security focus - vol 34 no 1 - january 2016

36

Upload: contact-publications

Post on 28-Jul-2016

247 views

Category:

Documents


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security Focus - Vol 34 No 1 - January 2016
Page 2: Security Focus - Vol 34 No 1 - January 2016
Page 3: Security Focus - Vol 34 No 1 - January 2016
Page 4: Security Focus - Vol 34 No 1 - January 2016

THE OFFICIAL INDUSTRY JOURNAL FOR PROFESSIONAL RISK PRACTITIONERS: SECURITY, SAFETY, HEALTH, ENVIRONMENT, AND QUALITY ASSURANCE.

Security FocusR 46,00 incl. VATVol 34 No 1 2016

www.securityfocus.co.za

www.omegasol.com

residential estates

Integrated security solutions for

12 SPECIAL FEATURE: RESIDENTIAL SECURITY According to market research, the home security industry

is projected to be worth approximately $47,5-billion by 2020. The sheer scale of the industry drives the need for constant developments in technology that reduce risk factors and system failures or incompatibilities that jeopardise safety.

14 RESEARCH NOTES Analysts from IHS Technology discuss subjects of interest to the security industry which includes the smart home market; installation of security screening equipment; and the economic downturn and exchange rate volatility which is making business conditions tough.

16 SPOTLIGHT ON IP SOLUTIONS Pyronix poses the question: So, what are the benefits for you the installer?

20 SPOTLIGHT ON CYBER CRIME In this feature Fred Mitchell of Drive Control Corporation

discusses key trends from a 2015 security threat report; and Rory Young, of T-Systems South Africa, says mobile identity ensures security in a digital revolution.

8 OMEGA RISK SOLUTIONS Top of mind for almost any South African resident

today is security. However, while estate residents are looking for advanced security, they still demand a sense of freedom; a sense that they are not the ones living behind bars.

COVER STORY SERVING THE SOUTH AFRICAN SECURITY INDUSTRY FOR 34 YEARS

FEATURES

CONTENTS PAGE

Page 5: Security Focus - Vol 34 No 1 - January 2016

is a member of Security Focus

Subscription rates:Annual subscription for magazine posted in Republic of South Africa is R650 including VAT and postage.

Subscription rates for addresses outside South Africa can be obtained on application to the Subscription Department, Box 414, Kloof 3640.

Editorial contributions:Editorial contributions are welcome. For details please contact the Editor, Security Focus, on Tel: (031) 764-6977, or Fax: (031) 764-6974, or write to the editorial office address detailed elsewhere in this column.

Official Journal of the Security Association of South Africa

is published by the proprietorContact Publications (Pty) Ltd(Reg No. 1981/011920/07)

Publisher: Godfrey KingEditor: Andrea MüllerProduction Leader: Colleen McCannLayout & Design: Beth MarchandSubscriptions: Jackie Goosen

Head Office physical address:Suite 1, Fields Shopping Centre, Old Main Road, Kloof 3610

Postal address: P.O. Box 414, Kloof 3640, South Africa

Publication details:Security Focus is published monthly

Printed by:Paarl Media KZN, 52 Mahogany Road, Westmead. www.paarlmedia.co.za

Tel: (031) 764-6977 Fax: (031) 764-6974e-mail: [email protected]

4 Comment Not so peaceful protest.

6 News Changes to member funeral benefits.

10 Industry opinion Holistic view and strategic approach key to RIM

17 Company News •NewsalesexecutiveforSouthAfrica. •WDandMilestonepartner. •Garminlauncheshigh-definitiondashcam. •UnicloxcompletesfirstBodetinstallation.

22 On The Market •AcloserlookatWD’srevampedharddrives. •Annie,getyourIPsurveillancedone.

Security Focus

www.twitter.com/

SecurityFocusza

REGULARS

ISSN 1022 6427

24 International News •Managealldisciplinesfromacentralplatform. •OpShield,asecuritysolutionforoperationaltechnology. •S2Security’sS2MicroNodePlus. •JohnsonControlsandTycomerge. •HikvisionteamsupwithMemphisPolice. •NewversionfromDallmeier.

28 Law & Security The start to 2016.

30 Index of Advertisers31 Calendar32 Directory

ADVERTISING ENQUIRIES:

Cell: 082 443 8931. Fax: (031) 764-6974e-mail: [email protected]

Bernadette Fenton

VOL 34 NO 1 2016

Page 6: Security Focus - Vol 34 No 1 - January 2016

4 SECURITY FOCUS | VOL 34 NO 1 2016

EDITORS COMMENT

Editorial Policy Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services.

It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.

While the private security industry is no stranger to controversy and often comes under fire both deservedly

and undeservedly so, the eruption of protest action on campuses across the country has onceagaindemonstratedtheindustry’svital role.

SouthAfrica’suniversities,inthethroesof ongoing protest action, have become a battleground.Unfortunately,asisoftenthecase, these so-called ideals and ideologies are frequently lost, and public sympathy often diminished when crowds resort to

Not so peaceful protest vandalism and destruction of private and public property.

In March 2015, a group of students at the UniversityofCapeTownturnedtheirattentiontowards the removal of the statue of Cecil John Rhodes, a symbol which the protesters felt was oppressive, one that perpetuated intuitional racism and a perceived lack of racial transformation in term of access to education and accommodation. Despite the use of civil disobedience, violence, destruction of private property and historic art, and even the throwing of human faeces - the campaign went global and the protesters succeeded in having the statue removed.

The Fees Must Fall Protest, which almost brought year-end varsity exams to a grinding halt and culminated in a showdown at the UnionBuildingsinPretoria,actuallygarneredglobal support and again the protesters were awarded with the promise that their demands would be met.

As one may have predicted the protests havesincecontinuednationwide.We’vehadOutsourcing Must Fall, Shacks Must Fall, Afrikaans Must Fall and even Private Security Must Fall.

The Private Security row came about when protesting students claimed that they were being hit, punched, slapped and throttled by security officers while simply protesting “peacefully” during the 2016 registration period.

TheWits’sVice-Chancellor,AdamHabibandUCTVice-ChancellorDrMaxPricebothnot entirely convinced by the “peaceful” argument, fiercely defended the presence

of private security officers on campus, stating that it was a vital service aimed at preventing violence, and that with privatecompaniesundermanagement’scontrol, the security officers were bound by certain regulations, rules and protocols – ones that may not

necessarily be possible if the SAPS were called upon instead.

Vice-Chancellor Dr Max Price emphasised theUCT’sresponsibilitytosafeguardtherights of staff and students on the university campus.Healsoemphasisedtheuniversity’sresponsibility to protect the public investmentinUCT’spremisesandfacilities.

“As the academic year proceeds, we will continue to use of the services of private security companies on this basis. In other words, private security will be employed when we are advised that ensuring the safety and security of students and staff, andprotectingUniversitypremises,exceedscapacity of our regular Community Policing Services,” he said.

He said that while the university fully respects the right to peaceful protest, the institution would take the ultimate responsibility for decisions made and policies put in place, that it would not allow the right to peaceful protest to infringe on the rights of others.

“This entails securing the academic enterprise, its people and premises - as set out above - and taking disciplinary action against individual offenders, if we can identify them. In short, we do not hire private security to close down the space for protest, or to criminalise or intimidate those engaged in protest,” he added.

He concluded by saying that private security does not substitute for the services of Public Order Policing and the SAPS but that it played a critical role in safety and security for all involved in the campus community.

Andrea MüllerEditor

[email protected]

Page 7: Security Focus - Vol 34 No 1 - January 2016
Page 8: Security Focus - Vol 34 No 1 - January 2016

6 SECURITY FOCUS | VOL 34 NO 1 2016

NEWS

In constantly improving the quality of life and benefits to members, the Private Security Sector Provident Fund Board

ofTrustees’embarkedonamarkettestingwhich resulted in a change of the funeral administrator to Bophelo Life Insurance Limited which offered better benefits at a reasonable cost.

The funeral benefit is to help pay the funeral costs when a member dies. It is also payable for the death of a spouse, life partner or eligible child of a member.

The appointment of Bophelo is effective as from 1 February 2016 with the following benefits:

FAMILY MEMBERS COVERED BY THE SCHEME• Main Member - Main member is covered

up to the retirement age specified in the Fund rules

• Spouse – A person who is married to a member. •Marriage:Aunionrecognisedasa marriage in accordance with any law or custom, including: • Acustomarymarriageconcludedin accordance with customary law; • Aunionrecognisedasamarriage under the tenets of any Asiatic religion.

• A permanent life partnership in which the partners to such relationship had been living together for at least six months. This is provided that Bophelo Life Insurance receives satisfactory proof that a permanent life partnership had been established.

• Multiple spouses covered. Limited to three claims per annum.

• All children are covered up to the age of 21. Children studying full time are covered to age 29 provided there is no break in studies from the age of 21.

• Stillborn after 26 weeks of pregnancy. Death is defined as death occurring after 26 weeks of pregnancy but before live delivery. Proof required in the event of a still birth is confirmation from the hospital/doctor (BI 1663).

• Disabled child means a child affected by any permanent mental or physical disability, including any disorder or disability of the mind, the body to the extent that he or she is at all times unable to perform any function without the direct assistance of the MEMBER and must be having a condition that renders the disabled child unemployable. The child must have either been born with the disability, or the disability must have occurred before he/she reaches the age of 18.

• For the purposes of this policy, a disabled child remains a child throughout the existence of the policy and shall be covereduntilamember’sretirementortermination, whichever occurs earlier.

ADDITIONAL BENEFITS• No waiting period.• 24-hour call centre for queries and

notification of death.• Repatriation of the mortal remains of

the main member from place of death to place of burial within SADC (South Africa, Swaziland, Tanzania, Zambia,

Zimbabwe, Lesotho, Namibia, Botswana, Malawi, Mozambique, Angola, Congo (DR), Mauritius and Seychelles).

• 7 days free storage of mortal remains of the main member.

• A tombstone is provided by Bophelo (Not transferable to cash).

• Multiple spouses covered. Limited to three claims per annum.

• Trauma, assault and HIV counselling.• Legal assistance benefit: Legal Assist is

a telephonic legal advice line manned by qualified and experienced Bophelo appointed attorneys for guidance and information on all legal matters.

ACCIDENTAL DISABILITY BENEFITOn submission of the required claim form, documentation and on qualification, an accidental disability benefit up to a maximum of R85 000 will be payable based on a variable scale.

SUBMISSION OF CLAIMS:Claimswillbepaidwithin24hours’subjecttothe following:• Completed funeral claim form.• Certified copy of death certificate.• Certifiedcopyofdeceased’sIDdocument.• Certified Copy of the beneficiaries ID

document.• Copy of Notice of Death/Still Birth (BI

1663).• Proof of banking details of the beneficiary

(bank statement, stamped by the bank).• Proof of relationship to member, either

an affidavit or certified copy of marriage certificate.

• Supporting affidavit from a family member confirming the relationship between the beneficiary and the deceased (if applicable).

• ID copy of the abovementioned family member. n

Claim forms must be submitted at Bophelo as follows:

Email: [email protected]: 086 550 0730

Web: www.bophelolife.co.za (Click on PSSPF)

Claims can also be submitted at Private Security Sector Provident Fund offices.

These benefits will be in effect from 1 February 2016. All death and

accidental disability claims occurring prior to this date will be dealt with by Momentum at the current rate.

Changes to member funeral benefits

For more informationPlease visit www.guardtrack.co.za

Tel: 011 888 4982Fax: 011 782 7333email: [email protected] [email protected]

Historical SystemsFor Single / Multiple Site ApplicationNo wiring required on site

Type of Member Covered Funeral Benefit

Main Member R30 000Spouse R30 000Child 14 to 21 R30 000Child 6 to 13 R19 000Child 1 to 5 R14 000Child 0 to 11 months (Including Stillborn)

R7 500

Page 9: Security Focus - Vol 34 No 1 - January 2016
Page 10: Security Focus - Vol 34 No 1 - January 2016

COVER STORY

RESIDENTIAL ESTATES: The real deal in security or fool’s paradise?

