were responsible for the installation at Graze. Jamie Merry, Installer says: “I’ve used Paxton access control for years and am very experienced with it. It suited the customer’s requirements to become keyless, whilst also being flexible and scalable for an expanding business.”

Net2 is a user-friendly and flexible networked access control system, designed to make the management of any building incredibly simple. Easy to use and with excellent features, Net2 access control moves beyond the basics of managing the flow of people around a building, offering benefits like building control and system integration. The system is perfectly suited to a growing business as it’s easily scalable with up to 1000 doors on one system.

Net2 plus is Paxton’s most advanced door control unit, employing the use of PoE technology to plug straight into an existing network with no need for additional wiring. This made the graze installation quick and undisruptive to the staff and business. Graze use the Net2 software to connect all four sites in the UK and the USA conveniently to one network, controlling the system centrally in the UK, making the system easy to manage.

ResultSince Net2 was installed at graze, the site has been regularly updated as and when required. The site is currently running on the latest version of the Net2 software, with features such as the ability to arm and disarm the intruder alarm at the main panel. The benefit of this feature to graze is knowing the building is completely secure and all external doors and delivery gates are shut for the alarm to be set. Graze also use timezones to monitor the movement of day and night shift workers, for example cleaners have access for the agreed days, times and rooms.

Jamie Merry and Andrew Middlecott have a number of plans in the pipeline to expand the use of Net2 at graze. Within the production and distribution centre in London, they plan to introduce more functionality to their expanding site by incorporating Net2 into their production line helping them to meet health and safety regulations. Only staff with the appropriate training will have the correct access permissions to operate certain dangerous machinery or move equipment on the production line, giving managers peace of mind. n

The Case Study

January 18 – 20, 2015 Dubai, UAE

Plan for your visit todaywww.intersecexpo.com

Visit the world’s leading trade fair for Security, Safety & Fire ProtectionYour opportunity to meet over 1,300 local and international exhibitors showcasing the best security solution.

2015 Highlights:• Confirmed participation of the world’s top

10 security companies• New GPEC Pavilion for police & special equipment• ESSA Pavilion for safes, strongrooms & deposit systems• Dubai SME Pavilion for small & medium enterprises• Techtextil Pavilion for technical textile & nonwovens• 13 Country Pavilions.• Enlightening Conferences Programmes

Product Sections:• Commercial Security • Information Security • Fire & Rescue • Safety & Health• Homeland Security and Policing

6 I November 2014 I IN SECURITy

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Latest version of AC2000 offers solutions to improve security, a range of new integrations and enhances the functionality of emerald, the intelligent access terminal

16th October 2014 – CEM Systems, part of the Security Products business unit of Tyco (NySE: TyC) today announced the release of version 6.9 of the AC2000 suite of access control and security management software. This new version of the software offers improved security features and increases the performance of the AC2000 software suite including AC2000, AC2000 Airport and AC2000 Lite.

“AC2000 is an integrated security management system that is designed with the customer in mind, providing flexible solutions that help increase security and improve operational effectiveness,” said Conleth Donaghy, Senior Product Manager, CEM Systems. “The latest release of AC2000 further reinforces this, offering improved security features with the addition of the SmartCard Utility and support for AES encryption across all CEM DESfire readers.

The latest enhancements to emerald also provide an additional security level, where personnel image can be immediately verified at point of entry.”

An exciting enhancement of AC2000 is the addition of user defined keys through the AC2000 SmartCard Utility application. This application is a convenient and flexible approach to smartcard key management by allowing users to take full ownership of their smartcard personalisation process. This means if encryption keys become compromised, updates can be implemented

with minimal impact to security and daily operations using the AC2000 SmartCard Utility.

AC2000 v6.9 now also supports 128-bit AES (Advanced Encryption Standard) encryption across the CEM DESFire reader versions of the emerald terminal, the S610 reader range and the sPass reader. This encryption standard provides a future proof access control solution, increasing security and reducing the risk of card cloning.

version 6.9 of AC2000 also offers enhanced functionality of emerald, CEM’s award winning intelligent access terminal. emerald is a touch screen reader and controller in one, with built in voice over IP (voIP) intercom functionality, that uniquely enables AC2000 data to be accessed securely at the door. With the release of AC2000 v6.9, emerald now supports Image on Swipe mode, which allows the terminal to display the cardholder’s image, and grants or denies access based on this verification. Also with the release of AC2000 v6.9, emerald remote apps are now more user friendly with new intuitive menus and improved response times.

In v6.9, AC2000 now supports full two way integration with Exacq’s exacqvision video management system and integration with Future Fibre Technologies’ CAMS 3 perimeter intrusion detection system. These latest integrations build on the existing range of AC2000 video, perimeter, fire and intrusion integrations, making AC2000 a powerful security management system.

n To find out more about the full list of features and integrations available in AC2000 please visit www.cemsys.com

CEM Systems releases new version of AC2000 Security Management System

IN SECURITy I November 2014 I 7

Mayflex, the cabling infrastructure, networking and electronic security solutions distributor, has signed an agreement to distribute Digital Barriers’ intelligent video analytics application for reliable zone-based intrusion detection - SafeZone-edge. It is the first edge-based product to combine the performance of server-based intelligent video analysis (IvA) with the simplicity of video motion detection (vMD).

With UK Government certification (i-LIDS® scheme), SafeZone-edge is designed to protect secure facilities and reliably monitor remote sites, with exceptional detection accuracy and minimal false alarms. It is available now on a wide range of compatible Axis cameras and encoders.

In addition to performance, SafeZone-edge was designed with a relentless focus on ease of installation, affordability and scalability. An innovative auto-calibration feature dispenses with complex scene calibration tasks, allowing multiple cameras to be installed quickly and without fuss.

Intelligent processing ensures reliable operation, adapting automatically to seasonal and environmental conditions (variable illumination, shadows, weather) that can otherwise cause nuisance alarms. In a real-life operational test conducted over a week, replacement of a vMD solution with SafeZone-edge resulted in a nuisance alarm reduction of 10,000+ to just 1.

Mark Simmons, Sales Director of Mayflex commented, “As a business we are continually striving to bring products on board which complement existing brands and offer our customers an easier way of working and making money. The fact that Digital Barriers have a relationship with AXIS, whom we have distributed for a number of

years, is a huge plus. This is yet another great brand that has been added to the ever growing Mayflex security product portfolio”.

Dan Meyrick, Sales & Business Development Lead for SafeZone-edge said, “Digital Barriers are delighted to have Mayflex as a Distribution partner. When bringing innovation to the market with products such as SafeZone-edge, it’s vital you have the right partners working with you. We certainly believe we have that in Mayflex and very much look forward to working with the Mayflex team”.

The SafeZone-edge product range is available immediately from Mayflex.

n For further information visit www.mayflex.com

Mayflex Appointed Distributor for Digital Barriers video Analytics

Automatic Systems, a world leader in the automation of secure entrance control, announces that it has successfully gained approval from CHAS – The Contractors Health and Safety Assessment Scheme.

CHAS is established as the market leader for health and safety pre-qualification in the UK. It is available to suppliers (those who provide goods and services) and to organisations (buyers) looking for suitably competent suppliers.

“This is a fantastic achievement for us and demonstrates that we comply with current health & safety law in the construction industry” John Baker Country Manager for Automatic Systems UK and Ireland states.

CHAS is recognised throughout our industry and thus reduces the amount of time and resources needed to pre-qualify for projects, which is beneficial to our clients as it reduces the time taken from enquiry to order.

n For further information visit www.automatic-systems.com

Automatic Systems is CHAS Approved

Southwest Microwave has expanded the Software Development Kit (SDK) options for its INTREPID™ Series II perimeter intrusion detection systems (PIDS) with the addition of the Remote Polling Module II (RPM II) SDK. The RPM II package, consisting of an IP-based application layer protocol and accompanying system control hardware module, provides simplified high-level interface between third-party physical security information management (PSIM) or surveillance systems and INTREPID™ detection technologies.

The RPM II SDK addresses the PIDS integration requirements of network-based large or multi-site facilities, enabling plug-and-play deployment, control and monitoring of the INTREPID™ MicroPoint™ II fence detection system, MicroTrack™ II buried cable detection system and MicroWave 330 digital microwave link through a user’s security management or surveillance platform.

“Southwest Microwave’s scalable SDK resources, and especially the new RPM II package, easily achieve the integration of our INTREPID™ intrusion detection technologies within an end-user’s preferred PSIM environment over local or wide area network”, explained Bob Kirkaldie, Southwest Microwave’s Director of Sales.

To simplify interface, only the RPM II system controller is queried by the facility’s control or monitoring application. The RPM II serves as pollmaster, polling INTREPID™ sensors and auxiliary devices for status, and communicating this information to the head-end system via TCP/IP network connection.

Southwest Microwave’s Remote Polling Module II SDK Simplifies INTREPID™ High Level Interface

8 I November 2014 I IN SECURITy

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

“By eliminating the need for direct polling of each INTREPID™ device by the head-end system, our RPM II SDK reduces interface development time, cost and complexity, which is a win for both developer and end user,” outlined Kirkaldie. “And as new sites are added to a facility’s security program, it’s simply a matter of connecting these to an RPM II controller, which then handles the heavy lifting where the integration is concerned.”

The RPM II SDK enables extensive control and monitoring functionality for the INTREPID™ detection suite, including real-time notification of intrusion attempts, tamper and service alarms, tie-in of camera setting and position presets to detection zones, visual assessment of intrusion attempts or tampering, and storage of events in alarm history.

Device configuration and maintenance are conveniently achieved either locally or remotely via TCP/IP network with Southwest Microwave’s intuitive universal installation service tool, which features sensor auto-discovery, guided navigation and forward propagation for single step, multi-sensor zone configuration.

Since sensor set-up and alarm reporting are handled either locally or over the network, enterprise-level facility administrators, who often manage multiple or remote sites, can view or modify system parameters and monitor alarm activity from anywhere at any time.

“Just as we are committed to developing perimeter security solutions that integrate seamlessly with one another, we are similarly focused on ensuring that our technologies interface easily with our customers’ overall security management systems and networks. The RPM II SDK definitely achieves this goal. ”

n For further information please visit www.southwestmicrowave.com/SDK

Everyone deserves to live in a safe and secure environmentAt Bosch, we are constantly pushing the boundaries to develop IP video solutions that set new standards in security and data management. We deliver solutions that provide the highest quality of relevant video images anytime, anywhere. We also guarantee the most effi cient bitrate and the lowest storage requirements without compromising video quality. We allow you to connect in new ways and change the way you work by using superior intelligence and analytics at the edge. We are constantly searching for ways of safeguarding your environment that are simpler to understand, easier to install, incredibly precise, and seamlessly connected. Whether you are a professional or end user, our focus is creating intelligent IP video solutions to precisely fi t your needs.Learn more at www.boschsecurity.com/hdsecurity

Our focus is innovating security where you need it most

innovating security where you need it most

1598_00_046_ADV_VS_210x275.indd 1 9/17/14 10:31 AM

pro

du

ct a

nd

ind

ust

ry n

eWs

10 I November 2014 I IN SECURITy

MEL Secure Systems, the leading developer of surveillance and security solutions, has launched Ranger Mini, a new and compact COFDM H.264 digital video transmitter. It supports high quality, real-time video monitoring and recording applications for body worn, mobile and temporary CCTv applications and delivers images at distances of up to 1 km in non-line-of-sight urban environments. In line-of-sight environments, a range of 15km has also been achieved. Ranger Mini is designed to meet the needs of users in a wide range of law enforcement, security and military applications.