The appeal of community livingTop of mind for almost any South African residenttodayissecurity.It’snosecretthatSA’scrimeratehasdrivenanyonewiththenecessary financial means to seek out a living situation that provides the most state-of-the-art security systems. However, while estate residents are looking for advanced security, they still demand a sense of freedom; a sense that they are not the ones living behind bars.

According to Hannes Hendriks, estate manager at Serengeti Golf and Wildlife Estate, the growth of the community schemes concept is a clear indication of its increased popularity among homeowners.

“Living in an estate has multiple benefits for homeowners. For one, they enjoy the benefit of living in a community scheme with an elected board of directors, who strive to protect the interests of all, while improving quality of life. But by far the biggest advantage, and the one that outweighs all others, is the perception of the safe and secure environment that this lifestyle provides.”

Roy Rawlins, managing director (South Africa) Omega Risk Solutions concurs with this view. He adds that Omega recently conducted an informal survey, which highlighted the following benefits as the main reasons for estate living: a secure environment, a lifestyle that creates a perception and sense

When people’s personal security and the protection of their most valuable assets are at stake, the importance of residential security is something that cannot be underestimated. However, the 2015 Gallup Global Law and Order Report revealed that a shocking less than 31 per cent of South Africans surveyed actually feel safe living in South Africa today.

8 SECURITY FOCUS | VOL 34 NO 1 2016

of freedom, enhanced aesthetic value, and increased property value.

“If an estate is managed effectively, the combination of these elements contribute towards a lifestyle, which is perceived to be far superior to living in a run-of-the-mill residential suburb,” he says. “However, security remains the biggest drawcard.”

Are estates really safe?While residential estates and gated communities have an excellent reputation that has created a perception of secure living, there is another side to the story. Over the past few years the local media has intensified reporting on serious crime incidents that have taken place in some of the most reputable residential estates in Gauteng (Pretoria and Johannesburg) and the Western Cape.

“To further complicate the matter, my experience following recent site visits to various estates shows that the current state of security management in several estates leaves a lot to be desired,” says Mr Rawlins.

“Some of the challenges noted include: non-compliance when it comes to the utilisation of security officers, inferior quality or broken security equipment, and the ineffective application of technology. These security pitfalls may be due to a lack of knowledge or merely a matter of utilising the cheapest solution to save costs and capitalise

on consumer ignorance,” he adds. “But it does beg the question: Is the desired safe haven lifestyle just a pipedream, or is it actually an achievable goal?”

Omega’s integrated offering at SerengetiOmega Risk Solutions is proud to announce that it has been supplying high-quality security solutions to the Serengeti Golf and Wildlife Estate. Situated midway between Tshwane and Johannesburg on the R21, Serengeti represents the epitome of a lifestyle estate that was envisioned as a safe and secure environment where residents really can live, work and play. A self-contained city in the middle of Gauteng, Serengeti offers discerning buyers an abundance of residential homes (1 700 stands), a 27-hole Jack Nicklaus Signature golf course, wildlife, a conservation area, a shopping centre, restaurants, a school, nursery, hotel, and a commercial office complex.

Given the exceptional scope of this development, the security system deployed had to offer complete peace-of-mind, while still providing the tranquillity and sense of freedom that residents seek. State-of-the-art equipment and infrastructure are just the beginning of the total security solution at Serengeti.

A fresh approach to residential estate securitySecurity experts agree that most residential estates face similar security challenges. However, security solutions that address the unique challenges of a specific site differentiate themselves from the rest. Often estate management falls into the trap of applying a generic, one-size-fits-all approach, which ultimately leads to disaster and even greater long-term expenses.

Page 11: Security Focus - Vol 34 No 1 - January 2016

COVER STORY

Integration has become a major buzzword in the security industry in recent years, but this concept has also created a great deal of confusion. A multi-layered solution is required, effectively aligning the various security-related activities, all working together to reduce potential risk and manage actual risk situations more effectively.

Seemingly unrelated services can then be linked that will further enhance the value proposition for the estate, including law enforcement, occupational health and safety, fire safety, and medical emergency response. Many security companies fall short on these additional offerings.

Mr Hendriks believes that security solution architecture starts with an analysis of the external environment. This includes the perimeter and entry points. The approach then moves inwards, identifying areas of low, medium and high risk. This is followed by a multi-layered solution approach, whereby a range of early warning systems, observation technology and physical deterrents such security officers and a range of other “fightback” elements are deployed in a structured manner to effectively and efficiently manage varying areas of risk.

“The quality of each stand-alone element is unquestionable, but the strength of the solution lies in the manner and to what extent policy, rules and procedures and systems (technology and intelligence) clearly define and drive the interconnectivity,” says Mr Hendriks.

“The focus must therefore be on effectively aligning people, processes, and systems in the service offering. Misalignment between any of these elements potentially inflates the probability of risk occurring,” he adds.

The sustainability of the Omega residential estate solution is driven by the effective use of people, processes and systems, and the seamless integration of these three elements into state-of-the-art contact

Tel: 012 361 0620 | Fax: 012 361 0618 | Email: [email protected] | www.omegasol.com

THE OMEGA ESTATE SECURITY INTEGRATION MODEL

PEOPLE(Competence)

INFORMATION(Intelligence)

TECHNOLOGY(Application)

PROCESSES(Command and

Control)

CONTACT CENTRE

(Integration Platform)Integration

SERVICES(extended )

centres. The contact centre is the focal point that systematically collates, coordinates and manages all elements of the security operation. This is done through various intelligence platforms that effectively align people activities, processes, technology, information and services.

By reducing the probability of breach and facilitating immediate intervention, the alignment of online intelligence software eliminates potential deviation due to human error. The information available has powerful reporting capacity that drives proactive initiative, command and control, and improved efficiencies. The contact centre enforces the multi-level solution to mitigate risk through prompt intervention and decisive action.

This system requires that the operators working in the Omega contact centres are of an exceptionally high standard, and therefore special care is taken to ensure that only the highest quality candidates are recruited.

Finding superior candidates“Years of experience in the operation and management of technologically advanced

monitoring and control centres has helped us to develop a clear understanding of the competencies (knowledge, skills and attitude) needed at the various levels to ensure maximum operator output,” says Mr Rawlins. “Together with our in-house psychologist, our human resources department has designed an evaluation battery consisting of psychometric assessment, integrity testing and competency assessments to ensure that candidates exceed our minimum requirements.”

BeforeanyofOmega’ssecuritypersonnel are deployed at any of its client sites, employees are also required to complete a full training programme at the Omega Training Academy. The

Omega Training Academy has been certified by the International Training Standards Authority, City and Guilds, and its qualifications are internationally recognised.

All training modules are carefully designed and developed in conjunction with some of the major role players in the industry, and tailored to provide industry-specific knowledge and skills transfer.

Training courses include: Advanced Surveillance Skills, Criminal Behaviour Identification Skills and Advanced Searching Skills, Occupational Health and Safety Training, and most importantly, the ability to interact with residents in a professional way through Life Skills Orientation and intensive training in Client Relations.

Comfort and safety is priorityIts’snotdifficulttoseewhySerengetihas become one of the most sought-after residential estates in South Africa today. “Omega will continue to actively work with Serengeti to continuously improve on what is already a world-class residential estate security solution,” concludes Mr Rawlins. n

Page 12: Security Focus - Vol 34 No 1 - January 2016

10 SECURITY FOCUS | VOL 34 NO 1 2016

Holistic view and strategic approach key to RIM

By Saurabh Kumar, managing director, In2IT Technologies, South Africa

Remote Infrastructure Management (RIM) is not a new concept. However, as connectivity and cloud-based

solutions have grown, the ability to manage a greater proportion of infrastructure remotely has become a reality. RIM offers organisations numerous benefits.

However, given the increased complexity of IT environments, RIM can become correspondingly complex if not effectively implemented and managed.

Too many different tools for multiple functions can complicate matters, leading to ineffective and inefficient infrastructure management.

A holistic solution for monitoring infrastructure, as well as a strategic, phased approach to the implementation of RIM services, can go a long way toward assuring success.

RIM is the process of managing IT infrastructure from a different location, and it is a concept that has grown in popularity and

adoption over the years as more equipment becomes available for remote monitoring.

In fact, research firm IDC estimates that more than 85 per cent of infrastructure components can be managed from a remote location.

RIM can be applied across a variety of areas within the organisation, including data centre management, network management, end-user computing, security management and cross-functional services.

One of the benefits of this is that it enables organisations to leverage outsourced infrastructure management services, which in turn helps to reduce the staffing costs associated with the management of IT infrastructure.

Services can be standardised, IT policies can be streamlined across branches and departments, and the cost of management becomes more predictable.

In addition, outsourced RIM services enable organisations to benefit from higher reliability, reduced risk, and lower IT costs through one-stop management for their entire IT infrastructure.

Despite these benefits, many organisations experience a number of challenges with the introduction of RIM.

The primary issue is that, over the years, CIOs have spent significant amounts on tools and technology to enable RIM, each designed to manage a different area, solution, or part of infrastructure.

Often, the majority of features are not utilised, and this fragmented approach results in siloes that fail to provide an aggregated view of infrastructure across the board.

There are simply too many tools, areas and providers to manage, and as a result,

service level agreements (SLAs) may not be met, infrastructure may not be effectively managed, and organisations could end up spending money with little or no return.

What is needed is an integrated, holistic solution to monitor, as well as the ability to view all these key areas of the IT infrastructure system simultaneously.

Whether organisations choose to outsource the full management of infrastructure to a single service provider, or only certain aspects of it, it is essential to create well-defined SLAs to govern the management of infrastructure.

In addition, service providers need to deliver visibility into the infrastructure being managed through comprehensive reporting.

From the business aspect, it is essential to create an integrated view of IT operations, and align IT with defined business outcomes, to ensure that IT can add value to the organisation.

A RIM service provider can then work towards supporting these goals with appropriate SLAs and services.

As the popularity of RIM services continues to grow, adoption of this type of solution has become increasingly more widespread.

RIM has the potential to deliver significant benefits to business, including cost advantages, helping internal IT teams to concentrate on strategic goals and offloading the day-to-day IT operations management.

This, in turn, allows the company to increase their focus on innovation.

However, organisations need to partner with a trusted service provider to ensure to take a strategic approach that aligns RIM with business objectives for maximum benefit. n

INDUSTRY OPINION

Page 13: Security Focus - Vol 34 No 1 - January 2016
Page 14: Security Focus - Vol 34 No 1 - January 2016

12 SECURITY FOCUS | VOL 34 NO 1 2016

SPECIAL FEATURE: RESIDENTIAL SECURITY

International residential security trendsResidential security is a global industry

that sees significant growth on an annual basis due to the constant threat

of theft, burglary, and home invasions. Consumers’needforsecuritysolutionsthat

ensure peace of mind and safety for individuals and their families means that new technologies are constantly being introduced to the market in an effort to stay ahead of increasingly innovative criminal modus operandi.

The industry of residential security focuses on the security and safety of residential buildings and the individuals that reside in them.

Due to global theft and burglary rates

increasing, so too is the demand for increasingly advanced security solutions that proactively prevent criminals from gaining access to homes.

According to market research, the home security industry is projected to be worth approximateLY $47,5 billion by 2020, growing at an annual rate of 8,7 per cent. The sheer scale of the industry drives the need for constant developments in technology that reduce risk factors and system failures or incompatibilities that jeopardise safety.

The global residential security market is generally categorised by technologies such as sensors, fire sprinklers and extinguishers, CCTV

cameras, electronic locks, alarms, and panic buttons.

Electronic locks are a growing trend in access control and can be further categorised as magnetic strip locks, electro-chemical door locks, keypad locks, wireless locks, electric strip locks, and biometric locks.

There are also a number of security solutions that are common in the industry, such as intruder alarms, video surveillance software, access control solutions, fire protection, and intercom systems.

Wireless security solutions remain a mainstay in home security solutions as their ease of

MOST companies adopt video surveillance for insurance reasons, but it may be one of the most under-used assets they own. We spoke to Roy Alves, business development manager at Axis Communications, about the trends in 2016 that are taking surveillance technology to a whole new level.

HIGH DEFINITION COLOUR VIDEO IS MAINSTREAMSince last year, image sensor companies have drawn attention to the fact that high definition (HD) video is the mainstream standard. It is increasingly unlikely to find any camera that can’trecordathighresolutionssuchas1080p,in colour and at a high frame rate.

Themarketispushing4KorUltraHDasthe new benchmark. Although still relatively expensive, there is a trend of prices falling. As the demand for HDTV in the consumer electronics market grows, so instead, companies can buy HD cameras at starter prices, much like how a modern HDTV is more affordable because it is so commonplace.

And HD is good, said Mr Alves: “A high resolution video means more clarity. I cannot tell you how often criminal cases fall apart becauseapersonisn’tclearlyidentifiedonavideo thanks to a lack of detail and colour.

“If someone wears a purple shirt that is something you want recorded. The higher frame rates also help increase the number of pictures which then reduce the frequency of image blurring.”

CLOUD OFFERS MORE BANG FOR LESSThe word “Cloud” is an over-used sales pitch,

butit’snotallhype.Thelargestcontributioncloud has made is through the drastic reduction in service costs.

Instead of buying the farm, one can rent the cow. Gaining access to a video conference service or accounting suite can be as simple as brandishing an Internet connection and credit card.

In surveillance this is called Video Surveillance as a Service (VSaaS) and according to Mr Alves it has the same impact: “At its most basic, VSaaS can offer ways to store video footageforverylittle,plusthievescan’tmakeoff with the evidence by swiping a local hard drive. Real-time monitoring and notifications to mobile devices becomes very easy to do.”

CAMERAS CAN BOOST BUSINESS INTELLIGENCECameras are the eyes and ears when people aren’taround.Thismakesclearsenseinterms of security, but what about all the other scenarios where a critical eye can make a difference?

Airports have for years been using surveillance systems to track individuals in crowds, while large bluechip companies use surveillance to help track stock across their networks.

A report compiled by Frost & Sullivan found that video surveillance data could be used to analyse people flow, monitor facility operations and collect marketing data.

“Cameras can track many different things, especially markers such as coloured stickers or barcodes. But they can also follow activities, such as if staff are loitering too much or if a

customerisn’tbeingattendedto.“You can combine cameras with customer

data to create a real omni-channel experience. One example I know of, is a golf course that scans the number plates of members, then informstheclub’ssystemstoensurethatmemberistakencareoffanddon’tmisstheirtee-off time. Cameras generate a lot of on-the-ground information that companies can use.”

SURVEILLANCE HELPS LEAD THE INTERNET OF THINGS REVOLUTIONContrary to popular belief, surveillance systems aren’tsimplydumbrecorderspouringfootageon tapes.

For decades, camera systems have helped pioneer and adopt new technology movements. With the arrival of a very connected world – often summarised as the Internet of Things – surveillance companies are in a unique position.

A pedigree surveillance solution provider is foremost a technology company. IHS noted this in their trends report for the industry, saying in 2015 that “the video surveillance market has finally reached the point where more revenues come from network than analogue equipment.”

Mr Alves agreed: “Cameras essentially create data that can be easily integrated into our more complex systems which facilitate business intelligence rather than just storing images on disk.

“The evolution of surveillance systems are moving from simple forensic recording system to one of being proactive, allowing cameras to make decisions to either pre-empt something about to happen, or raise an alarm to notify a security operator. n

From “big brother” to big help

Page 15: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 13

SPECIAL FEATURE: RESIDENTIAL SECURITY

set-up and system installation, as well as the removal of risk for wires being cut, means that more homeowners are adopting systems that integrate this.

Wireless security will still be the top choice when it comes to security features for homes. It does not require wires and holes punched into walls, and the system is very easy to install, as described by Top Home Security Systems. It can also cover as many security points as possible without the risk of wires being cut by potential trespassers.

An emerging trend is seeing homeowners taking security of their homes into their own hands through the use of mobile devices in conjunction with surveillance and security software.

Security companies are tacking on to this trend by developing products that send security-relatedinformationstraighttotheuser’ssmartphone, meaning that consumers have the capacity to handle security situations as they happen.

This includes anything from a tripped alarm to a potential fire hazard alerted by smoke detectors.

Integrated security solutions are becoming more prominent in the industry, with the demand for systems that combine video, alarm,

and other security services in one package. This allows homeowners to monitor their

property, control access, and address potential situations from one device.

Biometrics is another technology that is becoming more common in a number of industries, with integration into mobile and now home security systems making it accessible to end consumers.

Biometrics allows users to carefully control access based on criteria such as fingerprints, facial recognition, retina scanning, or even palm

prints. This added layer of security means individuals

who are not registered on the system will be unable to access the property.

In the end, the newest developments and trends in home security for 2016 will place an emphasis on convenience and efficiency for the user.

Improvements on existing technologies will be complemented by these new technologies that will make protecting homes easier than ever before. n

Page 16: Security Focus - Vol 34 No 1 - January 2016

14 SECURITY FOCUS | VOL 34 NO 1 2016

One of the most daunting tasks for any platform or device vendor in the smart home market is identifying which type of company offers the best opportunity for long-term success – security providers, multiple service operators (MSOs), smart home specialists, do-it-yourself (DIY) smart-home systems or utilities.

By Blake Kozak, Principal Analyst, IHS Technology

Security providers currently dominate the North American market, and will continue to do so throughout 2021.

However, their share of installed smart home systems were forecast to drop from 60 per cent in 2014 to 50 per cent in 2021, as other providers offering smart-home products expand into more consumer segments.

According to the IHS Smart Home Intelligence Service, the DIY smart home system segment share of smart home systems will rise from 11 per cent to 17 per cent

between 2014 and 2021. This segment is gaining momentum through retail channels, with an estimated 114 000 new systems in 2015.

Multiple system operators (MSOs) experienced a growth slowdown in 2013 and 2014, due to the saturation of early-adopter consumers.

Growth will increase again in 2016, as MSOs use marketing campaigns to generate more interest in smart-home services in the wider consumer market.

However, pressure from the DIY segment in 2020 and 2021 will cause MSO growth to slow again.

Utilitieswillalsobegintocarveoutasection of the market, but they will not provide more than four per cent of systems by 2021, even as they begin to partner with smart-home devices and systems alongside demand-response programmes.

TherearealreadyprojectsintheUnitedStates where customers may enroll a smart thermostat into a demand response programme, in order to save money and help energy providers control load.

Most smart-home products have an ongoing cloud-based service element to enable remote interactivity with in-home devices and the dynamic creation of scenarios that change the

way various devices interact with each other. Despite the current domination of these

types of products, self-monitoring will challenge the central monitoring station paradigm over the next five years.

This paradigm shift will not only bring a change in the way systems are monitored, but also in how police respond.

Two of the primary reasons for this market shift are advances in technology and a reduction in false alarms.

Smartphones are an example of a technology advancement that lets users receive alert messages and video directly from their security systems, anywhere in the world.

DIY systems that are properly installed with video verification will lead to fewer false alarms to police departments, compared to professionally monitored systems, because all that matters is visual verification and the ability of the caller to report a crime in progress.

Of course, each type of company comes with its own unique challenges and opportunities. As a participant in the smart-home market looking for long-term success, analysing and evaluating each company type is critical – but we cannot ignore the effect that non-subscription self-monitoring products will have over the next five years. n

Optimum service type for the smart home

RESEARCH NOTE

Page 17: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 15

By Jared Bickenbach, Market Analyst, IHS Technology

THE installation of security screening equipment on the Thalys high-speed service between Paris and Lille in northern France comes in the wake of the recent violence in the region, including the attacks on satirical magazine Charlie Hebdo, the Thalys train from Oignies to Pas-de-Calais France, and the most recent attacks at the Bataclan and other locations in Paris.

The decision to install passenger screening equipment at these rail facilities by December 20, 2015 was implemented on schedule and could have a ripple effect throughout the region, as the Schengen agreement comes into question, resulting in more demand for explosives, weapons and contraband detection equipment (EWC).

Despite the current threats to passenger rail systems in Europe, there have been no widespread installations of passenger screening equipment within the Schengen zone countries to date.

Currently, the only rail service requiring passengers and their baggage to be screenedistheUnitedKingdom’sEurostarsystem, which lies outside the Schengen zone, but provides regular service to member countries.

This does not appear to be the beginning of “airport-style” security at rail stations,

andEurope’srailstationswillnotadoptthisstyle of screening, for the following reasons:• More than three billion passengers

travelled by rail in Germany, France, and Belgium in 2014, compared to more than 1,7 billion traveling by aircraft throughout Europe. The sheer number of rail passengers makes it difficult to impose airport-style security in the rail industry.

• The number of rail stations far exceeds the number of airports in Europe. In Germany, for example, there are only 33 large airports, but there are 122 main rail stations. The cost to install, maintain, and monitor checkpoint screening equipment at the major German airports is immense and the cost to provide the same level of security at German rail stations would be higher still.

• There are 5 417 railway stations in Germany, ranging from large international hubs to small, rural platforms. The prospect of installing security screening equipment at only category-one rail stations, which are central hubs or intersections of important railway lines, is a daunting prospect. Based on the average selling price of baggage and parcels x-ray equipment ($99 775) and walk-through metal detectors ($2 164), if the 21 largest stations in Germany each had five

security checkpoints with one baggage and parcels x-ray machine and one walk-through metal detector, the total cost for equipment alone would be $10,7 million.

Although the recent installation of screening equipment in France addresses the threat of possible attacks against the Eurostar and other high-speed trains, the majority of rail passengers travel via commuter trains, with thousands of unoccupied platforms.

Furthermore, the current deployment format of screening equipment at rail stations only addresses the threat of an attack on the train itself and not the railway station.

There are few secure areas at rail stations, and creating such areas would require significant reconstruction of most main stations, which makes the large-scale adoption of security checkpoint equipment at European rail stations an unlikely prospect. n

French rail increases security measures

RESEARCH NOTE

By Jon Cropley, Principal Analyst, IHS Technology

AN economic downturn and exchange rate volatility are making business conditions tough for vendors of video surveillance equipment in a number of Latin American countries.

As a result, the Latin American market was forecast to decline by 7.7 per cent to $580-million in 2015.

Brazil is the largest market in Latin America. Its economy has been suffering as lower demand from China has led to plunging commodity prices and a shrinking market for

Brazilian commodity exports. At the same time, the average exchange

rate of the Brazilian Real was almost 37 per centlowerversustheUSdollarinthefirst10months of 2015, than it was in 2014.

Brazil is not alone. The average exchange rate of most currencies in Latin America have also fallen sharply against the dollar. Even Mexico, which is enjoying comparatively good economic performance, has seen its currency slide.

Most video surveillance equipment sold in Latin America is imported by overseas vendors rather than manufactured in the region.

Even if these vendors have managed

to grow their revenues in Latin American currencies, their revenues have often declined once converted back into their home currencies.

IHS estimated that just two of the top 15 vendors of video surveillance equipment in Latin America in 2014 were headquartered in the region.

Prospects for the future of the Latin American market look brighter. IHS forecasts that the market will grow by more than 10 per cent in 2016.

However, exchange rates could have a big effect again. Their role in the market should not be underestimated. n

Tough conditions in Latin America

Page 18: Security Focus - Vol 34 No 1 - January 2016

16 SECURITY FOCUS | VOL 34 NO 1 2016

The PCX46 APP is a professional high-security hybrid solution that incorporates IP video cameras and

automation control outputs. It is designed and manufactured to deliver maximum security and convenience for installers and end-users alike.

Your security, monitoring and notifications are all accessible on the go from anywhere in the world thanks to the PyronixCloud and HomeControl+ App infrastructure.

SO, WHAT ARE THE BENEFITS FOR YOU, THE INSTALLER?Firstly, there are great financial advantages as the PCX46 APP can help you earn more, save more and even upsell systems.