Ranger Mini provides class-leading performance and uses ultra-narrowband to provide exceptional range and video quality in high multipath environments regardless of line-of-sight as well as enabling users to co-locate more channels in the increasingly crowded RF spectrum. It is available in a wide range of frequencies including 1.3, 2.4 and 5.8 GHz while bandwidth is available in 1, 2, 4 and 8 MHz. Built-in AES 128/256-bit encryption ensures that the highest security standards are maintained.

Optional receiver kits include an LCD monitor and integrated DvR and enable high quality, interference free images to be received from up to four cameras simultaneously. Standalone receivers have diversity aerials as standard.

According to MEL Secure Systems: “This new mini COFDM transmitter simplifies the process of deploying body worn cameras and meets the performance requirements for a wide range of surveillance applications. The compact size of the unit also allows it to be used to provide clear images from the new generation of commercial and military drones.”

n For further information please visit www.melsecuresystems.com

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

New mini cofdm transmitter for body worn and mobile surveillance applications frommel secure systems

Ideally suited for first-response personnel and specialist emergency crews

WASHINGTON, DC – CINTEC America, designer and manufacturer of the CINTEC Reinforcing Anchor System, announces the Blastec Isolator Bin, a blast mitigation tool that is easily and rapidly deployed to provide temporary blast mitigation and fragment retention.

Originally demonstrated at the Department of Defense’s (DoD) Force Protection Equipment Demo (FPED) at the Quantico Marine Corps Base in vA, and selected by the British Military Bomb Squad, the Blastec Isolator Bin can be rapidly inflated in any location where suspect objects may be, including airports, restaurants, stores, post offices, and office buildings.

CINTEC’s Blastec Isolator Bin is made from an internally reinforced fabric, and is designed to be

deployed manually or robotically using appropriate bomb disposal equipment. The unit is open at the top and bottom to facilitate deployment and access to the suspect object if required.

The light-weight, compact unit measures 3’3” x 4’9” x 4’9”, but can be adjusted in size to meet customer requirements. The external fabric can be supplied to meet most environmental conditions and situations. Each unit weighs 33 lbs. when empty, and 2,850 lbs. when full. The volume per unit is 5.6cu feet when empty, and 67cu feet when full.

n For further information please visit www.cintec.com

Cintec America announces the blastec isolator bin blast mitigation tool

Mel secure launches ranger mini

IN SECURITy I November 2014 I 11

Anders announced that its TinyGreenPC subsidiary has bundled Milestone XProtect®, the market leading video surveillance software with its fanless FitPC to create cost effective and energy efficient IP based security system that can scale from a handful of cameras to a substantial installation.

Commenting, Paul Mullen, Sales Director of Anders said, “Milestone Systems is one of the world’s leading provider of open platform IP video management software (vMS). TinyGreenPC has shown that their FitPC range is an ideal complement to this software. video surveillance systems by their nature operate for extended periods, often 24x7, and need to be totally reliable. These characteristics play directly to the strengths of the FitPC, which can draw as little as 8W. FitPC offers a network video recording solution that is compact, robust and use very little energy.”

He continued, “Leading customers including Wavestore, Eyelynx and Genatec have already

benefitted from this combination of market leading surveillance software and our fanless PC technology.”

TinyGreenPC is bundling XProtect with its FitPC range. This exceptional range of solid state fanless PCs has units as small as 10 x 11.5 x 2cm drawing only 8W. These tiny units nevertheless offer big performance, plentiful processing power and exceptional reliability and flexibility. It is offered with Intel Atom or AMD Dual and Quad Core processors and up to 1 Terabyte of hard disk space, offering ample capacity to record security events. The PCs feature a five-year warranty.

Milestone Systems XProtect vMS is used by more than 100,000 customers worldwide. It is easy to use, yet powerful software that is designed with open architecture. The bundle is compatible with most popular IP cameras.

n For further information please visit www.tinygreenpc.com/security/

TinyGreenPC bundles XProtect to create tiny network video recorder

12 I November 2014 I IN SECURITy

Arteco, a market leading manufacturer of video Event Management Software (vEMS) solutions has developed an Automatic License Plate Recognition (ALPR) application that can be run on board Samsung Techwin’s Open Platform WiseNetIII cameras and domes.

The Arteco ALPR application has been developed for access control purposes and is designed to be deployed in airports, ports, car parks, distribution centres, industrial parks and critical infrastructure type environments where there is a need to keep tight control on the movement of vehicles. It is supported by Arteco-Logic NEXT vEMS and is able to read license plates at a rate of over one every two seconds with vehicles moving at speeds of up to 50Km/h.

A key feature of the ALPR application is its ability to store JPEG images remotely via FTP on a server with the JPEG filename containing the plate string, date and time of capture and with the help of a user friendly interface, it can be configured for event triggering, alerts and notifications whenever pre-defined plate numbers are read.

Samsung Techwin’s Open Platform WiseNetIII DSP chipset is at the heart of the company’s latest generation of 1.3, 2 and 3 megapixel high definition video surveillance cameras. It offers users the freedom to utilise the video management software (vMS) that best matches specific project requirements.

The processing power of the WiseNetIII DSP chipset also enables it to run multiple edge based Applications such as Arteco ALPR, as well as video analytics, facial recognition and people counting solutions, which can be downloaded in a similar way to adding Apps to a Smartphone.

“The availability of the Arteco ALPR application is a welcome addition to a fast growing list of applications that are being developed to run on board the WiseNetIII family of cameras,” said Peter Ainsworth, Head of Product and Marketing at Samsung Techwin Europe Limited. “Tests throughout Europe have shown that the application will work highly effectively with any of the WiseNetIII models but where 24/7 monitoring is required, the IR LEDs built into a number of the cameras and domes, will ensure a high level of performance, regardless of the lighting conditions.”

“We are excited about the opportunity of working with a prestigious name like Samsung on the world market,” said Enrico viarani, Chief Technology Officer at Arteco. “The quality and high performance of the Samsung Techwin WiseNetIII processor fits in perfectly with the architecture of the ALPR application and we have high hopes for its success globally.

n For further information please visit www.arteco-global.com

PRO

DU

CT A

ND

IND

UST

Ry

NEW

S

Arteco License Plate Recognition application for Samsung Techwin WiseNetIII cameras

Enabling Freedom for the Internet of Things.

+1 617 949 8900

+44 1895 454 699

[email protected]

www.wyless.com

Your wireless data solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global wireless data management

platform and private managed network, we also built our business upon the most

important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted provider to our partners and the trusted solution for

Fortune 500 companies and startups alike. We’re the easiest company to work with.

We listen to our customers and take pride in every connection. Wyless offers truly

uncompromising LTE, 3G, and 2G data solutions, delivering worldwide wireless

connectivity over the most secure and resilient private managed network infrastructure

delivered in partnership with 19 Tier 1 MNOs in over 120 countries We provide unrivaled

management tools and empower you with end-to-end managed services, technical

expertise and dedicated support. So connect with the experts and together we’ll take

your applications to the next level. You have found your true IOE ( Internet of Everything )

and broadband data partner.

14 I November 2014 I IN SECURITy

pro

du

ct a

nd

ind

ust

ry n

eWs

An innovative crime fighting partnership that has reduced live cable thefts on a critical section of the UK’s rail network by 54.7% has been acknowledged at a prestigious rail industry awards ceremony.

The collaboration between SmartWater Technology, Network Rail and British Transport Police achieved a “Highly Commended” acknowledgement within the Innovation category at this year’s National Rail Awards in recognition of the partnership’s achievements in suppressing cable thefts.

With cable theft costing Network Rail £16m a year and delay minutes on the rise (22,433 in one hotspot), Network Rail adopted SmartWater’s trademarked crime fighting strategy on the London to North West (LNW) mainline. SmartWater collaborated closely with British Transport Police and Network Rail to bring traceability to cable infrastructure and greater accountability to would-be thieves. Analysis of Network Rail’s crime data was also carried out by SmartWater analysts, who identified potential risks, crime hotspots and trends. This allowed for the rapid deployment of SmartWater traceable liquid products and covert cameras to vulnerable locations in order to protect ‘at-risk’ cable.

The introduction of the SmartWater Strategy™ created a powerful crime deterrent on the LNW line and over a three year period live cable thefts fell by 54.7%, increasing to 63.4% following the introduction of the Scrap Metal Dealers Act 2013. During the same period delayed minutes to train services on the LNW line were cut by 54.9%, providing a better service to commuters and increasing their confidence in the rail network.

The success of the project relied on a trusted working relationship between SmartWater, Network Rail and British Transport Police. Representatives from all three parties were present at the National Rail Awards ceremony to collect their ‘Highly Commended’ acknowledgement.

Phil Cleary, Chief Executive of SmartWater comments: “We are delighted that the hard work made by all parties involved has been recognised with this accolade. The level of engagement and co-operation between our team, Network Rail and British Transport Police has had a dramatic impact, both from a safety perspective and on the return on investment to Network Rail. We hope this partnership will set a benchmark for fighting crime across the UK’s railways as well as illustrate the wider benefits of a private-public sector collaboration.”

How it workedTo provide added traceability to Network Rail cable, SmartWater traceable liquids were applied to trackside cable within hotspots identified by SmartWater crime analysts. Every SmartWater traceable liquid carries a chemical code that is uniquely registered to an address or location. Once applied the liquid is almost impossible to remove and can only be seen under Uv light. Every kilometre of Network Rail’s cable received a different SmartWater forensic code so that stolen cable could be traced back to the nearest kilometre.

To create a deterrent Network Rail, SmartWater and British Transport Police collaborated on innovative tactics to influence criminal behaviour. This included targeted covert operations against persistent thieves, cutting off the means for thieves to sell on stolen goods by targeting scrap metal dealers, and equipping police stations with the SmartWater detection equipment. In addition to suppressing incidents of cable theft, this approach also resulted in multiple criminal convictions.

n For further information please visit www.tinygreenpc.com/security/

Smartwater ”highly commended” for helping suppress railway cable theft

IN SECURITy I November 2014 I 15

Axis’ announces stainless steel anti-grip corner network camera ideal for video surveillance in correction facilities and psychiatric wards. AXIS Q8414-LvS Network Camera features vandal-resistant stainless steel anti-grip casing and built-in invisible IR LED for high quality indoor video surveillance even in complete darkness.