Thanks to remote programming and diagnosis of systems through the PyronixCloud infrastructure, using Insite UDLsoftware,youwon’thavetomakeasmany call-outs, which saves you the costs of sending out your engineers to site.

Furthermore, this also allows you to

establish recurring revenue streams by offering PyronixCloud management services.

There is no need for on-site set-up of static IP addresses or configuration of network connections thanks to Dynamic IP. Instead you simply set up an account on PyronixCloud.com, which in turn makes installation more efficient than ever before.

There are a whole host of upgrade options available with the full Pyronix award-winning two-way wireless range, which makes upsell easy.

Not only that, but you can also add your company logo to the HomeControl+ App through your PyronixCloud account and all apps connected to the systems you manage through your account will display your logo; guaranteeing brand consistency throughout your installations.

BUT WHAT ARE THE ADVANTAGES OF THE SYSTEM FOR YOUR END- USER?With the HomeControl+ App, they are afforded complete control over their property

from anywhere in the world. They can check the status of every individual device on their system, check their entire event history, arm and disarm areas, receive notifications and more.

There are a whole host of wireless add-on solutions that make the PCX46-APP easily upgradeable, such as the full range of Pyronix award-winning two-way wireless range – add sensors, detectors, sirens and much more.

If they add the IP HD internal pan and tilt and external static HomeControl+ video cameras to their system, they can view live streamed video directly on their smart devices.

This ability means they can look into their property when an alarm is activated, as well as monitor their pets while they are away or at work, check on an elderly relative who lives on their own or even check their children have arrived home safely from school.

The PCX46 APP system can be tailored for any and all needs to deliver the best possible solution for you, the installer, and your customers. n

SPOTLIGHT ON IP SOLUTIONS

So, what are the benefits for you the installer?

Page 19: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 17

COMPANY NEWS

New sales executive for South AfricaPaxton, a UK market leader of electronic access control and door entry solutions, has recently appointed Gary Smith to the position of sales executive for South Africa.

Gary will be supporting and assisting distributors and installation companies in South Africa, via

training and business development, ensuring their product knowledge is up to date and they are taking advantage of the sales opportunities available with Paxton systems.

Gary joins Paxton with a wealth of experience gained from more than 20 years in the security industry, previously holding roles at SAGEM (Morpho), Gallagher (CARDAX) and Gunnebo.

Commenting on the appointment, Dan Drayton, sales manager, says: “Gary joining

us at Paxton is great news for the company and our installers. He brings with him such diverse and relevant experience, and I look forward to his injection of energy into our already brilliant sales team.”

Gary is looking forward to the challenges ahead and says: “I am excited to join Paxton, a company with a solid reputation as a leading manufacturer, with a proven track record in South Africa.

“As one of the largest consumers of access control and biometric products globally, South Africa is poised to be a lucrative region for Paxton and I look forward to embracing new opportunities with the comprehensive product range.

“I hope my experience will complement the already dedicated sales team resulting in the continued success of Paxton’s installer relationships throughout the region.”

To find out more about the company visit www.paxtonaccess.co.za, or to register your

interest in attending one of Paxton’s training dates in South Africa, e-mail [email protected]. n

WD, a Western Digital company and a worldwide leader in storage solutions, and Milestone Systems, the security industry leader in video management software,

recently announced its partnership to deliver video surveillance solutions to businesses and consumers.

Milestone Arcus Surveillance software will be available on WD’s My Cloud Business Series [1] network-attached storage (NAS) systems with the new My Cloud OS 3 operating system and is expected to be available on other My Cloud systems, such as the My Cloud Expert Series, in the future.

Milestone Arcus is a video surveillance platform designed to be embedded in hardware devices, such as compatible WD My Cloud NAS systems, to deliver customised, market-ready solutions.

Integration of Milestone Arcus Surveillance software into My Cloud OS 3 enables users to transform their versatile My Cloud Business Series NAS systems into networked video recording systems for their offices or homes.

By simply downloading the Milestone Arcus Surveillance software through the My Cloud App Store, users can install up to 16 cameras, with the first two camera licences free on My Cloud Business Series products.

Additional camera licences will be available from selected WD authorised distributors.

“Technology advances are enabling

video surveillance to be broadly accessible to businesses and individuals across the globe,” said Sven Rathjen, vice-president of marketing for WD’s Content Solutions business.

“Together, WD and Milestone are focused on making video surveillance easy with a solution they can quickly set up and rely on for years. This is one of many applications available on My Cloud NAS systems, including home automation, media streaming and back-up solutions.”

Said Lars Nordenlund, vice-president of Incubation and Ventures at Milestone Systems “Milestone is proud to partner with WD to offer a video surveillance solution for My Cloud NAS systems.

“WD customers can now take advantage of the simple set-up with automatic camera discovery, intuitive interface, remote viewing, mobile access and other monitoring features in Milestone Arcus software.”

WD’s My Cloud Business Series NAS systems are available through select distribution partners, e-tailers and direct market resellers worldwide. The new My Cloud OS 3 operating system will be available to My Cloud NAS system as an update. n

WD and Milestone partner

Gary Smith

Sven Rathjen

Page 20: Security Focus - Vol 34 No 1 - January 2016

18 SECURITY FOCUS | VOL 34 NO 1 2016

COMPANY NEWS

Garmin launches high-definition dash cam GARMIN Southern Africa has expanded its automotive range of products by announcing the Garmin Dash Cam Series, your eye witness that never blinks!

Dash Cam is a high-definition camera that mounts to any vehicles’ windscreen to continuously record a 120 degree wide-angle view of the road while driving.

Once the Dash Cam is installed, the camera remains fully automated and it will start recording when the engine is turned on and stop when it is turned off.

Dash Cam records your drive in full HD 1080p, with incident detection that saves footage of collisions and incidents automatically. It is available in two models – Dash Cam 10 and Dash Cam 20 (includes GPS).

The rechargeable battery allows a user to use the snapshot feature to take still images, and even remove the dash cam from the vehicle to capture collision damage.

“Garmin Dash Cam is like a personal

eyewitness that never misses an incident and provides proof of what happens on the road,” said Walter Mech, chief executive officer of Garmin sub-Saharan Africa.

“It is fully automated and gives drivers peace of mind knowing should any event occur, it will be captured with detailed information like time and date imbedded into the recording.

“Additional features, such as an internal microphone and GPS, add valuable context to the video files that puts the Dash Cam in a league of its own.”

Dash Cam records in full HD 1080p, 720p or WVGA video files in a continuous loop to a 4 GB microSD card which comes included with the camera. However, users can use a microSD card up to 32 GB should they require more memory.

The Dash Cam has an integrated gravity sensor, more commonly known as a G-Sensor, which automatically detects sudden movements whether it is braking

or a collision and saves the current, last and next recordings in order to preserve a complete record of the event.

With the built-in GPS receiver in the Dash Cam 20, time-stamps and geo-tags are imbedded into all footage, so users can view exactly where and when events occurred.

Information like latitude, longitude, date, time, speed and direction of travel will also be included. There is also an integrated microphone which will provide users with the option of recording audio inside the vehicle.

The 2,3-inch colour display makes it easy to position the camera in the car and review video. Dash Cam is easy to install and comes with a suction cup mount for the windscreen and a vehicle power cable.

Should a user want to use the Dash Cam for a close-up view of vehicle or property damage while in an incident, users can remove Dash Cam from the vehicle and take photos. n

Page 21: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 19

COMPANY NEWS

Uniclox completes first Bodet installationWHEN it comes to running a business, big or small, key to profitability is the judicious management of the company’s resources, particularly its employees.

Careful management of time and attendance, productivity, keeping track of annual leave and sick leave is key to guarding the bottom line.

Many businesses are waking up to the fact that punched time cards were, for long, the backbone of many industrial business, but do not necessarily provide the level of timely and accurate reporting that HR and line managers need to ascertain an employee’s productivity and performance.

Uniclox Technologies, a leader in solutions-based resource management has recently completed its first Bodet Software-Uniclox installation since the partnership deal was signed between the two companies in 2015.

Bodet Software is a French subsidiary of the Bodet Group, a European leader in time and attendance management.

Uniclox is a landmark South African company that celebrated its 70th year in business in 2015.

The successful completion was done for Guestro Casting and Machining, a foundry located in Benoni South, which belongs to Dorbyl Ltd, which is now part of the Naledi Inhlanganiso industrial group.

Derek Udemans, marketing manager for Uniclox, said the completion is a good

news story for Uniclox and Guestro which is experiencing something of a renaissance having been modernised and expanded.

“The 60-year old foundry until recently was rather run-down and out of date and was viewed as something of a taxable write off by the Dorbyl group.

“However, the foundry had a change in ownership in 2012/2013 and the new owners of Guestro Casting and Machining have now brought the foundry back to life by, among others, refurbishing the casting line and purchasing new furnaces to increase casting capacity from 120 tons to 200 tons per day.

“It now has a large staff complement of 300 and Uniclox was called in to help with a new state-of-the-art resource management system,” he said.

“We were asked by Guestro to provide them with a full resource management package. We responded by supplying them with 17 of Bodet’s famous Kelio Prio V2 Proximity card readers. Out of these terminals eight are used for access control and nine for time and attendance points throughout the foundry.”

Mr Udemans says the terminals are controlled using Kelio Integral R2 software. This offers the client with three shift auto detection, a full real-time system, as well as visitor’s access control.

It took Uniclox four weeks to fully install the system.

“We are happy to report the system is

already in use and running smoothly and is being monitored by three dedicated HR personnel. We are now looking forward to the next Bodet Systems installation.

“This successful completion is the first step to many more Uniclox-driven solutions for our customers.

“Our systems interface with up to 41 different payroll systems, so no matter what your requirements are, we can find a solution,” Mr Udemans said. n

Page 22: Security Focus - Vol 34 No 1 - January 2016

20 SECURITY FOCUS | VOL 34 NO 1 2016

By Fred Mitchell, security software division manager, Drive Control

Corporation

Cybercrime has burgeoned into probably the most profitable black market industry today, and no user

of the Internet is immune to the vast array of increasingly sophisticated attacks that prevail.

Protecting users, as well as organisations as a whole, from becoming victims of cybercrime activities means staying up to date with the latest threats and trends in this growing industry.

As the saying goes, forewarned is fore-armed, and by understanding the nature of the threats and how they are perpetrated, people can be better equipped to identify them before falling prey to attack.

The Symantec Internet Security Threat Report, compiled using the Symantec Global Intelligence Network, as well as comprehensive vulnerability databases and spam, phishing and malware data, offers insight into emerging trends in cybercrime activities.

Armed with the data and analysis provided in the report, enterprises, small businesses and consumers alike are empowered to more effectively secure their systems against

current and future threats.The 2015 report highlights the fact that

both the threat landscape and Internet security as a whole are constantly changing and evolving, with the year 2014 notable for the extended reach of vulnerabilities, increased speed of attacks, and more malicious code than ever before.

The high profile nature of attacks in 2014 stood out, with an increase in data breaches perpetrated by outside attackers. One of the most prominent trends to emerge in the report is the fact that cyber defences and reaction times are not keeping pace with attacks, with zero-day attacks remaining the method of choice for advanced attacks.

In addition, while attackers continue to streamline and upgrade their techniques, organisations are still making use of old, outdated tactics to combat threats. This means that cyber attackers can breach defences in ways that cannot be anticipated due to lack of insight.

While targeted attacks have become increasingly sophisticated, non-targeted attacks still make up the majority of malware, and these attacks too have increased in number and have adapted to continue to breach defences.

Digital extortion is another growing trend, with ransomware and crypto-ransomware becoming increasingly common, effectively holding people’s devices, files, photos and digital media hostage until they pay ransom for the decryption key.

Another trend highlighted in the report is the movement toward social media platforms and apps as methods for the delivery of malware.

While e-mail remains the primary vehicle for the spread of malware, users manually sharing social media scams cause these attacks to be spread rapidly, since people are more likely to click on a link shared by someone who is a friend.

Mobile platforms too are beginning to grow as a means for attack, since the majority of users do not associate cyber threats with their

smartphone or tablet. As a result, cyber security on these devices

is minimal and often even the basic security precautions are not followed.

According to the report, in 2014 a total of 17 per cent of all Android apps were actually malware in disguise, representing more than a million apps.

Furthermore, grayware apps, which do inadvertently harmful things like track user behaviour, accounted for 36 per cent of all mobile apps.

Alongside the emergence of mobile threats, the Internet of Things is an on-going security issue, with attacks on devices such as Point of Sales systems, ATMs, and home routers increasing in 2014.

With the number of network-connected devices increasing, these attacks show the potential for threats against an increasing range of end points, from cars to medical equipment.

Exacerbating the vulnerability of connected devices is a lack of adequate privacy policies and encrypted data transmission, and prevailing user behaviour of not understanding what they have agreed to give access to on their phones when downloading an application.

What all of these trends and statistics convey is the fact that the threat landscape today is very different to that of even just a single year ago.

Attackers are constantly evolving their methods and leveraging new vulnerabilities on an ever-broadening variety of devices, and in order to ensure adequate protection, defences need to adapt.

Both businesses and end-users need to change their behaviours and understand the nature of the threats that exist, to ensure they do not fall victim to costly and compromising data breaches and other attacks.

The 2015 Symantec Internet Security Threat Report highlights critical shifts in the threat landscape to help drive future security efforts in the most effective direction possible. n

Key trends from 2015 security threat report

SPOTLIGHT ON CYBER CRIME

Page 23: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 21

By Rory Young, portfolio manager: support and enabling services, T-Systems South

Africa

AS the world has evolved to become increasingly digital and globally connected, ICT security has become correspondingly more complex. With digital pathways into and out of organisations expanding rapidly, business today have little visibility of their vulnerabilities and exposure.

As a result, security solutions must be seamlessly integrated and work in harmony to provide a holistic view and remediation capability across the entire ICT landscape.

Identity and access management (IAM) is a fundamental and critical facet of a connected security eco-system, as controlling the confidentiality, integrity and authorisation around data is key.

There are, however, a number of challenges that exist around this, chiefly that many businesses do not know who is authorised to access what data when, why and from where.

As mobility becomes increasingly pervasive, mobile identity and access services are emerging as the ideal solution for a wide range of IAM challenges.

In the past, IAM was a far less complex task than it is today. Organisations only had to manage identity and access to a few internal business applications, the corporate intranet, and maybe an HR or finance system. It was well understood, contained and controlled, which in turn made for fairly simple management.

Today, however, there has been an “Internet” revolution – a “digital revolution” (termed the third industrial revolution) – and with it the number of applications used is exploding.

Organisations no longer have only a handful of applications and access to manage, but dozens, as “digital business” becomes everyday business.

As businesses embrace cloud, Software as a Service (SaaS), mobility and modern collaboration in order to remain relevant and competitive, they add layers of complexity when

it comes to managing and controlling identity and access.

Traditional network and corporate boundaries no longer exist, physical boundaries are eroded, organisational structures and hierarchies are challenged.

Keeping pace is a challenge, and organisations frequently struggle to control and manage access to the plethora of loosely coupled applications.

Ultimately, this exposes the business, its corporate IP and customer data to very real risk.

In order to mitigate this risk, remain compliant with regulations around confidentiality of data, access thereto and integrity thereof, organisations need greater control over who is accessing what, where and when across the now extended corporate boundary.

In addition, existing domain IAM and security policies need to be extended into the SaaS cloud services, as well as mobile devices and applications.

They also need to be able to provide assurances that adequate security is provided, meets the needs of business, and can stand up to the scrutiny of any audit.

Organisations need solutions that not only provide identity and access controls, but also rich analytics in order to better understand how data is being accessed and consumed by various roles across their organisation.

This allows for more informed and durable decisions to be made regarding IAM strategy, policy and target investment on an on-going basis.

Given that the “digital revolution” is characterised by the proliferation of ubiquitous connectivity and computing that enables almost anyone to access information, systems and services from anywhere, any time and on any device, the digital business has become the norm.

Mobile devices are everywhere, and thus offer the ideal platform for effective IAM in a digital, connected world.

Mobile identity and access services can integrate the multiple forms of physical proof of identity we use today, from driver’s licences and identity cards to passports, loyalty cards and more, with online digital identities into a single mobile application or network.

Identity document (ID) credentials and attributes are securely stored in a central location for various forms of interaction that require ID verification.

These include visualisation and validation of ID, credentials, qualifications, licences and

so on, system and application log-in, physical access control, document approval with trusted digital signatures and more.

For example, IDs can be verified using voice verification combined with a PIN code and a scanned QR code to allow access to sites, systems or applications. Logging in to online services will no longer require a password, but the system will send a PIN number, which could be combined with a personal PIN to strengthen authentication and even with a time-sensitive image.

This removes one of the most vulnerable areas of security – the password – that is only too easy to forget, reset or steal. Employee badges, physical keys and security tokens become unnecessary, closing up a security vulnerability that exists when employees leave an organisation.

In addition, provisioning of staff, both temporary and permanent, can become far quicker, easier and more secure.

Mobile identity and access services give organisations greater control and assurances over security and protection in multiple areas.

Centralising IAM provides organisations with a real-time global view of identity and access activity. Multi-factor authentication capability not only ensures enhanced security, but also allows for richer and deeper activity analysis.

In addition, proactive alerts can be set. For example, if a user appears in two locations at the same time or if there are consecutive uses where the locations are too far apart based on the access time recorded.

Data can also be analysed to determine who is accessing what, where and when, which enables organisations to continually drive optimisation and efficiencies across the enterprise security landscape.

In a digital, globally connected world, security has become more complex than ever, and security strategies need to adapt in order to keep pace.

Identity and access management is critical not only for protecting physical assets but also important business data and more.

Not only does this improve security, it also provides additional data that can be used for analysis and improvement.

However, with more applications and forms of identity than ever before, consolidating and centralising this for enhanced security, convenience and analytical capability is essential.

Mobile identity and access services provide the ideal platform to enhance security, provide effective IAM, and deliver advanced analytics that can be used to drive more intelligent business and security decisions. n

Mobile identity ensures security in digital revolution

SPOTLIGHT ON CYBER CRIME

Page 24: Security Focus - Vol 34 No 1 - January 2016

22 SECURITY FOCUS | VOL 34 NO 1 2016

ON THE MARKET

It is imperative in this day and age that a digitally savvy individual has the appropriate storage solution to ensure that

their data is safe at all times. Many people are making use of external hard drives as a back-up in the event of device theft, PC crashes or accidental damage.

Should this happen, you could lose years of digital content that can never be retrieved.

That is why WD has launched the My Passport Refresh campaign, an update on the My Passport range of portable hard drives, as a way of offering consumers two upgraded My Passport devices with increased features and functionality, all the while ensuring data is safely stored and protected.

These two revamped devices include the My Passport Ultra and the My Passport for Mac.

Let’s take a closer look.The My Passport Ultra delivers up to 3

TB of storage with USB 3.0 performance, all compressed into a cool, ultra-compact design.

The My Passport Ultra is now also available in four fresh, stylish colours – Classic Black, Brilliant White, Wild Berry and Noble Blue.

You can ensure the safety of your data with password protection and hardware encryption, as well as WD SmartWare Pro software which enables local and cloud backup.

This product is the ideal companion for anyone who needs to take their digital content on the road and wants to look good doing it.

The My Passport for Mac provides up to 3 TB of seamless storage for performance, designed for the aesthetic conscious Mac users.

The device is secure and reliable, safeguarding your creative life and you can protect your important files with Apple Time Machine back-ups.

There is the option to set up a password, that only you know, to activate 256-bit hardware encryption and add an extra layer of security.

It’s stylish, compact design will complement your on-the-go lifestyle and this will become your Mac’s new best friend.

To top it all off, WD has also introduced a new optional accessory – the WD Grip Pack – a soft band which encircles the drive, offering consumers an easy way to personalise and protect their My Passport drives.

The available colours include Fuchsia, Grape, Sky, Smoke and Slate. n

A closer look at WD’s revamped hard drives

PAXTON, a global brand of electronic access control and door entry systems has announced the addition of a new distribution partner in South Africa, Regal Security Distributors, making it even more straightforward for installers and integrators to buy from its innovative product range.

Established in 1981, Regal Security Distributors has been serving the South African security industry for more than 34 years.

Today, Regal offers its customers the choice of more than 4 000 security products and peripherals, available from 24 branches throughout the country.

Andrew Levell-Smith, access control product manager, from Regal said: “We are

pleased to be able to add Paxton’s range of access control solutions to our security product selection. Paxton’s reputation for training and their market-leading swop-out warranty match Regal’s commitment to continually provide comprehensive world-class security solutions to our customers.”

Paxton has become industr-renowned through its efforts to listen to and exceed the expectations of its customer base.

The company pays exceptional attention to the development of high quality products, customer care and support. Its products have simplicity at their core, ensuring installers find them easy to install, use and maintain.

Dan Drayton, Paxton sales manager EMEA, said: “We believe in making life easy for our

installers by ensuring our products are simple to install, use and maintain, offer seamless integration opportunities and that they are readily available to purchase.

“Regal’s market expertise and widespread reach across South Africa make it an excellent addition to our already strong distribution network.”

Customers who are new to the Paxton product range can take advantage of a free access control workshop.

The Paxton training programme is designed to be comprehensive and simple, giving installers the opportunity to take part in practical sessions to familiarise themselves with the company’s innovative product range. n

Paxton grows distribution base

Page 25: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 23

ON THE MARKET

DO we need to become sharpshooters like Annie Oakley or are there better solutions to combating the rise in residential robberies, burglaries and theft?

A recent survey by Statistics South Africa (hometimes.com, 2015) focused on South Africans’ perception of crime in South Africa and asked what crime they most fear falling victim to.

The results from the survey showed that more than “six out of every 10 households (65,9 per cent) perceived the most common crime to be housebreaking/burglary, followed by home robbery (42,7 per cent), street robbery (42,1 per cent) and pick-pocketing or bag-snatching (26 per cent).”

And they weren’t far off. The latest SAPS crime stats (saps.gov.co.za and businesstech.co.za, 2015) indicate that although the number of reported burglaries at residential premises has dropped by -2,3 per cent to 253 716 in 2015, the number of robberies at residential premises has increased by 5,3 per cent to 20 281 and so too has the number of robberies with aggravating circumstances (robber had a firearm or other deadly weapon) which rose by a staggering 8,5 per cent to 129 045 filed reports in 2015.

The number of reported thefts that are not mentioned elsewhere in other categories has only dropped by a mere -0,8 per cent to 360 541. Is it any wonder families are implementing the best possible intruder detection technology available on the market to keep themselves, their loved ones and hard-earned property safe? And what security measures are the best for you?

If you are located in a suburb or metropolitan area, chances are you already have the needed infrastructure to set up and deploy a comprehensive security solution.

Unfortunately, you also have a much larger likelihood of being exposed to or become a victim of the criminal elements just based on statistics and the sheer volume of people living and/or working in areas like this.

One of the main ways people try to deter criminals from robbing residences or business is by controlling the access to these premises.

They need access cards/tags, surveillance cameras, guards, etc. A lot of these security measures can be neutralised (fences can be

jumped, guards can be overwhelmed and people can be tailgated) but video surveillance still remains king when it comes to intruder detection.

An excellent example of a security solution that incorporates video footage is NUUO’s Intelligent Video Surveillance (IVS) Solution. NUUO’s IVS system provides advanced, accurate video analytics for both IP and analogue cameras.

The IVS engine can track, classify and analyse the behaviour of individual or group of objects over long distance to greatly improve parameter security and monitoring efficiency.

By installing NUUO I/O, IVS (Intelligent Video Surveillance), or accessing control solutions at critical zones, such as the door, window, garage door, warehouse, safe box, etc, when an intruder enters these areas the event is detected.

Events can then be reported automatically to the responsible security guard via the NUUO event management solution, synchronised with the NUUO CMS installed by the contracted security company.