Axis Communications, the market leader in network video, announces its first corner-mount fixed network camera. The new AXIS Q8414-LvS features a stainless steel anti-grip casing and is extremely impact resistant, supporting the IK10+ 50joules rating as well as the IP66/NEMA 4X rating for water resistance. The 24/7 indoor surveillance camera provides superb image quality both during day and night with capabilities like Lightfinder technology, which enables life-like colors in low-light conditions, and built-in invisible IR LED illuminator for video surveillance in complete darkness.

“In correctional facilities as well as in psychiatric wards, there is an increasing need to prevent self-harm and avoid internal conflicts among the residents,” says Erik Frännlid, Axis’ Director of Product Management. “We have developed AXIS Q8414-LvS keeping in mind that a surveillance camera should lack ligature points and present an anti-grip design. On top of these features, it should also offer superb video quality during day and night and be extremely vandal resistant.”

The new AXIS Q8414-LvS is ideal for video surveillance of small rooms in premises like correctional facilities, interview rooms, psychiatric wards, and medical observation rooms as well as elevators and stairwells. Thanks to a built-in microphone and the possibility to integrate the network camera into an alarm system via its I/O port, AXIS Q8414-LvS becomes part of the overall surveillance solution, an important tool to protect

and secure the safety of the people in high security environments. In addition, privacy masks assure that restricted areas are not monitored for privacy reasons or to protect the personnel.

Available in two color versions, powder coated white (AXIS Q8414-LvS White) and brushed stainless steel (AXIS Q8414-LvS Metal), the corner-mount network camera offers 1 Megapixel or HDTv 720p video stream. It features P-Iris control for an optimal depth of field, resolution, image contrast and clarity. The horizontal angle of view up to 105° covers the entire room without blind spots. Capabilities such as remote zoom and focus facilitate the optimisation of the captured view during the installation.

AXIS Q8414-LvS features a unique design that has been developed to be perceived softer and less provocative than that of other security installations in correctional facilities and psychiatric wards. Working closely with prison and health authorities in several countries as well as system integrators and installers, Axis designed AXIS Q8414-LvS to feature as few cavities and holes as possible so prisoners and patients cannot stuff anything inside them and the camera is easy to clean.

AXIS Q8414-LvS Network Camera is supported by the industry’s largest base of video management software through the Axis Application Development Partner Program, and AXIS Camera Station. The cameras include support for AXIS Camera Companion, AXIS Camera Application Platform, AXIS video Hosting System and ONvIF for easy camera system integration and for application developers to provide the camera with intelligent capabilities.

n For further information please visit www.axis.com

Axis launches new anti-grip corner network camera

WHERE INNOVATION MATTERSThe Next-Generation Scalable Infotainment Platform

THE PROBLEM:As modern cars become

more and more connected, car hacking is becoming a

serious threat.

THE SOLUTION:HARMAN’s new platform

offers unparalleled multi-layer security

through features such as hypervisor-based domain separation and its hybrid

architecture.

© 2014 HARMAN International Industries, Incorporated. All rights reserved. Features, specifications and appearance are subject to change without notice. All other company and product names used herein may be trademarks of their respective owners.

WWW.HARMAN.COM

DYNAMIC AND CUSTOMIZABLE WHILE ENHANCING SAFETY AND SECURITY. Meeting the steadily growing expectations of customers in a seamlessly connected world is one of the greatest tasks for the automotive industry. HARMAN’s Next-Generation Scalable Infotainment Platform offers a new, modular, multi-core architecture and a fully open-standard software basis to ultimately fulfill the demands of digital natives.

IN SECURITy I November 2014 I 17

Pelco by Schneider Electric have announced that they are strengthening their relationship with Avaya to deliver superior performance and simplicity to IP video security and surveillance customers. This global alliance partnership will enable deeper collaboration on technology development and interoperability, providing customers with an easy-to-install, easy-to-scale network platform optimised for demanding video surveillance systems.

“Supporting thousands of cameras and high levels of redundancy, Pelco IP video systems are designed for 24/7 mission critical operation”, said Stuart Rawling, Pelco Director of Partnering & Integration. “The performance of the network is a critical part of any IP video system. Aligning with Avaya for network infrastructure makes it easier for us to provide the video quality and system performance that our customers demand.”

“Users and installers often struggle to realise the full potential of IP video surveillance technology due to limitations of the underlying network. Our approach with Avaya Fabric Connect is to provision only the ports attached to the cameras and the monitoring stations and receivers, without having to provision any of the core switches in between,” said Marc Randall, Senior vP and GM Avaya Networking. “This allows video surveillance networks to be deployed faster and easier than ever before, with the ability to add, move and change cameras on the fly.”

“Avaya and Pelco have been working together for several years and already have many joint customers and a number of large deployments with thousands of cameras,” added Herve Fages, Senior vice President, Pelco video Line of Business. “The formalising of the relationship will allow us to take what is working very well in several regions and deploy it to current and future customers around the world.”

“Avaya Fabric Connect technology is a perfect complement to the scalability of Pelco video

management systems. Customers who deploy the systems together find that installation and configuration is uncomplicated. The simple installation reduces time and implementation costs to deliver high-quality performance with consistent around-the-clock availability,” added Fages. By combining resources and jointly promoting these solutions Pelco and Avaya are able to leverage the experience, capabilities and strength of both companies to bring best-in-class end-to-end open solutions to our joint customers.

n For further information please visit www.pelco.com

Schneider Electric and Avaya Team UpPelco by Schneider Electric and Avaya Team Up to Deliver High-Performance IP Video Surveillance Solutions

“Supporting thousands of cameras and high levels of redundancy, Pelco IP video systems are designed for 24/7 mission critical operation”

18 I November 2014 I IN SECURITy

Wavesight attends Dubai video Surveillance SummitWavesight, the market-leading UK provider of professional outdoor wireless CCTv solutions, will be participating in a video Surveillance Summit organised by Finnish technology company, Teleste. The event, which includes keynote addresses delivered by H.E Sheikh Khalid Bin Ahmed Al-Hamed and the Finnish Ambassador IIkka-Pekka Simila, takes place in Dubai, UAE on 7th December 2014. The purpose of the event is to enable delegates to learn more about the latest technologies and innovations to solve today’s challenges in building a safe city environment.

The Dubai video Surveillance Summit has been organised to gather together leading experts in video content analytics, IP cameras, Physical Security Information Management systems (PSIM) and security system integration. It will enable security professionals to find out more about the latest and most innovative technologies for solving today’s challenges in creating a secure urban environment.

Teleste will be spending time demonstrating how the best security solution-providers are now working

together to build reliable, cutting-edge security systems that solve customers’ problems in the real world. In addition to Teleste’s robust, scalable and interoperable video surveillance solutions, those attending the summit will hear about Wavesight’s powerful wireless transmission solutions designed for urban surveillance applications.

Other security companies involved in the event include Arecont vision (megapixel IP network cameras), ArrowLabs (ANPR and ticketing solutions), CNL (PSIM technology for complete integrated situation management) and Ipsotek (intelligent video analytics). Chosen because their flexible and pioneering video surveillance solutions complement each other, these companies will be showcasing their security products and services and demonstrating how they can work together to solve the real-world problems experienced by the companies and authorities responsible for protecting civilians within urban environments.

n For more information please visit www.wavesight.com

pro

du

ct a

nd

ind

ust

ry n

eWs

SAFE–O–TRONIC

Contact:E: [email protected]: 0845 0551972W: www.safeotronic.com

Lockers and Compartments

Gyms & Spas Medicine Cupboards

Filing Cabinets Office Furniture

Advanced electronic locking solutions

Excellent design

Copyright IQ Locking Solutions Ltd 2014

Put your finger on itTHe BIoMeTrIc cArD – NexT evoLuTIoN For ID cArDS

First there were bar code cards. They evolved to magnetic stripe cards which evolved into proximity

cards. As proximity became the predominant credential technology over the last decade, it’s evident that contactless smart cards will replace proximity and the other legacy credential technologies over the next three to five years. That’s because the multi-application flexibility of contactless smart cards lets an organization use them for logical/

information access control, time and attendance and other applications in addition to physical access control. Each application gets its own memory space on the card or tag and security keys prevent one application from accessing another. For those considering biometrics at some of their access points, the card can even hold the biometric template.

Nonetheless, there still remains a problem with the smart card. Who is presenting the smart card to the reader? The system doesn’t know. All it can understand is

that an authorized card has been presented to the reader. Thus, the door should open, respective of who is holding the card.

yet, a biometric template carried within the card could help solve that problem but at what expense? To do so, it needs a biometric reader, an additional piece of hardware, raising the infrastructure cost to do what the card should be doing in the first place, verifying who is trying to enter. Why not put biometrics directly on the smart card? There would be no additional hardware

20 I November 2014 I IN SECURITy

ID C

ARD

S

ID cards evolve from Bar code to Magnetic Stripe to Proximity to Smart card and, finally, to the Biometric card

Kim Humborstad, ceo of Zwipe

IN SECURITy I November 2014 I 21

to buy and the smart card wouldn’t work unless verified by the authorized person’s thumbprint on the card. With a biometric card, the organization would reap all of the security and access control advantages of the smart card plus biometrics.

How Did We Get from Then to Now?Let’s review the most commonly used types of card technologies used today.

Bar Codes. Some facilities still use bar code badges, the least secure of all credentials. They are what they sound like. A bar code reader scans the bar code to allow access. However, since the bar code is visible, it can be reproduced very easily. There is a solution, though. By covering the bar code with an opaque film, the badge is only read by a Uv bar code reader. Of course, this raises the cost.

Magnetic Stripe. No different than

the common, ordinary credit card, information on a magnetic stripe card is held on a strip of coated magnetic recording tape. Since the stripe must come in contact with the reader, there is ultimate wear-and-tear on the card. There’s a reason that they’re the de facto credential for credit companies. They’re less costly and easier to produce than other badges. Of course, this also means that they are easy to forge, making their security questionable. Nonetheless, they are successfully used by thousands of companies who require only simple access.

Proximity Badges and Tokens. This is today’s most widely used access control technology for two main reasons. First of all, there is no contact between cards and the reader. This eliminates the wear-and-tear factor. Secondly, proximity readers can be made very durable or even hidden into another structure to make them relatively vandal-resistant. Badges

contain an antenna with microchip. As the badge enters a “wake-up” field, the electronics inside the badge power up and send the encoded information to the reader.

There are three types of proximity badges. The read only, true to its name, can only be read. The number cannot be changed. Read/write badges can have their numbers re-programmed. And, multi-technology badges are proximity badges that also employ another technology. For instance, leading vendors provide such badges in combinations such as proximity/magnetic stripe. These are typically employed where a company has an older legacy access control credential technology and wants to migrate without eliminating access to buildings. This is especially important for companies with multiple facilities. In other cases, the company cafeteria or some other application may only take magnetic stripe or the other technology credentials.

“By covering the bar code with an opaque film, the badge is only read by a Uv bar code reader”

g

22 I November 2014 I IN SECURITy

Contact Smart Cards. These cards contain a microchip that holds and processes large amounts of information. Metal pads on the card make contact with the reader to power up the circuitry and communication with the microprocessor. As a contact technology, though, they suffer the effects of wear-and-tear.