Also, NUUO Push Notification can send playback video of the event immediately to the family host’s mobile phone. Thus, both the security company and the homeowner can respond to events promptly to minimise losses even though there is no one at home.

NUUO’s IVS system boasts intelligent surveillance features such as:• People Counting: This counting solution includes a bi-directional

line-crossing filter, suitable for counting people in busy doorways and entrances.

• Vehicle Counting: This counting solution captures statistics on vehicle flow, it also provides an estimated speed of the vehicle.

• Stabilizer: In environments where camera stability is an issue, this feature will compensate for any movement to provide a clear view.

• Tamper Detection: Detects any event that significantly changes the field of view of the camera, such as loss focus, a camera being covered up, etc.

• Appear and Disappear: Used to detect people appearing or disappearing through a doorway but ignores people passing by in front of the doorway.

• Dwell: Objects that dwell inside a zone for longer than the pre-defined amount of time will trigger an alarm such as loitering people.

• Tailgating: Object tailgating is defined as two objects crossing a virtual line or zone within in a pre-defined time frame. This can be used with vehicles or with people in an access control environment.

• Presence Filter: (Tripwire) Detects when an object or individual has penetrated the defined perimeter.

• Enter and Exit: An alarm is triggered when an object crosses from the outside to the inside of a detection zone. Conversely, an alarm is triggered when an object crosses from the inside to the outside of a detection zone.

• Stopping: Objects that are stopped inside a zone for longer than the defined amount of time will trigger an alarm.

• Direction: Objects that travel in the configured direction (within the limits of the acceptance angle) through a zone or over a line trigger an alarm. n

Annie, get your IP surveillance done

Page 26: Security Focus - Vol 34 No 1 - January 2016

24 SECURITY FOCUS | VOL 34 NO 1 2016

INTERNATIONAL NEWS

The Siemens Building Technologies Division has introduced a new version of its comprehensive Desigo CC building automation platform.

From one app, this platform offers mobile remote access to building automation and alarm management.

In addition, Desigo CC supports additional communications protocols and sub-systems and offers enhanced IT security.

One highlight of the new Desigo CC version is the app for smartphones and tablets, which offers comprehensive remote access to the building automation system and allows direct operation of all disciplines in the building.

The Desigo CC app gives building managers complete mobility. They can access building disciplines, optimise settings and monitor performance quickly and easily – any time and anywhere.

In addition, alarms are delivered to the app, allowing managers to take action right away and ensuring uninterrupted availability of all building systems.

The app has an intuitive user interface and runs on any Android- or iOS-based smartphone or tablet.

As an open platform, Desigo CC has

always made it easy to integrate third-party devices. With new Modbus and OPC libraries, Siemens has now expanded the range of communications protocols supported by Desigo CC, allowing the integration of even more comfort and fire safety devices.

The new Desigo CC version provides native support for a variety of additional sub-systems, including AlgoRex, Simatic S7, SiPass integrated, Siveillance VMS and Milestone Xprotect.

For video surveillance, the platform offers video recording and playback, powerful search and analysis functions as well as many other new features.

In addition, Desigo CC now also has a migration path for existing Siclimat installations, Apogee Insight and NCC (Network Command Centre) as well as an interface to the Siemens Navigator energy management platform.

Desigo CC also offers important IT security enhancements. For example, all communication between clients and servers is encrypted, the platform integrates easily into a DMZ (Demilitarised Zone), and it is compatible with all popular firewalls.

Since access rights for each user are defined by role and responsibilities, Desigo CC provides maximum protection for all collected data. Desigo CC now also supports certificates from trust centres

such as Verisign. This, plus the optimised server

architecture, ensures maximum security. Desigo CC is currently the only building automation platform on the market to combine the management of all building disciplines in one system.

Thanks to a number of supported communication protocols, including BACnet, SNMP, Modbus, SSL and OPC, third-party products are easily integrated into the open platform.

The new web service interface now allows the exchange of values, messages and alarms with other software products, such as third-party ERP systems.

The flexible and intuitive user interface can be customised as needed and adapted to the roles, rights and language of each user. Currently, 18 languages are supported, four of which can be installed simultaneously.

The platform offers powerful analytics which greatly facilitate trouble-shooting and error correction, as well as optimising the performance of specific disciplines.

Among other things, Desigo offers the well-known Green Leaf functionality which makes it easy to spot inefficient operations at a glance.

Desigo CC is scalable and can be deployed in small and simple buildings, as well as large and complex structures. n

Manage all disciplines from a central platform

Page 27: Security Focus - Vol 34 No 1 - January 2016

INTERNATIONAL NEWS

S2 SECURITY, a leader in IP- based access control, video management and mobile security management systems, has introduced S2 MicroNode Plus, the company’s latest two- reader panel for S2 NetBox series web- based access control and event monitoring systems.

New product features include a Power over Ethernet Plus (PoE+) power option, storage for up to 150 000 cardholder credentials, and faster processing.

“S2 Security routinely updates its hardware products to reflect compelling new technology,” said John L. Moss, chief executive officer, S2 Security.

“S2 MicroNode Plus, with its more powerful processor, expanded credential memory, and increased PoE capacity is an excellent

example of this.” S2 MicroNode Plus supports up to two

portals, four relay outputs with wet/dry selection, four inputs with programmable levels of supervision, and one temperature input.

In addition, the appliance includes a 12VDC auxiliary output for powering devices such as a PIR Request to Exit input or an alarm sounder.

Access control and events from connected devices are aggregated to the S2 NetBox web interface for centralised system management.

S2 MicroNode Plus is also an ideal retrofit solution. The seamless upgrade from legacy two- reader panels can be made without replacing readers, inputs or lock outputs. n

S2 Security’s S2 MicroNode Plus

WURLDTECH, a GE-owned company and leader in cyber security for operational technology (OT), recently announced the availability of OpShield, a security solution designed to protect critical infrastructure control systems and assets.

The solution provides protection from cyber threats and vulnerabilities found in operational environments, and delivers defence-in-depth for oil and gas, power generation, transportation, healthcare and other industries.

The emergence of OT security Given the high profile nature of data breaches in recent years, IT security has received more focus and investment than OT cyber security.

Yet control systems found in OT environments have unique and often embedded technology design, and have been traditionally managed in environments separate from IT.

This has made conventional cyber security solutions ineffective for OT operators and system integrators.

With the advent of the industrial Internet, operational environments are increasingly connected to a variety of IT networks, which adds complexity and risk. Even if not connected to the Internet, critical assets are vulnerable to insider threats and mishaps that can cause disruption and costly downtime.

Adding urgency to the issue, nation-state hackers and other malicious actors continue to find new ways to infiltrate networks and applications that underlie critical infrastructure.

According to Paul Rogers, president and chief executive officer of Wurldtech and general

manager of GE Industrial Cyber Security: “Critical infrastructure assets such as turbines, generators, and nuclear reactors were not necessarily designed to keep up with today’s advances in technology.

“But the rapid increase of cyber attacks on industrial operations in the past few years clearly demonstrates that securing critical infrastructure is becoming one of the high priorities for companies and organisations.”

Based on a 2015 report written by Ponemon and commissioned by Raytheon (Raytheon and the Ponemon Institute), 66 per cent of organisations are not ready to address OT security issues.

Organisations are putting their most critical assets at risk in an environment not suitable for IT practices.

Security built specifically for OTAs a security solution for OT, OpShield provides protection at the point where traditional or next-generation firewalls (NGFW) leave off-typically in a demilitarised zone (DMZ) environment.

But, unlike NGFWs, OpShield is designed specifically for OT environments to provide defence-in-depth for embedded systems and industrial assets connected to SCADA, distributed control systems (DCS), and safety systems that communicate in multi-vendor, complex environments.

“Cyber attacks are growing at a dramatic pace, and yet most companies are ill prepared,” said Sid Snitkin, ARC Advisory Group. “The stakes are high for industrial organisations as attacks on systems that control plants and

infrastructure impact safety, business continuity and the environment.

“Air-gapping strategies are inadequate, and traditional IT security won’t do the job. It’s critical that operators get OT security right.”

By addressing vulnerabilities in real-time without taking systems offline, OpShield enables critical infrastructure to remain operational and protected from the increasing number of threats.

“Traditional security solutions are great for protecting data that transpires across an IT network, but have no native support for the protocols and commands used in an industrial control network,” said Nate Kube, chief technology officer and founder of Wurldtech. “It is simply too easy for bad actors to infiltrate and exploit vulnerabilities in this environment if the network isn’t protected by technology that can help detect threats at that level.”

OpShield solution features:• Designed specifically to protect industrial

assets, applications, and communications across process control networks.

• Provides protocol inspection engine that adapts to OT command and protocols.

• Identifies and alerts or blocks at the application command level, helping reduce the threat surface.

• Offered as a modular solution that scales to accommodate complex and harsh ICS and SCADA environments.

• Delivered as easy-to-install appliances that can be implemented in tap or in-line mode minimising disruption to production. n

OpShield, a security solution for operational technology

SECURITY FOCUS | VOL 34 NO 1 2016 25

Page 28: Security Focus - Vol 34 No 1 - January 2016

26 SECURITY FOCUS | VOL 34 NO 1 2016

INTERNATIONAL NEWS

Johnson Controls and Tyco merge

JOHNSON Controls (NYSE: JCI) and Tyco (NYSE: TYC) have announced that they have entered into a definitive merger agreement under which Johnson Controls, a global multi-industrial company, will combine with Tyco, a global fire and security provider, to create a leader in building products and technology, integrated solutions and energy storage.

Under the terms of the agreement, which has been unanimously approved by both companies’ Boards of Directors, Johnson Controls shareholders will own approximately 56 per cent of the equity of the combined company and receive aggregate cash consideration of approximately $3,9 billion.

Current Tyco shareholders will own approximately 44 per cent of the equity of the combined company.

“The proposed combination of Johnson Controls and Tyco represents the next phase of our transformation to become a leading global multi-industrial company,” stated Alex Molinaroli, chairman and chief executive officer, Johnson Controls.

“With its world-class fire and security businesses, Tyco aligns with and enhances the Johnson Controls buildings platform and further positions all of our businesses for global growth.

“Through this transaction, we will also expand our ability to further invest globally, develop new innovative solutions for customers and return capital to shareholders.”

Said George R. Oliver, chief executive officer, Tyco: “The combination of Tyco and Johnson Controls is a highly strategic, value-enhancing step that brings together the unique strengths of two great companies to deliver best-in-class building technologies and services to customers around the world.

“We believe this transaction will allow us to better capture opportunities created by increased connectivity in homes, buildings and cities.

“Joining forces with Johnson Controls pairs our leading established businesses with robust innovation pipelines and extensive global footprints to deliver greater value to customers, shareholders and employees of both companies.”

Under the terms of the proposed transaction, the businesses of Johnson Controls and Tyco will be combined under Tyco International plc, which will be renamed “Johnson Controls plc.”

The companies expect that shares of the combined company will be listed on the New York Stock Exchange and trade under the “JCI” ticker.

Upon the closing of the transaction, the combined company is expected to maintain Tyco’s Irish legal domicile and global headquarters in Cork, Ireland.

The primary operational headquarters in North America for the combined company will be in Milwaukee, where Johnson Controls has been based.

Strategic rationaleThe combined company brings together best-in-class product, technology and service capabilities across controls, fire, security, HVAC, power solutions and energy storage, to serve various end-markets including large institutions, commercial buildings, retail, industrial, small business and residential.

The combination of the Tyco and Johnson Controls buildings platforms creates immediate opportunities for near-term growth through cross-selling, complementary branch and channel networks, and expanded global reach for established businesses.

The new company will also benefit by combining innovation capabilities and pipelines involving new products, advanced solutions for smart buildings and cities, value-added services driven by advanced data and analytics and connectivity between buildings

and energy storage through infrastructure integration.

As a result, the new company will be able to better partner with its customers to help improve the overall performance and operations, enhancing the experience for their own customers in areas such as comfort, safety and accessibility.

In addition, the combined company will have one of the largest energy storage platforms with capabilities including traditional lead acid, as well as advanced lithium ion battery technology serving the global energy storage market.