Contactless Smart Cards. This technology is ideal for physical access control and other applications. It is more secure than the proximity card and provides greatly increased flexibilities. With their lower reader costs, reduced costs of system ownership and increased applications opportunities, every security professional needs to more closely appraise contactless smart cards as they review their present systems.

The Newest Evolution – The Biometric CardA contactless smart card credential with on-card fingerprint reading provides all the assets of the smart card and eliminates its most glaring deficiency, knowing who

is holding it. The biometric card quickly reads the user’s fingerprint in less than a second. Eliminating the problems of solely deploying PINs and standard cards, the wirelessly powered biometric card lets users authenticate themselves directly on the card through something they are, a fingerprint or thumbprint. Only then will the card system activate the lock. This is much more secure than simply using a standard card, which verifies only something the user carries.

An on-card fingerprint scanner with 3D capacitive technology resides on the contactless smart card which has universal compatibility with all ISO 14443 readers from the leading brands. The biometric card is DESFIRE Ev1 and MIFARE Classic compatible. Without having to change out an organization’s existing card readers, the biometric card provides an easy, low cost way for organizations to provide a biometric upgrade to access control systems using smart card readers or multi-technology readers that also read smart cards.

Thus, the biometric card is

more secure to use than other available ID and authentication solutions on the market today. The fingerprint data is captured by the on-card fingerprint scanner and is thereafter encrypted and stored only inside the card. No exchange of data is conducted with external systems. This provides secure template management since the fingerprint never leaves the card. It also eliminates user concerns with privacy issues. The card is unique to the user and only the authorized card holder can activate card communication with the reader. When a positive match occurs, the biometric card activates encrypted communication with the lock or reader in the same way as other ISO 14443 contactless smart cards.

Problem SolvedNo longer do organizations need to worry if someone not authorized to enter is using another person’s ID card. With the biometric directly on the card, they can be assured that the only people getting in are those authorized to do so. n

Secure SHoPPING IN THe LArGeST MALL IN NorTH-WeSTerN FrANce

Safe shopping

BU

ILD

ING

SEC

UR

ITy

When a new building is being constructed, it is rather easy to equip it with the latest and greatest safety

and security systems. Today, these will mostly be IP based, offering the possibility to make double use of the network infrastructure and also to integrate solutions such as access control, intrusion detection and video surveillance into a unified management system.

But buildings mature and change. What seemed perfectly suitable at time of construction may no longer meet the safety and security requirements a couple of years later, and this is why it is so important to plan with open, standards based and scalable solutions right from the beginning. The problem, how-ever, is that such systems were not available

when most of today’s buildings have been built; making it difficult to update existing safety and security systems to today’s standards. Sometimes it may even be necessary to replace older equipment in its entity to allow for a new Greenfield development of the security infrastructure.

Such was the situation at the Atlantis shopping mall in Saint-Herblain near Nantes. Originally built in the end of the 1980s, the mall has undergone a major reconstruction and enlargement between 2010 and 2012. The mall management decided to take this opportunity to also upgrade their security systems. Rather than the existing stand-alone systems for video surveillance, access control and intrusion detection they wanted to install an integrated security

solution based on the IP protocol and centrally managed via a single console and user interface. To ensure smooth integration and reliable interoperability, the entire technology should come from a single vendor and be installed by experienced local partners with extensive knowledge of the chosen products.

Today, Atlantis is the largest shopping mall in Northwestern France and houses more than 170 stores and restaurants, including IKEA, Swarovski, Benetton, an Apple Store and a 12,000 square meter E.Leclerc super store, the largest in France. Total size of the Atlantis mall after the expansion is now 43,000 square meters. The two story complex also comprises two cinemas and a three level parking garage as well as an underground parking area.

24 I November 2014 I IN SECURITy

IN SECURITy I November 2014 I 25

In order to design a customized and integrated security solution for the Atlantis mall, Bosch teamed with ISO Security, a long time expert in video surveillance, intrusion detection and access control, and AMR Services, who are active in the same fields and specialize in integration projects. Both have been long-time partners of Bosch, thus guaranteeing the required expertise. Also, ISO Security had already been supplying video solutions to the Atlantis mall since 2008, including PTZ dome and fixed dome cameras, managed by the Bosch video Management System (BvMS). The scope of the new project was to replace existing intrusion detection and access control solutions with IP-based technology, extend video surveillance through installation of 125 new HD cameras and at the same time integrate all technologies into one consistent security solution. It should also lay the foundation for an integrated building management system, comprising security systems as well as Public Address, heating and air conditioning and control of electricity and water.

Integrated team, integrated solutionDuring the bidding process, an integrated team of all three companies designed an integrated security system that finally convinced the mall management. But the decision was not only based on the design and the capabilities of the solution itself. It was also heavily influenced by the fact that, with AMR and ISO, the Atlantis mall could rely on very comprehensive expertise on the installer level.

The new security solution of the Atlantis mall is comprised of 80 access control readers, more than 125 HD cameras and a Modular Alarm Platform 5000 intrusion alarm system with about 1,300 detection points. All components are integrated and centrally managed via Bosch’s Building Integration System (BIS). This is a modular security and safety management system which can be highly customized to suit any user’s specific needs. Individual modules integrate subsystems such as video surveillance, intrusion alarm,

access control, and fire alarm, allowing customers to reduce costs by licensing only what they really need while offering an easy upgrade path, should requirements change in the future. So while the BIS at Atlantis mall is configured to integrate and manage access control, intrusion detection and video surveillance today, it will also allow to integrate other building technologies in the future.

Solution componentsThe Modular Alarm Platform 5000 system is a scalable solution for medium-to-large applications. It can connect up to 8 LSN modules with up to 127 sensors or inputs/outputs each for maximum security and flexibility. All programming of the sensors and modules connected to the LSN loop is stored in the panel, avoiding the need to reprogram in case a sensor or module needs to be replaced. The data bus can also be used to connect up to 32 keypads with a maximum of 1,000 users, resulting in an unmatched grade of scalability.

“All components are integrated and centrally managed via Bosch’s Building Integration System (BIS)”

g

The Bosch video Management System (BvMS) is a unique enterprise IP video security solution that provides seamless management of digital video, audio and data across any IP network. It is optimized to work with Bosch video surveillance products as part of a total video security management system, but does also support a wide range of third party cameras that conform to the ONvIF standard. In the Atlantis mall, BvMS manages cameras throughout the entire mall including public areas as well as

individual stores and parking areas.Access control is implemented

by means of AMC2 modular controllers and AMC readers. Each controller can control a group of one to eight access points. The AMC2 stores all necessary information in a battery-buffered memory and a compact flash storage element so that, even when the unit is offline, it is able to carry out independent authorization checks on access points, take access decisions, control closing/opening

elements and register movement events. At Atlantis, AMC controllers and readers protect all restricted areas of the mall from unauthorized access.

All the individual solutions support communications via the IP protocol, making it easy to integrate them using the Building Integration System. BIS allows one single operator to manage and configure all the different security systems of the Atlantis mall from one central console with a unified and intuitive user inter-face.

26 I November 2014 I IN SECURITy

ConclusionCombining Bosch’s extensive and innovative product range with the comprehensive solution and integration expertise of ISO Security and AMR Services allowed the three partners to design and implement an integrated security so-lution which meets the strict requirements of the Atlantis mall today, while of-fering an easy upgrade path to further extensions.

n For further information please visit www.boschsecurity.com

“BIS allows one single operator to manage and configure all the different security systems of the Atlantis mall from one central console with a unified and intuitive user inter-face”

Club Car is now street legal in every country in the EU.

Club Car’s electric utility vehicles offer an attractive alternative to traditional petrol-powered vehicles. For a start there’s no petrol costs – and zero emissions.

Club Car’s vehicles have the power to perform numerous campus tasks, from mail delivery to security and maintenance.

Want to know more? Contact your Club Car representative today.

www.clubcar.com

[email protected]

(+44) 777 180 5463

Club Car takes to the streets

street legal

28 I November 2014 I IN SECURITy

The international airport at Naples, Napoli capodichino Airport, is used by 6 million travellers every year. With

the introduction of the Panomera® multifocal sensor system from Dallmeier, security in both the apron and

the airport forecourt areas is enhanced further still by the very latest in camera technology.

Clear skiesPANoMerA® FroM DALLMeIer

eNSureS eNHANceD SecurITy AT NAPLeS AIrPorT

AIR

POR

T SE

CU

RIT

y

Napoli Capodichino offers direct connections to 50 domestic and international destinations. It is

managed by GESAC SPA, a member of the F2I Airports Group, an airport management company known for the excellent quality of its services and for its culture of continuous improvement. GESAC works constantly to find efficient solutions and satisfy the requirements of its passengers and field operators, particularly with regard to personal safety and environmental protection.

Innovative multifocal sensor technologyGESAC‘s security engineers saw the Panomera® multifocal sensor system from Dallmeier for the first time at the “Sicurezza” trade fair in Milan in 2010, and were very impressed by the performance capabilities of this ground-breaking video technology. Unlike conventional cameras, which have a single focal lens, multifocal sensor technology is based on a multi-sensor platform with several lenses, each with different focal lengths, creating the unrivalled

Panomera® effect. This innovative system provides surveillance of large areas with extremely high resolution, all from a single installation site.

The contact at the trade fair was followed by an intensive planning and design phase, during which the staff at Dallmeier Italy worked closely with the “Infrastructure Development & Flight Operations” department of GESAC, under the direction of Alessandro Fidato. Representatives of Dallmeier Italy visited the site several times so that they could adapt the

IN SECURITy I November 2014 I 29

new video system precisely to the requirements of the airport management company.

Safety for apron, runways and forecourtFor GESAC, two major zones of the airport site were of paramount importance: the area in front of the airport buildings (“Panomera® Forecourt” project), and the apron and runways(“Panomera® Airfield” project).

In the airport forecourt and concourse, Panomera® monitors traffic and pedestrian flows between the multi-storey car park, Terminal 1 and the network of feeder roads and paths by which people arrive at

and leave the airport, either in motor vehicles or on foot.

The customer also wanted to obtain complete coverage of the movements of all vehicles and aircraft anywhere on the entire airfield, including the ramps and aprons, taxiways, and takeoff and landing runways, so that incidents could be reconstructed if necessary, wherever they occurred on the site.

The cameras of the Panomera® system for this airfield project were installed at a considerable height, close to the roof of the APRON tower at about 13 metres; three Panomera® systems installed in a semicircle provide a panoramic view through 228°. The Panomera®

viewer workstation was located inside the APRON Tower to provide security staff with a unique and full panoramic view of the entire airfield.

“With Panomera® technology, distant objects can be captured with the same quality as those in the foreground. The extremely high resolution over the entire area of interest and intuitive operation of the system led us to choose Dallmeier”, says Giuseppe Musto, Head of Innovation & Automation Development for GESAC.

Another important difference between Panomera® and conventional PTZ cameras is that the whole area to be monitored with Panomera®, is recorded

“With Panomera® technology, distant objects can be captured with the same quality as those in the foreground”

g

30 I November 2014 I IN SECURITy

continuously, so the high resolution images enable important, single details to be examined even after the event. With PTZ cameras, the general overview image is lost while the camera is recording a detailed area.