Johnson Controls is in the midst of a strategic transformation to become a top-quartile multi-industrial company with leadership in attractive spaces connected to core growth platforms in buildings and energy storage.

This focus has resulted in significant portfolio changes over the past few years including the divestiture of its automotive electronics and interiors and global workplace solutions businesses, as well as the acquisition of Air Distribution Technologies and the formation of Johnson Controls – Hitachi joint venture.

The company announced in July 2015 that it was planning to spin off Adient at the beginning of the fiscal year 2017.

Tyco has transformed from a diversified holding company to a streamlined operating company with a focused and leading portfolio in fire and security that will complement Johnson Controls’ buildings platform.

Tyco combines best-in-class products with a world-class installation and service capability delivered across a global network of branches.

The company’s core strengths include security and fire systems integration, commercial security monitoring, as well as fire, security and life-safety products. n

Alex Molinaroli

Page 29: Security Focus - Vol 34 No 1 - January 2016

INTERNATIONAL NEWS

SECURITY FOCUS | VOL 34 NO 1 2016 27

WITH PService3, Dallmeier presents a new version of its configuration and administration tool which is now even more powerful, structured and flexible.

PService3 is a powerful application for the convenient configuration and administration of comprehensive Dallmeier VideoIP systems. PService3 scans the video network for Dallmeier devices, automatically detects them and displays them in an overview.

If desired, PService3 provides a list of camera previews, filtered according to various criteria. Recording systems and cameras can thus be administered conveniently.

The comprehensive functions range from changing of IP addresses and updates of the integrated software to the direct opening of the configuration dialogs.

Modern and flexiblePService3 is even more flexible than its predecessor version, and even more readily adaptable to the specific requirements of any user.

The user interface has been revised extensively and is characterised by a completely modernised and clearly structured design which provides more clarity. It can also be adapted individually to the user’s needs.

Depending on the work environment, the user interface can be switched between a dark and a bright design and particular functions and views can

be summarised and arranged individually within the programme window.Furthermore, the users are able to add and arrange tools according to

individual needs, always keeping an eye on the essentials.

Advanced representationThe appearance of Panomera® multifocal sensor systems has been expanded extensively in the current version of the PService3 software. Detailed information can now be viewed for each module of a Panomera® camera.

Furthermore, extensive tools for the convenient maintenance and configuration of MFS systems are available.

With the Panomera® AutoCalibration software tool (to be installed separately), module transitions can quickly and easily be automatically calibrated.

All in onePService3 is compatible with all Dallmeier network cameras, including the Panomera® multi-focal sensor systems, as well as all Dallmeier recording systems as of generation 4.

The variety of integrated tools makes PService3 a central and complete service instrument. n

New version from Dallmeier

HIKVISION, a leading supplier of innovative video surveillance products and solutions, has teamed up with the Memphis Police Department (MPD) to protect the residents of Memphis in Tennessee, in the US.

Using a variety of security solutions to prevent and reduce crime, since 2007 MPD has deployed hundreds of analogue and IP cameras and dozens of recorders from Hikvision to keep the city safe.

With incidents now being captured on high-quality video, MPD has noted an increase in criminal cases being taken to court. The city has also built a real time crime centre where they can view live video feeds and provide critical information to officers before they arrive at a crime scene.

Kenneth Shackleford, former technology manager at MPD who has subsequently retired from the force, developed a surveillance programme to monitor Memphis’ critical infrastructure.

“I started looking at ways we could start installing cameras throughout the city,” Mr Shackleford said.

He is now vice-president of sales at SkyCop, a trusted local integrator that specialises in law enforcement, military, and private industry installations.

The SkyCop team and MPD decided on three configurations: cameras attached to utility poles, cameras attached to buildings, and mobile trailers.

To date, the police department has established a network of about 600 of Hikvision’s analogue and IP bullet and dome PTZ cameras throughout the city.

Building exteriors, for example, are often outfitted with the DS-2CD2032-I, a 3 MP outdoor bullet camera with a body type that allows for easy mounting. This camera also offers line crossing and intrusion detection features to make surveillance more effective.

These features can send alerts to the police when someone enters or

leaves a designated area. Hikvision’s DarkFighter PTZ camera (DS-2DF8223I-AEL) is also in use.

With robust smart features such as detection of region entrance/exit and detection of audio loss, the DarkFighter thrives in challenging low-light environments and features 120 dB wide dynamic range, as well as a sharp 23x optical zoom lens with autofocus.

These elements help provide crystal-clear colour images day and night – making the DarkFighter ideal for 24-hour surveillance applications.

The footage from these cameras, which are placed at strategic points around Memphis, flows back to the MPD real time crime centre (RTCC). The RTCC is used to enhance security for city assets and infrastructure and has become a sophisticated way for the city to fight crime.

“We have a video wall with dozens of monitors and we can pull up any camera feed in the city,” said Sergeant Joseph Patty, who has succeeded Mr Shackleford as the video surveillance manager for MPD.

“We have about 30 workstations out on the floor that can view the video wall or pull up any camera feed.”

MPD has experienced noticeable benefits from their citywide surveillance programme.

“We have four or five cases prosecuted each week thanks to these incidents being captured on video,” Sergeant Patty said.

“Plus, we’re able to dispatch calls from the RTCC and view live video before the officer even arrives on the scene.”

Jeffrey He, president of Hikvision USA and Hikvision Canada, commented on the increased prevalence of Hikvision products in the law enforcement and safe cities verticals.

“As more municipalities use video surveillance to protect their citizens, they turn to Hikvision for highly scalable, easy to use products at the forefront of state-of-the-art video surveillance technology. Hikvision is pleased to play such an important role in keeping Memphis safe.” n

Hikvision teams up with Memphis Police

Page 30: Security Focus - Vol 34 No 1 - January 2016

28 SECURITY FOCUS | VOL 34 NO 1 2016

LAW & SECURITY

The start to 2016By Peter Bagshawe

On 28 August 2015 there was an historic meeting between President Zuma with members of his Executive

and Chief Justice Mogoeng Mogoeng with his deputy, as well as Judge President of the Provincial Divisions and the Judge President of the Supreme Court of Appeals.

The background to this was the robust debate between the African National Congress, parliamentarians, members of the Tripartite Alliance and the judiciary particularly following the failure of the Government to respect the decision of Gauteng Judge President Dunstan Mlambo compelling State to detain Sudanese President Omar al-Bashir while he was in the country for an African Union Summit.

There was (and possibly still is) a degree of discomfort with regard to the steadfast manner in which the judiciary has been enforcing the terms of the Constitution and their protection of the separation of powers and existence of juristic institutions, including Section 9 institutions.

The meeting ended with the parties affirming the separation of powers and agreeing a way forward to ensure open co-operation.

It is likely that the agreed mechanism and the parties themselves will be put to the test early in 2016 as a number of high profile matters and people appear before the Courts.

A brief selection of these matters that will be heard or be put before Commissions of Enquiry should probably start with Riah Phiyega, currently suspended National Police Commissioner who was suspended by the President on 14 October, 2015 in line with recommendations made by the Farlam Commission.

The Farlam Commission sat over a 3-year period and reviewed evidence relating to the deaths of 34 striking and protesting miners at Marikana following action by the South African Police Services during August 2012.

The Commission recommended an inquiry into Ms Phiyega’s fitness to hold office, found the then Commissioner had allowed political considerations to influence her decisions and function as police commissioner, had failed to act in an impartial manner and that she had misled the Commission in relation to her evidence while the Commission was critical of the calibre of her evidence.

Separately, the Parliamentary Police Committee found in November 2015 that Ms Phiyega had failed to comply with the Police Act, as well as the Labour Relations Act, and was guilty of gross misconduct, fraud and perjury with the last being in relation to a

warning she allegedly gave to General Arno Lamoer about an investigation into alleged corruption and fraud on his part.

The Parliamentary Police Committee recommended a Board of Enquiry be convened on these findings.

Finally, in early February 2016, the Independent Police Investigative Directorate (IPID), announced that criminal charges of defeating the ends of justice would be brought against Ms Phiyega and former North West Police Commissioner, Zukiswa Mbombo (who has now retired) relating to their alleged obstruction of the Farlam Commission of Inquiry’s investigations into the Marikana shootings.

This combination of investigations, enquiries and prosecution will require decisions and judgments that will likely have implications for not only the main protagonist (Phiyega) but also the South African Police Services and government.

The second high-profile matter involves the recently appointed head of Special Prosecutions Services, Nomgcobo Jiba, and Specialised Commercial Crime head, Lawrence Mrwebi, of the National Prosecution Authority (NPA) with the majority of the focus being on Advocate Jiba.

Freedom Under Law (FUL) have applied for an interdict precluding both from continuing their functions based on their alleged failure to protect crime fighting institutions and to uphold the rule of law, with particular reference to their failure to charge former Crime Intelligence head Richard Mdluli with fraud and corruption.

Separately, Ms Jiba has received negative comments from a number of judges representing four benches in respect of three matters that have been adjudicated.

The first of these relates to Mr Mdluli, where Deputy National Director of Public Prosecutions Willie Hofmeyr has taken the unusual step of submitting an affidavit that provides background detail of the internal opinions and mechanisms within the NPA that relate to the review of this matter and the support internally for the laying of charges against Mr Mdluli.

The Democratic Alliance has approached the Western Cape High Court for an order that Ms Jiba be suspended on the allegations that she has previously lied to the court, failed to comply with court orders, ignored deadlines, failed to exercise an independent mind, and did not allow irrational and illegal actions to be subject judicial scrutiny.

The General Council of the Bar of South Africa is proceeding with its case in the Pretoria

Division of the High Court to strike Ms Jiba off the advocate’s roll or, alternatively, to bar her from practising as an advocate.

The application relates to three matters with the first of these being Ms Jiba’s decision not to prosecute Richard Mdluli referred to above.

The second matter relates to the decision by Ms Jiba to continue with the prosecution of the head of the KwaZulu-Natal Hawks, Major-General Johan Booysen for fraud. Here, the court was critical of the basis of the decision to institute prosecution and this in turn led to the then Head of the National Prosecuting Authority, Mxolisi Nxasana laying fraud and perjury charges against Ms Jiba.

The third matter relates to the Supreme Court of Appeals adverse finding on the standard and information contained in the affidavit submitted by Ms Jiba relating to the application by the Democratic Alliance for access to the “spy tapes” that were instrumental in the decision to withdraw corruption charges against Jacob Zuma.

The General Council of the Bar is also proceeding with actions against the head of the Specialised Commercial Crimes Unit, Lawrence Mrwebi, and the North Gauteng Director of Public Prosecutions, Sibongile Mzinyathi.

The above are a powerful combination of actions against high profile members of the South African Police Services and National Prosecuting Authority that will fbe heard by various divisions of the High Courts or be investigated by Committees.

Given that the appointments of all of the individuals involved are, ultimately, at the pleasure of the State President and that the President has been joined in the Freedom Under Law action as a respondent the focus is again going to shift to perceptions of the role, function and operation of the Courts as opposed to the wishes or direction taken by the Executive.

Here, the Constitution, rule of law and separation of powers, will be the arbiter applied by the Courts and decisions taken will be in terms of Court’s authority.

The acceptance of any decisions and, more importantly, the adoption of the decisions by the government will be an acid test of the relationship between the parties and the outcome of the meeting of the judges and Executive referred to above will be put to the test.

PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia

and a Bachelor of Laws degree from the University of the Witwatersrand.

Page 31: Security Focus - Vol 34 No 1 - January 2016
Page 32: Security Focus - Vol 34 No 1 - January 2016

SU

BS

CR

IBE

TO

To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: [email protected]

p Yes, please, I would like to subscribe to Security Focus. (Cost: R650,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide.

p Enclosed please find cheque to the amount of R...............................

p Please start my subscription from the..........................................issue.

Do you require a tax invoice pYes pNo (If yes, one will be sent to you on receipt of your payment.)

NB: Please make cheques payable to Security Publications SA (Pty) Ltd

Name: ...................................................................................... Signature:...................................................................................................