Reliable recordingRecording is based on the Dallmeier DIS-2/M NSU blade technology – this ensures maximum availability and reliability of the recording. Each blade unit is equipped with a redundant hard disk. The units are powered via a rack for 19” slide-in modules with redundant power supply units. The rack system can accommodate up to 10 single modules, so that even relatively large systems can be installed in compact and cost-efficient manner. The modular structure of the system guarantees high availability of the overall solution.

Complete success Alessandro Fidato, Director of the Infrastructure Development & Flight Operations department, describes the video system as a resounding success: “With these two projects, GESAC confirms its orientation towards innovative solutions

that ensure high standards of security and simplify management arrangements. We are very satisfied with this cooperation.”

Pierpaolo Piracci of Dallmeier Italy responds: “I am very proud to have been personally involved in these highly innovative projects, and I would like to thank Alessandro Fidato and Giuseppe Musto of GESAC SPA for the confidence they have shown in our technology and professionalism.”

Dallmeier has at its disposal more than 30 years of experience in transmission, recording as well as picture processing technology and is an outstanding pioneer of CCTv/IP solutions worldwide. This profound knowledge is used in the development of intelligent software and high quality recorder and camera technologies enabling Dallmeier to not only offer stand-alone systems, but complete network solutions up to large-scale projects with perfectly integrated components. Right from the beginning the company always focused on own innovative developments and highest quality and reliability.

Dallmeier is the only manufacturer in Germany that

develops and manufactures all components on its own. This includes the entire product range, from cameras to picture storage and transmission to intelligent video analysis and even individually adjusted management systems. Quality made by Dallmeier, made in Germany!

Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DvR for example, which introduced digital recording to the entire CCTv industry, came from Dallmeier. The multifocal sensor system Panomera® will have a similarly groundbreaking effect: This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry. This and the extensive experience in the CCTv and IP field have led to a top position in the international market for digital video surveillance systems.

n For further information please visit www.dallmeier.com or www.panomera.com

“I am very proud to have been personally involved in these highly innovative projects”

www.securityshows.comFor more information please contact:Ilya Sobolev (Head of Sales–Security Events)T +44 (0)20 7596 5170 E [email protected]

SIPS South Russia 20146-я Международная выставка «Охрана, безопасностьи противопожарная защита»2–4 cентября 2014 • Краснодар, Россия

SIPS Siberia 201423-я Сибирская международная выставка«Охрана и пожарная безопасность»24–26 cентября 2014 • Новосибирск, Россия

CIPS Caspian 20147-я Каспийская международная выставка«Охрана, безопасность и средства спасения»22–25 октября 2014 • Баку, Азербайджан

SFITEX 2014 23-я Международная выставка и форум«Охрана и безопасность – SFITEX»11–14 ноября 2014 • Санкт-Петербург, Россия

IS.CS 20145-я Международная специализированная выставка«Информация: техника и технология защиты»11–14 ноября 2014 • Санкт-Петербург, Россия

AIPS Almaty 20155-я Казахстанская международная выставка«Охрана, безопасность, средства спасенияи противопожарная защита»11–13 марта 2015 • Алматы, Казахстан

MIPS Moscow 201521-я Московская международная выставка«Охрана, безопасность и противопожарная защита»13–16 апреля 2015 • Москва, Россия

CAIPS 20158-я Центрально-азиатская международная выставка«Охрана, безопасность и противопожарная защита»21–23 Октябрь 2015 • Ташкент, Узбекистан

SIPS South Russia 20146th South Russian International

Protection and Security Exhibition2–4 September 2014 • Krasnodar, Russia

SIPS Siberia 201423rd Siberian International

Fire Fighting, Emergency and Rescue Exhibition24–26 September 2014 • Novosibirsk, Russia

CIPS Caspian 20147th Caspian International

Protection, Security and Rescue Exhibition22–25 October 2014 • Baku, Azerbaijan

SFITEX 201423rd Saint Peter sburg International

Security and Fire Exhibition11–14 November 2014 • St. Petersburg, Russia

IS.CS 20145th International Specialised Exhibition –

Information Security. Counter Surveillance11–14 November 2014 • St. Petersburg, Russia

AIPS Almaty 20155thAlmaty International

Protection, Security, Rescue and Fire Safety Exhibition

11–13 March 2015 • Almaty, Kazakhstan

MIPS Moscow 201521st Moscow International

Protection and Security Exhibition13–16 April 2015 • Moscow, Russia

CAIPS 20158th Central Asian International

Protection, Security and Fire Safety Exhibition21–23 October 2015 • Tashkent, Uzbekistan

security_calendar_2014_South Russia A4_Layout 1 14/05/2014 12:06 Page 1

SIMoN SMITH, oNe oF IPSA’S MArITIMe SecurITy exPerTS, exPLAINS FurTHer…

Any port in the storm

32 I November 2014 I IN SECURITy

POR

T SE

CU

RIT

y

In recent years one area of focus for the International Professional Security Association (IPSA) has been the need for a better understanding

of the specific issues for dock and port security and the related training requirements.

There has been a lot of concentration in recent years on the Maritime Security Front; however maritime security is not only about tackling piracy, but also matters far closer to home at our Ports and Docks. It is a fact that 90% of the goods that are moving into and out of the United Kingdom come through Ports and there has been criticism of the weakening of security in Ports in the United Kingdom.

Those who heard the Radio 4 programme “File on 4” recently,

may have come to the conclusion that Port Security is all about the Border Force and its effectiveness or (allegedly) otherwise. The security of Ports has never been thus narrowly confined. Neither is the security of Docks necessarily wholly taken up with the Border Force and the provision of decent Dockyard Security Forces, people who have been trained both in general security duties and specifically in relation to the Dock environment, can alleviate an awful lot of problems. These will not only be the problems that the Border Force is criticised for, but also the problems that arise in any area of transport where there is the propensity for items to be stolen. Indeed, there is a strong argument that, with Government

resources being finite and with the constant financial pressure on Government, Port Operators and Dock Companies and, especially their Contract Security Staff, have got an increasing responsibility for what is, basically, critical national infrastructure. The European Union proposals in relation to Dock and Port Security aim to fill that gap and the Council of European Security Services providers have argued that Maritime Security Training and General Security Training should not be mutually exclusive.

Fortunately, here in the United Kingdom, certainly IPSA, provides additional training, advice and expertise to those Member Companies who are providing Port Security Services. This enables Security Staff to be aware of the

IN SECURITy I November 2014 I 33

functions and responsibilities that they have, not only to secure the goods and environment of the Port, but also to co-operate with relevant Authorities in ensuring that this critical national infrastructure stays safe and secure.

Any Company that is going to become involved in the security of Ports and Docks has got to understand the importance of Customs’ procedures, understand the importance of the Border Forces functions in relation to illegal migrants and be fully aware of other areas of concern. The greatest of these, at the moment, is obviously terrorism and the threat of extremist violence. With the detection of 48 illegal immigrants in the last few months at British Ports or coming from British Ports, (49 if you count the gentleman who was, unfortunately, dead on arrival), it is quite clear that even containerisation allows for penetration of security. It was widely thought, in the 1960s and early 1970s, that containerisation would mean the end of serious problems

in Dock areas and would lead to an end to, for instance, the wide spread cargo thefts which became a hallmark, sadly, of some Docks in the United Kingdom and elsewhere. However, containerisation has brought with it its own problems. It is a physical fact that, certainly in the United Kingdom, not every container can be examined on entry. The very detection of illegal migrants shows that some containers can get quite a long way into the United Kingdom and if we substitute for the illegal migrants 3 or 4 properly trained terrorists, able to subsist on minimal food and water, fit, younger people, armed and well equipped, it is very easy to see the danger. These would not be people who would be easily detectible, they would know how to minimise their presence and, bearing in mind the high volume of inbound traffic, could probably get to somewhere in land and break out of the container at their convenience. So there is a real threat of terrorism, anybody who can get 10,000 cigarettes into the United Kingdom can equally well

get the component parts of a “dirty bomb” with sufficient capacity to do a square mile’s worth of damage to Central London. The Port and Dock is therefore always a part of critical national infrastructure, and its guarding is important.

The European Union has taken this on board in connection with the tightening up of regulations. In some ways they are falling into line with a situation that already persists in the United Kingdom, where the Companies and Shippers who are involved in illegal immigration, however inadvertently, are liable to a fine. Whilst it may seem, on the face of it, manifestly unjust that a Company that knows nothing about the illegal entry should be fined for it, in practical terms this fine is really reflective of the fact that the Government requires the Company to do more for its security. In fact, this is based on an ancient legal principle in the United Kingdom that the conveyance used for smuggling, in years past, was forfeit to the Crown. Its extension Europe wide and its development to include

“The Port and Dock is therefore always a part of critical national infrastructure, and its guarding is important”

g

34 I November 2014 I IN SECURITy

Port Operators, will mean that there will be a financial penalty on those Port and Dock Operators who choose not to take the greatest possible precautions in the prevention of illegal entry of people and goods through their facilities.

It is important that those who are guarding docks, the people at ground level in Dock Security Companies, know what they are doing, know what they are looking for, and know what they are seeing when they see it. Sometimes the simplest techniques are those which are most effective. The sight of fluid flowing out of the underside of a container, for instance, can indicate the presence of human beings within that container. An alert Security Officer will look at any fluid in the vicinity of a container to determine what it is. Leaving all else aside, a Security Officer does not know the contents of a container and there could be a genuine incident occurring as a result of a breakage within the container and, subject to the container’s markings, that could be a chemical or biological hazard.

All in all, therefore, we really do suggest that Security Staff in the Ports and Docks have got a vital job, a job that is involved in the National interest, and that those wishing to choose Port or Dock Security

Providers should be asking all the salient questions about the level of training of the people who are actually on the Dock, the level of training of the middle management (which should include a PFSO Course) and an overall view of the areas that a Port or Dock Security Officer becomes involved in, which are not areas that his counterparts in other parts of the Security Industry deal with. At the very least, Security Providers should show that staff have undergone additional Health and Safety training, over and above that for general security services, that they know the hazards of Docks and they know what can arise. For instance, in the Maritime Sector, we have all seen people sitting adjacent to large vessels, on the bollard to which mooring ropes of those vessels, lines and springs, are attached. On some occasions we have seen people sitting with their feet idly on the ropes watching the ropes slowly creaking back and forward. An Alert Security Officer will move such people away from lines and springs, and will do so by explaining the inherent danger of a rope under tension and the unfortunate consequences of being too near to one if it snaps. In these minor ways, a Security Unit that knows what it is doing, collectively, enhances the Health and Safety

of the Port generally. In a culture where, frankly, Authorities always feel that there is no such thing as an accident, that there is always someone to blame, and in a culture where there is Civil and Criminal litigation, including for Corporate Manslaughter, commercial enterprises throughout industry are defending themselves on the basis that they have done all that is reasonable. Port Operators should therefore ask their Security Suppliers very searching questions regarding Health and Safety. There is an argument that Health and Safety is, at least, as important as security and could be (such as in the case of fire) as big a danger to a Port or a Dock area as any security breach.

Port and Dock Operators should really be asking their Security Suppliers about this and other additional areas of training when giving Contracts or renewing Contracts. Security Suppliers must, and once the European Directive is adopted will have to, show that they are not just the providers of all security, but that they are attuned to the environment of Ports and Docks.

n If you wish to find out more about maritime security and training, please contact IPSA Maritime at www.ipsa.org.uk

21-22 APRIL 2015 | OLYMPIA LONDON

INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD

WWW.COUNTERTERROREXPO.COM/INSECURITY

Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: [email protected]: +44 (0) 20 7384 7837 E: [email protected]

Book your

stand to

day!

Organised byFollow us onCo-located with

The leading international event dedicated to mitigating the threat of terrorism• Meet 8,500+ attendees from Europe and globally• Showcase your products and services to visitors with real purchasing power• Meet new customers and further establish relationships with existing ones• Launch new products and services on a global platform

82234-4_CTX03A_InSecurity Advert_210x297_2015_v1.indd 1 22/10/2014 11:38

36 I November 2014 I IN SECURITy

THIS ArTIcLe WAS FIrST DeLIvereD IN LecTure ForM AT THe SMArT BuILDINGS THeATre WITHIN THe IFSec AcADeMy DurING IFSec 2014

big data convergence

INTE

LLIG

ENT’

SEC

UR

ITy

Discriminating use of big data is allowing building owners and tenants to make meaningful

connections between atypical and potentially threatening situations however disparate the alert types might be. I’ll be discussing how physical and IT security strategies in intelligent buildings are converging. We’ll touch on Douglas Adams, Stephen Hawking and even the ‘butterfly effect’ in chaos theory along the way.

Few people in the physical or IT security sectors will dispute that ‘Big Data’ data is likely to make our working lives safer and protect our

infrastructure but only if artificial intelligence is harnessed to filter and evaluate the information, finding structure and patterns that can either guide us towards best practice in building administration or expose potential and actual threats.

Facility managers who have spent much of their lives dealing with security systems that have seldom been more than separate, unconnected entities such as CCTv, access control, intruder detection and visitor management, are now enjoying the benefits of interconnectivity as the IP revolution assigns IP addresses to just about every device. Managers are

beginning to inhabit a connected building zone of components and sensors, and if they are of a certain age they might liken their new situation to that of Dirk Gently, the ‘holistic detective’ created by Douglas Adams, who exploits ‘the fundamental interconnectedness of all things’ in order to arrive at stunning solutions of ‘whole crimes’ and uncover ‘whole criminals’. The new interconnectivity of formerly disparate security equipment is a close parallel to Adams’s crime novels.

But how does a facility manager progress from the Dirk Gently situation (it can just as easily be described as ‘the Internet of

Martin Grigg of the PTS consulting Group illustrates how security systems in truly ‘intelligent’ buildings

are empowering facility managers as data gathering evolves beyond mere aggregation of information.

Everything’ – a phrase first coined by Cisco but now in common parlance) where the building is merely converged to a truly intelligent building? Convergence is easy; if an office meeting room is booked for a certain slot, the air-conditioning can be put on for that period. But we are no longer, say, making a hard-wired connection between requests to use a room and air-conditioning; the communication is between devices which are all identifiable on a network. Facility booking can be linked with visitor management systems, and the facilities can be as diverse as video/audio conferencing, broadcast equipment, digital signage and collaboration tools. The PTS Consulting Group is finding that audio/visual is an increasingly important component within the design of physical security and IT systems at major corporate clients.

Effective aggregation and rules enginesBig Data flying around a building, a campus-style estate or even corporate offices in different countries is only of value if it is aggregated effectively and subjected to rules engines. A system that alerts on abnormal incidents (or more crucially a set of abnormal incidents) is offering true intelligence to the user. This may well bring back your school memories of the ‘logic’ gates of Boolean algebra but there is a higher level of intelligence, an ‘intelligent zone’ where trends are analysed, predictions are made, and decisions are both analysed and executed based on the bigger picture and the best information available.

Imagine a building where reports are being received of an invalid card being presented to a door or a door held. At a large and busy site, these are likely to be regarded as low-level alarms. But the integration of many disciplines within facilities management may also allow a report of, say, an air-conditioning leak at the same time and flag this

up to the operators who are also viewing the access control violations. The filtering of disparate big data in this manner makes control and monitoring processes intuitive; it optimises situational awareness and allows security guards and facility managers to make rapid informed decisions based on an array of data.

Intelligent buildings stream data constantly even during normal problem-free operation for trend analysis (including energy efficiency) and development of preemptive security measures.

Bi-directional exchange of informationAs storage costs decrease, many companies are streaming big data into their silos without necessarily analysing it, possibly because they have the foresight to appreciate that interrogating the data in the near future may produce business benefits. Analysis of latent big data will often not only protect against major security breaches but can also monitor staff behaviour and movements. A company with a frequently-used meeting room – even

one containing valuable conferencing equipment – would be unlikely to set the room’s intruder alarms during working hours. But the bi-directional exchange of information between security and facility management devices in a truly intelligent building might easily flag up the anomalous situation of a room booking system reporting that an area should be empty but an intruder alarm is reporting movement.

Any experienced facility manager observing this would predict that in all likelihood, legitimate staff members are holding an impromptu meeting but security guards have useful information on which to carry out a spot-check for intruders. Similarly, the intelligent building is able not only to accelerate a combination of low-level events (such as a temperature change at the same time as a break-glass incident) into a full alert but also investigate the events by using the same system intelligence. CCTv cameras can be sent on tours that are relevant to the incident and first-responders will be able to study this footage if it can assist them.

“Intelligent buildings stream data constantly even during normal problem-free operation for trend analysis”

g

IN SECURITy I November 2014 I 37

38 I November 2014 I IN SECURITy

The revolution here is that disparate, enterprise-wide systems are talking to each other and the convergence is not just between physical security and building management. IT security is now integrated such that an attempt to, say, plug a USB drive into the network or some other aberrant network event at a physical location where there is unexpected sensor activity would trigger a high-level alert.

Interrogating and applying structure to big data in the intelligent building can have dramatic effects on general operational efficiency and carbon footprint. The PTS Consulting Group frequently works with clients who are occupying multi-tenanted buildings. Analysis of room sensor and access control reports may prompt a facility manager to ask: “Why are we heating this room and using air-conditioning in that area? Could it be better used as an occasional break-out meeting room? Do we even need to be paying our landlord £60 per square metre for it?

Big data is still underused by corporatesStephen Hawking once said: “Intelligence is the ability to adapt to change” and if here were observing the intelligent building sector rather than galaxies, he would be likely to tip organisations who are adapting to reap the benefits of interconnected devices as the ones who will prosper. And yet US-based technology analysts Gartner have predicted that despite the media hype over big data, by 2015 only 15% of Fortune 500 companies will be gaining competitive advantage through effective analysis of the

data produced by the plethora of connected security and logistic devices discussed above.

It is the forward-thinking physical security and IT consultants who are using 3D data mining to apply structure to and then interrogate an array of data sources in order to first identify trends and then promote workplace innovation. They are not viewing big data as a cost and a drain on their storage capacities but as game-changing information source.

Scene analysis for logisticsOne aspect of big data that offers

both security and logistical benefits is the increasingly high quality video streams produced by IP cameras. These streams have prompted increased use of video analytics or ‘intelligent scene analysis’ whereby behavioural algorithms monitor an internal or external building scene over a long period to establish what content and activity is normal and then send an alert to an operator when something atypical occurs.

Additionally, analytics is being used not as a security measure or even to monitor staff compliance with corporate guidelines but rather to identify choke points, optimise the staggering of breaks, rationalise hot-desking policy, identify under-used areas, evaluate turnstile usage and

even analyse use of lifts. Analytics can even be used to choose optimum days for client visits. (Should the office be near-empty, comfortably busy or crowded?) Human resources can specify behavioural detection that will tell them how many receptionists are needed at what times of the day, even to the point of interrogating data to see when the majority of contractors attend. Trend analysis derived from big data can optimise decision-making throughout an organisation, making it more agile and responsive to changing conditions.

In so far as rigorous scrutiny of one small aspect of employee behaviour extracted from big data, say, movement through turnstiles or speed gates at peak times, may prompt senior executives to make wide-ranging decisions on shift patterns, home working and hot-desking, this kind of analysis can be likened to Edward Lorenz’s view of chaos theory in which a minor event such as a butterfly flapping its wings may determine the course and intensity of a hurricane. From Dirk Gently to chaos theory is in fact a very small conceptual shift; further evidence if it were needed that big data is bigger than any of us has envisaged, all-pervasive and worthy of our close attention n

Martin Grigg is a principal consultant at PTS Consulting Group whose physical security division offers services including threat & vulnerability assessments, security master planning and physical security consulting. The division works with PSIM, CCTv, PIDS, intruder detection, access control and wide-area surveillance.

PTS Consulting Group is an independent management and information technology company employing over 400 delivery specialists from 18 offices in ten countries. The Group has over 3,500 clients and has delivered 10,000 projects.

n For further information please visit www.ptsconsulting.com

SUPPLY CHAIN SECURITYCYBERSECURITY

BORDER M

ANAGEMENT

SAFE CITIES

Fostering Innovation for Global Security Challenges

14 - 16 APRIL 2015Sands Expo & Convention Centre

Singaporewww.interpol-world.com

Event Owner Managed ByHeld InSupported By SupportingKnowledge Partner

WHAT TO EXPECT

EXHIBITION SPACE

27,000 SQM

EXPECTED NUMBER OF TRADE VISITORS

8,000

EXPECTED NUMBER OF EXHIBITING COMPANIES

250

450 KEY DECISION-MAKERS FROM INTERPOL’S

190 MEMBER COUNTRIES

Contact us TODAY at +65 6389 6614 or [email protected]

Interpol AD_FA.indd 1 29/4/14 6:02 pm

SecurITy APPreNTIceSHIPS vITAL To couNTer-Terror eFForTS

Counter terrorism training

BSI

A

With heightened levels of security across the UK and an ever-present threat of terrorist

activity spanning the globe, security training companies are playing an increasingly prevalent role in helping Army personnel to deal appropriately with terrorist incidents and threats. Here, Anthony Rabbitt, Chairman of the Training Providers Section of the British Security Industry Association (BSIA), explores security training courses and how they are aiding the fight against terrorism.

Counter terrorism training is of growing importance within the security industry, but training providers are also actively involved in training the British Armed Forces, through a programme of apprenticeships and courses designed to educate service personnel in the fight against terrorism.

This Apprenticeship in Security programme has enabled individual infantry soldiers to achieve recognised and relevant qualifications, which not only meet the stringent requirements of the National Qualifications and Credits

Framework but also the Security Industry Authority. Because certification is not required to perform counter terrorist tasks during operations, the British Technology Education Council Certificate and complementary National vocational Qualification are designed, developed and delivered by civilian trainer/assessors possessing significant experience both from military operations and commercial security appointments.

As part of the programme, all infantry apprentices are required to demonstrate mastery of the following core knowledge-based

40 I November 2014 I IN SECURITy

units: Working in the Private Security Industry, Working as a Private Security Officer and Communication and Conflict Management, demonstrating the relevance that private security experience can have in the wider context of defence and national security roles.

Learning to demonstrate competent performance for the NvQ builds on knowledge and experience that the learner will have gained from taking part in counter-terrorist operations from training exercises, but is contextualised and orientated to the civilian environment. The syllabus – approved by UK sector skills body for the private security industry, Skills for Security – covers a range of activities involved in counter-terrorism roles, including searching people and vehicles, planning, briefing and conducting security patrols, capturing and recording information, preserving

evidence and scenes of crime, heightening situational awareness, against a constant backdrop of deterring criminals and potential terrorist activity.

As the trade body representing the UK’s private security industry, the BSIA’s membership includes a dedicated group of training providers, many of whom have experience in delivering counter-terror training. Hampshire-based BSIA member, PDM Training and Consultancy Limited, has been delivering a Level 2 Intermediate Apprenticeship in Providing Security Services to infantry soldiers since 2005, under a contract with the Army’s Educational Capability arm, part of the Infantry’s Whole Life Development Strategy, which is managed by the Personal Development Advisory Team. To date, in excess of 3500 Infantry soldiers and junior

non-commissioned officers have completed the Apprenticeship.

The Army has long been in the vanguard of the United Kingdom’s counter terrorism operations. Historically, infantry soldiers were the eyes and ears of the civil authorities in Northern Ireland, supporting the police, while further overseas, infantry soldiers have been involved in many counter terrorist or counter-insurgency operations, including in Malaysia, Palestine and, more recently, Afghanistan. Operation HERRICK – the code name given to British operations in Afghanistan – has been a protracted campaign against well-organised paramilitary terrorist groups and now, 12 years on from the advent of British involvement in the region’s conflict, British military units are counted amongst the best in the world when it comes to counter terrorist operations.

“The Army has long been in the vanguard of the United Kingdom’s counter terrorism operations”

g

IN SECURITy I November 2014 I 41

Infantry training has evolved to encompass counter terrorism, along with a broad range of other security tasks, including security of personnel, equipment and physical key points, manning vehicle check points, controlling access or dealing with improvised explosive devices. However, the Apprenticeship is a route through which infantry soldiers are able to achieve national recognition of the knowledge gained through training and the skills developed during operations.

The Apprenticeship in Security enhances infantry personnel’s ability to perform counter terrorist operations and provides commanders with soldiers who are flexible and versatile in dealing with the constantly changing situations generated in a fluid and developing theatre of operations. It also provides a solid foundation and understanding of the requirements of working in the commercial security industry at the end of military service.

Looking beyond an armed forces career, the Apprenticeship in Security can also benefit soldiers making the move to civilian life. In a recent survey carried out by the BSIA, 92.6% of respondents reported

that ex-forces personnel make suitable candidates for careers within the security sector, with 88.2% of respondents already have ex-armed forces personnel working within their organisations. Several Apprenticeship in Security alumni have, in fact, used the qualification to complement their military experience and make the move into a career in the private security sector.

Of course, the Apprenticeship is the first rung up the lifelong learning ladder and many soldiers, having been promoted as non-commissioned officers, warrant officers or officers seek out and achieve higher level qualifications, as part of their personal development, in managing and planning security.

AfghanistanOther companies getting on board with such schemes include another BSIA member company, Optima Defence and Security Limited. Optima Group was the first UK contractor to design and deliver training on the use of a new hand-held IED detector to front line soldiers in Afghanistan, where tight operational timescales required that the training be delivered in-theatre (at Camp Bastion) over a 10-week period.

This stringent deadline provided the training provider with just seven weeks to design and validate the three-day course prior to the deployment of the Optima Group Mobile Training Team. At the conclusion of the training delivery window, the company had trained 697 soldiers, 690 of whom qualified as competent operators able to detect lethal IEDs placed in the ground by terrorists.

The IED threat is also of concern to the wider population in the region. Whilst military casualties dominate the headlines, the deadly effects of many IEDs are indiscriminate in nature. According to the Joint IED Defeat Organisation (JIEDDO), between 2010 and 2012, only 36% of global IED targets were military; the remainder were a combination of civilian, infrastructure and government. Recent incidents at the Boston Marathon and in the run-up to this year’s Sochi Winter Olympics have highlighted the problem on the global stage.

With the Government’s official terror threat level for Mainland Britain remaining at substantial – meaning that an attack is a strong possibility – the need for training in identifying, deterring and responding to terrorist threats and incidents is just as important for defence and security personnel working in the UK, as it is for their colleagues engaged in combat or military operations overseas.

Choosing a training provider with the appropriate qualifications and experience to deliver counter-terror training courses can be challenging for any company looking to improve its employees’ knowledge of counter-terror operations. BSIA member companies are vetted to a high standard and meet minimum quality criteria, and a full list of members, along with more information about the BSIA and its Training Providers section, can be found at:n www.bsia.co.uk/training-providers

“Between 2010 and 2012, only 36% of global IED targets were military; the remainder were a combination of civilian, infrastructure and government”

42 I November 2014 I IN SECURITy

Dallmeier_S-Panomera_90x264_HAENDLER_EN.indd 1 30.06.2014 16:00:11

The KeySure case is a pilfer proof, tamper evident keyless lockbox. This is the only non-electronic security device that will control and audit the use of a key, password or any other contents. Once an item is secured inside the KeySure it must be physically broken to access what’s inside. This provides physical accountability of the use of the protected item. This simple yet effective device is perfect for:

• Property Managers • IT Professionals• Office Buildings • Security Departments• Personal Use

The most powerful benefit of the KeySure device is that it can be used to prevent those responsible for your keys, flash drives or other personal information from unauthorized access by providing physical accountability. However, they are still able to access the contents in an emergency. This is possible because the KeySure case must be broken to retrieve its contents. This one-time-use key access box ensures that it: • Protects Both Parties from Surreptitious Use• Provides Physical Accountability • Prevents False Accusations• Eliminates Liability The KeySure case is Safe, Simple and Secure. No other key control product on the market is as easy to use or inexpensive because the KeySure device is the only non-electronic control key system available. This makes it an efficient and effective means of key security.

www.keysure.net

Safe, Simple, Secure.

44 I November 2014 I IN SECURITy

The aviation security threat

AIR

POR

T S

ECU

RIT

y

VulnerabilitiesAirport security will remain in the calculus of terrorist planners so long as civil aviation is a target of attack. It is the access point for aircraft on the ground, passengers, airport and aircraft ground support personnel, and key personnel who have routine access past the passenger security checkpoint. The following are some key vulnerabilities to areas of an airport:

Perimeter of airfield: Access to the airfield is often poorly monitored, particularly along the far reaches

of the fence line around an airfield. There may be CCTv coverage, but due to the size of the field, coverage does not overlap, and monitoring of the live feed occurs only in support of a physical patrol in the area. Access from these areas can be gained to aircraft tied down on hardstands, or support vehicles used to service aircraft, simply by breaching the fence at isolated points. Access can also be gained via drainage pipes or conduit leading beneath fence lines to runoff sluices.

Ground Operations zone of airport:

This is the zone between the terminal and the taxiway and runways. It is a very busy and cluttered area that includes aircraft parked at hard-stands and at gates, baggage/stair tugs, guide vehicles, airline crew, baggage handlers, food service personnel, maintenance personnel…the list is long. It is very difficult to secure, because it is so dynamic in nature.

Ticketing and departure area of terminal: These are publicly accessible areas that are lightly guarded at best, and relatively

Terrorists have long favoured an attack on civil aviation; in a risk versus gain analysis, the return for a

potentially successful attack is much higher than for other targets. A successful hijack of an airliner, its

crew, and passengers ensures immediate international attention to political demands, or grievances.

When an airliner is hit, revenge is exacted and a heavy, fearful price is paid as we witness the aircraft

and passengers’ destruction in graphic horror. Most experts are familiar with these tactics and have

crafted defeat measures to mitigate these concerns; however, security manpower and technology

remain fragmented, mismanaged, and under-utilized.

By roBerT L. orD - PreSIDeNT FALKeN INDuSTrIeS, LLc

IN SECURITy I November 2014 I 45

unmonitored. It is also a very vulnerable area for the traveling public. It is an easy place for a specific ethnic group or nationality to be targeted, while waiting for their national airline or a flight destination to their country of origin. Also, it is in this area of the airport where a terrorist, with a plan to get through security and onto an aircraft, puts on his “game face.8” Any last vestige of nervousness, or apprehension about what is intended, will manifest itself at the ticket counter, either when answering specific security questions, or waiting on the security screening line.

Screening area: Screening technology has improved the system, but there remain major gaps that need to be closed. One such gap is screening for non-metallic items under clothing, such as ceramic knives, or body conforming plastique type explosives.

Airport employee vetting: In the planning phase of a criminal or terrorist operation, groups initially explore the opportunity to plant or recruit one or more employees of an airport facility to assist and facilitate the surveillance and the actual attack, or criminal act, itself. Their surveillance, in this initial phase, usually neutralizes most of the adopted security procedures and allows the group to devise an efficient scheme to launch the attack. Individuals with physical access to aircraft, such as baggage handlers, ground staff, or airline ticket counter staff, are given only cursory background checks for their minimum-wage level jobs; this is a particularly acute problem at so-called “spoke” or “feeder” airports, because it leaves them critically vulnerable to recruitment by criminal, or terrorist groups.

Countermeasures and technology solutionsThe combination of state-of-the-art technology and well trained security personnel and procedures provides effective, proven solutions to securing airports with efficiency. The cost of upgrading airports with the latest technologies will be offset by maintaining the safety of the airport’s infrastructure and continuous uninterrupted flow of air traffic and air travellers. The interrupted flow of air traffic and air travellers and the cost of damaged airport infrastructure can result in millions of dollars lost in a very short period of time.

CounterintelligenceA major vulnerability in airport security is the neglected ‘human factor’ – giving minimum wage and lightly-vetted airport (or airline) workers access to the flight-line. A very important component in

designing any airport’s security system is counterintelligence. If neglected, the overall integrity of the airport’s security systems is severely undermined, compromising the efficiency of any security technologies. Therefore, in any design of a security solution, counterintelligence measures and procedures must be well devised and clearly mapped in order to make the solutions effective.• Effective counterintelligence

measures to address the ‘human factor’ include:

• Specialized training for airport security personnel and screeners

• Security response procedures and ‘red teaming’ operations

• Complete Security background checks of all airport employees and close monitoring of their behaviour

• Zoning (no-go and limited access zones for employees)

• Security checks of all outside contractors, regardless of escort by airport employees.

“A very important component in designing any airport’s security system is counterintelligence”

g

Falken Industries is a 11 year old U.S. based security firm

commissioned by several Defense Contractors including Lockheed

Martin and The Boeing Corporation

g

46 I November 2014 I IN SECURITy

Intelligent video Surveillance / Tag and Track TechnologyFalken Industries’ intelligent video surveillance “tag-and-track” technology is extremely useful for airport security personnel and screeners. It enables the hardening of interior surveillance operations and the ability to maintain a continuous flow of air travellers, resulting in millions of dollars saved and preventing the disruption of airport travel. Falken’s intelligent video software enables security personnel to discreetly tag and track multiple ‘suspect’ individuals from the screening checkpoint through the concourses to the departure gates in a seamless, real time video feed which can be played back ‘post event’ and fast forwarded into ‘live video feed.’ This enables the security personnel to covertly monitor certain individuals without causing disruption or concern amongst air travellers. If an individual requires apprehension, the security personnel will know at all times the exact location of the suspect and can intercept and detain them efficiently.

The intelligent video application is also effectively used to alert security personnel (in real time and remotely), to individuals loitering in or entering a restricted zone, objects left behind, or to identify

and apprehend thieves and vandals. The alarm events can be analysed post event, seamlessly moving into real time to “tag-and-track” to the individual responsible for the alarm event. It has been a proven success.

Perimeter SecurityThreats from poorly monitored and/or unmonitored perimeters extending beyond runways represent a significant vulnerability for civil aviation. A virtual fence system provides only a single layer of protection from physical intrusion onto runway/taxiway operations areas; early warning of intrusion is limited, however, and there is no ability to distinguish between friend and foe.

virtual fence systems in combination with intelligent video analytics provide a more robust solution to perimeter security. Falken’ intelligent video surveillance system can integrate any number of sensors to harden surveillance solutions. Multi-layered perimeter security is achieved through the combination of intelligent video analytics integrated with ground radar / sensor scanning systems and high resolution fixed and PTZ cameras to establish a virtual fence line that cannot be penetrated. Ground radar can be customized to

monitor large, specific areas well beyond fence lines and provide an early warning of suspicious activity, persons, or vehicles within zones in critical proximity to low-altitude aircraft that are landing, or taking off. The security software program would automatically vector high-resolution, day-night Pan/Tilt/Zoom (PTZ) cameras to any suspicious activity, for subsequent investigation by airport security personnel from command and control centre or remotely.

To further layer perimeter security, a Radio Frequency Identification (RFID) tag would be provided to authorized airport vehicles and personnel (which can be coupled with biometrics for personnel, see details below) to confirm their identify (friend or foe detection) in air operations areas (AOA). This would also aid in tracking airport assets, ensuring that only authorized personnel with a valid RFID tag were operating vehicles in the area of runways, taxiways, and the airport perimeters. A vehicle or individual without a valid RFID tag intruding into a restricted zone in the vicinity of the airport perimeter would be automatically tagged and tracked both electronically and visually by the system, and an audible/visual alert dispatched to security officials for immediate investigation.g

IN SECURITy I November 2014 I 47

virtual Ground Operations PerimeterThe area between taxiways, runways, and the airport terminal used by baggage handlers, cleaning/food service staff, ground operations personnel, designated airport employees, and aircraft crew members is a busy and difficult area to secure. Using intelligent video analytics, ground operations areas can be divided into segmented, electronic zones that secure stationary aircraft with a virtual perimeter. Personnel or vehicles (baggage carts, tugs, buses, etc.) in the ground operations area that have authorized access to the aircraft would have RFID tags that would confirm their access. Individuals with limited access to specific airlines, or sectors in the ground operations a limited number of security technology providers market the solutions referenced above. Falken Industries is unique as it is comprised of defence, intelligence, and security professionals highly trained in assessing vulnerability and risk. An experienced staff of consultants and leading engineers specializing in Antiterrorism /Force Protection, including the deployment of intelligent video analytics can jointly craft technology solutions to augment the ‘human factor’ and provide multi-layered security solutions. Our approach is to understand a client’s security challenges, no matter how complex, through the eyes of the customer and with the in-depth knowledge and understanding of technology, security, terrorism,

and counterintelligence. We then work hand-in-hand with customers to design counterintelligence procedures, train personnel, and engineer cutting-edge technology solutions that fully mitigate risk. Falken Industries provides complete technical support and a full training package.

Falken Industries provides a broad range of state-of-the-art, turnkey technology systems for security, surveillance, and automation for the private sector and for governments. We are engaged in the design and deployment of customized, artificial-intelligence driven digital security systems integrated with actionable video surveillance.

Falken goes well beyond traditional video security technology; we distribute digitized sensor and video data over open IT networks, and integrate the information in a customized, browser-based Graphical User Interface (GUI) that is user-friendly and fully centralizes security management.

Falken Industries’ Intelligent Sensor Detection Suite processes incoming video and sensor feeds utilizing algorithms to detect specific activities and events for security and surveillance applications. Combined with intelligent browser-based three dimensional (3D) mapping software, our intelligent systems visualize suspected security breach types and locations, simultaneously detecting multiple events and processing/classifying each in accordance with user-defined parameters. The extremely low false alarm

rate and flexibility of our sensor detection suites is one of its greatest strengths. Our intelligent systems can incorporate multiple sensor types, from a simple placement of high resolution, fixed cameras to a full array of PTZ cameras, infrared/thermal cameras, ground radar, sensors and detectors for motion, impact, chemical, biological, radiation, explosives, or seismic activity, as well as biometric tools such as facial recognition, high-speed retina scanning, or hand geometry. Our capabilities can also be enhanced by integrating Global Positioning System (GPS) software, RFID, hydroponics, Optical Character Readers (OCR), and meteorological instrumentation.

ConclusionAirports and the civil aviation industry have been on the front line in the war on terror, long before 9/11. The terrorist threat is an evolving, dynamic issue and the tools that security authorities need to confront and reduce risk should be designed for tomorrow’s battles and not the security incidents of last week, or last year. Falken Industries is committed to working with customers to define ill-defined risk, predict the unpredictable, and – when the next threat to security develops – be prepared and ready to confront and manage the risk.

n For further information please visit www.falken.us

DSX manufactures integrated solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

Barco Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013.www.barco.com/references

Smarter visualizationNetworked visualization leading to

smarter decision making

A reliable networked visualization solution is indispensable to

monitor, analyze, and share an ever increasing number of video

and data sources all over the world. That is why Barco designed

its networked visualization solution, the simplest and most fl exible

way to securely distribute any information to any location. The

result: faster and smarter decision-making.

Learn more about networked visualization at www.barco.com/netviz

BUSINESS DATA

TRAFFICCAMERA

SURVEILLANCE CAMERA

REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE REMOTE NETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORKNETWORK

REMOTE REMOTE REMOTE REMOTE INTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTIONINTERACTION

14090.BARCO.resize.ad.in security.netviz.indd 1 24/04/14 15:43

pro

du

ct L

isti

ng

s

Dallmeier One of the world leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

Falken At Falken, we are a fully licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

Safeotronic SAFE-O-TRONIC is a smart and keyless locking solution for doors, cabinets, lockers and furniture. Its advanced access control features provide facilities managers with the flexibility and management control required in today’s demanding workplace environments. SAFE-O-TRONIC can be used in numerous applications – Hotels, Hospitals, Spas, Gyms, Office Furniture, Cabinets, Lockers. The list is endless... www.safeotronic.com

48 I November 2014 I IN SecurIty

With unique IR lighting concept

• 5-megapixel CMOS image sensor with

technology

• Automatic Day/Night switching supported by integrated

ambient light sensing

• Homogeneous IR illumination by high power LEDs

• Minimum illumination 0 lux

• Megapixel varifocal lens (Day/Night): F1.0 / 2.8 – 11 mm

• Frame rate up to 30 fps

• compliant

• Voltage supply via PoE (Class 0)hall 4, stand D80

IR-Cam_186x129_EN.indd 1 06.02.2012 11:05:55

AUTOMATIC SYSTEMS AUTOMATIC SYSTEMS, a world leader in the automation of secure entrance control, designs and manufactures pedestrian, vehicle and passenger access systems. row.automatic-systems.com

Bosch Security Systems Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

Wyless Systems Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure M2M applications.www.wyless.com

Samsung Security Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

It’s good to be well connected.Your M2M solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.

Wyless offers truly uncompromising M2M solutions, delivering worldwide wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support.

So connect with the experts and together we’ll take your applications to the next level. You have found your true M2M partner.

We can’t wait to discuss the possibilities.

The leading global M2M managed services provider

+1 617 949 8900 +44 1895 454 699 [email protected] www.wyless.com

To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207

Keysure KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net

Videotec Videotec manufactures in-house a wide range of CCTV products recognized for high performances, flexibility and style. Our mission to lead the field in the development of robust, reliable and high performances mechanical and electronic products for surveillance applications is the driving force behind our success.www.videotec.com

ULISSE COMPACT THERMALThe positioning unit off ers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTSwww.videotec.com

Dual vision, Real time.

ULISSE COMPACT THERMALThe positioning unit off ers an integrated solution for total darkness, fog, rain or smoke.

CCTV PRODUCTSwww.videotec.com

Dual vision, Real time.

It’s good to be well connected.Your M2M solution is more than just data connectivity. We understand that.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.

That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.

Wyless offers truly uncompromising M2M solutions, delivering worldwide wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support.

So connect with the experts and together we’ll take your applications to the next level. You have found your true M2M partner.

We can’t wait to discuss the possibilities.

The leading global M2M managed services provider

+1 617 949 8900 +44 1895 454 699 [email protected] www.wyless.com

Keytracker Ltd Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment.Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY [email protected] www.keytracker.com

Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Legic The LEGIC brand is now known around the world and stands for quality in contactless ID technology and in smart card systems for personal identification applications operating at 13.56 MHz. www.legic.com

Any service I can imagine, any security level I desire.All on one chip. On the credential of my choice.Contactless smart card technology: www.legic.com

))))

My Access to my Business.

LEGIC_EUC_en_1_210x297_4c_advant4000Promo.indd 1 29.03.2011 10:55:29

Any service I can imagine, any security level I desire.All on one chip. On the credential of my choice.Contactless smart card technology: www.legic.com

))))

My Access to my Business.

LEGIC_EUC_en_1_210x297_4c_advant4000Promo.indd 1 29.03.2011 10:55:29

Honeywell Security Group delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

DSX-Europe LTD | Unit 41 Mountheath Industrial ParkPrestwich MANCHESTER M259WB UK | 44(0)[email protected] | www.dsx-europe.com

DSX-USA | 10731 Rockwall RoadDallas, TX USA 75238-1219 214.553.6140  | [email protected]

• Backwards Compatible Architecture

• Alarm Text Message/ E-Mail Notification

• Hot Swap Redundant Communication Server

• High Level Elevator Control Interface

• Integrated Wireless Locksets

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

www.dsxinc.com

DSX Access Systems, Inc.• No “Per Seat” Licensing In System Pricing

• LAN/WAN Compatible

• Smart Card and Biometric Integration

• Unlimited Access Levels Per Cardholder

• Integrated Photo ID Badging

• Backup SQL Server

CREATING THE FUTUREOF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support.

When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.