Date: ...........................................Company: ................................................................. Position:.................................................................

Address ...................................................................................................................................................................Code:. .........................

Tel:.............................. ...........................................................................Fax: ...............................................................................................

BANKING DETAILS:

First National Bank, Kloof

Branch Code: 221526

Account Number: 50730011968

Account Name: Security Publications SA (Pty) Ltd

30 SECURITY FOCUS | VOL 34 NO 1 2016

INDEX OF ADVERTISERS

Advertiser Page No.

E-mail Website

Active Track 19 [email protected] www.activetrack.co.za

Axis Communications SA Pty Ltd 1 [email protected] www.axis.com/outdoor

Deggy SA 11 [email protected] www.deggy.co.za

Elvey Security Technologies 5 [email protected] www.elvey.co.za

Guard Track 6 [email protected] www.guardtrack.co.za

Hikvision OBC [email protected] www.hikvision.com

Morpho South Africa 13 [email protected] www.morpho.com

Omega Risk Solutions OFC [email protected] www.omegasol.com

Paxton Access Limited 7 [email protected] www.paxtonaccess.co.za

Plaslope 31 [email protected] www.plaslope.com

Pyronix Limited IFC www.pyronix.com

SASA IBC [email protected] www.sasecurity.co.za

Securex 29 [email protected] www.securex.co.za

Vol 34 No 1

Page 33: Security Focus - Vol 34 No 1 - January 2016

SECURITY FOCUS | VOL 34 NO 1 2016 31

CALENDAR

Tel: +27 (0) 11 452-1115Fax: +27 (0) 11 452-3609E-mail: [email protected]: www.plaslope.com

TAMPER EVIDENT SECURITY BAGS

l Reliable, permanent, special security closure to show evidence of tamperl The closure system shows evidence of tamper by freezing, heat, aqua and solvent l The bags are manufactured from high strength coextruded LDPE clear or opaque filml Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available )l Bags have a unique sequential number or barcodel For security purposes the bags are printed along the edge of the side seals

SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY

Under Licence to

DEBATINTM

LOCAL EVENTS: 2016May 24-26: SECUREX 2016. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: [email protected]

May 24-26: A-OSH EXPO SA 2016. Venue: Gallagher Convention Centre, Midrand, Johannesburg. More information: Joshua Louw. Tel: (011) 835-1565. E-mail: [email protected]

September 4-7: CAMPROSA CONFERENCE. Venue: Fairmont Zimbali Hotel, North Coast. More information: John Tunstall. Tel: (028) 313-1711. Cell: 082 566 6898. E-mail: [email protected]. Website: www.camprosa.co.za

INTERNATIONAL EVENTS: 2016April 12-14: LAAD Security 2016. Venue: RioCentre, Rio De Janeiro, Brazil. Website: www.laadsecurity.com.brApril 13-15: CAIPS 2016. Venue: Venue: Almaty, Kazakhstan. Website: www.ite-exhibitions.com/CAIPSApril 17-21: SPIE DCS Defence + Security. Venue: Baltimore Convention Centre, Baltimore, United States. Website: www.spie.orgApril 18-21: DSA 2016. The VVIP Show for Defence & Security. Venue: Kuala Lumpur, Malaysia. More information: www.dsaexhibition.com May 4-6: Asian Securitex Hong Kong. Venue: Hong Kong Convention & Exhibition Centre, Hong Kong. Website: www.asiansecuritex.com

June 21-23: IFSEC 2016. Venue: Excel Centre, London Dockland, UK. Website: www.ifsec.co.ukNovember 14-16: IFSEC Arabia. Venue: Riyadh, Kingdom of Saudi Arabia. Website: www.ifsec.co.ukNovember 16-17: Sectech Denmark 2016. Venue: Scandic Copenhagen Hotel, Copenhagen. Tel: +45-33-14 35 35. Website: www.armedia.se/

INTERNATIONAL EVENTS: 2017January 22-24: Intersec 2017. Venue: Dubai International Convention & Exhibition Centre, Dubai, UAE. More information: E-mail: [email protected]. Website: www.intersecexpo.com/April 4-7: LAAD Defence & Security Venue: RioCentre, Rio De Janeiro, Brazil. Website: www.laadsecurity.com.brJune 2-5: KADEX 2016 – Kazakhstan Defence Expo. Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan. E-mail: [email protected] or [email protected]. Website: www.kadex.kzSeptember 11-13: Kazakhstan Security Systems. Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan. More information: Jack Yasakov. E-mail: [email protected] 12-15: DSEI 2017. World’s leading defence and security exhibition. Venue: ExCeL, London. For more information: www.DSEI.co.ukNovember 6-9: Defence & Security 2017. Venue: Impact Exhibition Centre, Bangkok, Thailand. More information: Kallie Vlok. Tel: (012) 428 2075. E-mail: [email protected]

Calendar of conferences, events and exhibitions of interest to the security industry

– both local and international

Page 34: Security Focus - Vol 34 No 1 - January 2016

32 SECURITY FOCUS | VOL 34 NO 1 2016

PSIRA — Private Security Industry Regulatory Authority, Eco Park, Centurion. Tel: (012) 003 0500/1. Independent Hotline: 0800 220 918. E-mail: [email protected] Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vice-chairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member).APPISA – Association for Professional Private Investigators SA, Box 8064, Minnebron 1549. Cell: 073 371-7854 or 072 367-8207. Fax: 086 689-0166. E-mail: [email protected]. Website: www.appelcryn.co.za. President: Ken Appelcryn. Secretary: Dianne.ASIS International — Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060. Tel: (011) 652-2569. Website: http://www.asis155jhb.webs.com/ President/Chairperson: Johan Hurter. Secretary: Chris Cray. ASIS International — Chapter 203: Cape Town – South African security professionals. President/Chairman: Yann A Mouret, CPP. Secretary: Eva Nolle. Tel: (021) 785-7093. Fax: (021) 785-5089. E-mail: [email protected]. Website: www.asis203.org.zaBAC — Business Against Crime, Box 784061, Sandton 2146. Chairman: James Fitzgerald. Tel: (011) 883-0717. Fax: (011) 883-1679. E-mail: [email protected]. Eastern Cape: Box 40078, Walmer 6065. Tel: (041) 373-6401. Fax: (041) 373-6402. E-mail: [email protected]. Western Cape: 12th Floor Picbel Arcade, Strand Street. Tel: (021) 419-2044. Fax: (021) 419-2066. E-mail: [email protected] KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001. Tel: (031) 207-8273. Fax: (031) 207-3900. Provincial manager: Jody Nair, e-mail [email protected] Mpumalanga: Box 430, White River 1240. Tel: David Pretorius (general manager) (013) 751-3188. Fax: (013) 744-3555. Cell: 083 273-5515. E-mail: david@bac_mp.co.za; or Ed Coombes (chairperson) 082 807-3916, fax (013) 752-6002, e-mail: [email protected]. North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300; Charles Kendall (managing director) tel/fax: (014) 592-3591, e-mail: [email protected]. Limpopo: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: [email protected]. Free State: Box 784061, Sandton 2146. Tel: (011) 883-0717; fax (011) 883-1679; e-mail: [email protected] — Campus Protection Society of Southern Africa. President: Roland September. Tel: (021) 650-4858. E-mail: [email protected]. Vice President: Derek Huebsch. Tel: (041) 504 2490. E-mail: [email protected]. Executive Secretary: John Tunstall. Tel: (028) 313 1711. E-mail: [email protected]. Web: www.camprosa.co.za.CENSEC — Centre for the Study of Economic Crime. Director: Louis de Koker. Tel: (011) 489-2134. E-mail: [email protected] — Cape Insurance Surveyors Association. Shahid Sonday (021) 402-8196. Fax: (021) 419-1844. E-mail: [email protected]; or Mike Genard (021) 557-8414. E-mail: [email protected] — Disaster Recovery Association of Southern Africa, Box 405, Saxonwold 2132. Chairman: Grahame Wright, Tel. (011) 486-0677, Fax (011) 646-5587. Secretary/ Treasurer: Charles Lourens, Tel. (011) 639-2346, Fax (011) 834-6881. EFCMA — Electric Fencing and Components Manufacturers Association, Box 411164, Craighall 2024. Tel: (011) 326- 4157. Fax: (011) 493-6835. Chairperson: Cliff Cawood 083 744-2159. Deputy chairperson: John Mostert 082

444-9759. Secretary: Andre Botha 083 680-8574.ESDA — Electronic Security Distributors Association, Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. Chairperson: Lee-Ann Andreka. Secretary: Shirley James. Website: www.esda.org.zaESIA — Electronic Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Fax: 086 570 8837. Cell: 082 773-9308. E-mail: [email protected] or [email protected]. Web: www.esia.co.zaFDIA — Fire Detection Installers Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: 087 808 7527. Fax: 086 518 4376. E-mail: [email protected]. Website: www.fdia.co.za President/Chairperson: Matt Kielty. Secretary: Jolene van der Westhuizen. FFETA — The Fire Fighting Equipment Traders Association, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374/(011) 455-4126. E-mail: [email protected]. Website: www.ffeta.co.za. Chairperson: Astrid Wright. Vice-chairperson: Meshack Gabeni.FPASA — Fire Protection Association of Southern Africa, Box 15467, Impala Park 1472. Tel: (011) 397-1618. Fax: (011) 397-1160. E-mail: [email protected]. Web: www.fpasa.co.za. General Manager: David Poxon.GFA — Gate & Fence Association, Box 1338, Johannesburg 2000. Tel: (011) 298-9400. Fax: (011) 838-1522. Administrator: Theresa Botha.HCSA — Hotel & Casino Security Association, Box 91728, Auckland Park 2006. Chairman: Dick Glanville, Tel: (011) 447-2700, Fax: (011) 447-3276. Vice-chairman: Frans Joubert, Tel: (011) 898-7333. Secretary/Treasurer: Graham Bendell, Tel (011) 728-4405; Cell 082 699-2392.HSA — Helderberg Security Association, Box 12857, N1 City Parow 7463. Tel: (021) 511-5109. Fax: (021) 511-5277. E-mail: [email protected]. Website: www.command.co.za. Chairperson: Stephen van Diggele.IFE — Institution of Fire Engineers (SA). Treasurer: A.E. Greig, Box 1033, Houghton 2041. Tel/Fax: (011) 788-4329. E-mail: [email protected] Website: www.ife.org.za. President: John Khoza Mpiyakhe. Secretary: Lindi Mujugira.ISA — Insurance Surveyors Association, Box 405, Saxonwold 2132. Chairman: Graham Wright (011) 486-0677. Vice-chairman: Alan Ventress. Secretary: Alex dos Santos.LASA — Locksmiths Association of South Africa, Box 4007, Randburg 2125. Tel: (011) 782-1404 Fax: (011) 782-3699. E-mail: [email protected] Website: www.lasa.co.za President/Chairman: Alan Jurrius. Secretary: Dora Ryan.NaFETI — National Firearms Education and Training Institute, Box 181067, Dalbridge 4014. Chairman: M.S. Mitten. Vice: Ken Rightford (033) 345-1669. Cell: 084 659-1142.NaFTA — The National Firearms Training Association of SA, Box 8723, Edenglen 1613. National Chairman: Peter Bagshawe. Tel: (011) 979-1200. Fax: (011) 979-1816. E-mail: [email protected] — Policing Association of Southern Africa. Tel: (012) 429-6003. Fax: (012) 429-6609. Chairperson: Anusha Govender, 082 655-8759.PSSPF — Private Security Sector Provident Fund. Contact: Jackson Simon. Cell: 072 356 6358. E-mail: [email protected]. Website: www.psspfund.co.za

SAESI — Southern African Emergency Services Institute, Box 613, Krugersdorp 1740. Tel: (011) 660-5672. Fax: (011) 660-1887. President: DN Naidoo. Secretary: Mrs S.G. Moolman. E-mail:[email protected] — South African Insurance Association, Box 30619, Braamfontein 2017. Chief Executive: B. Scott. Tel: (011) 726-5381. Fax: (011) 726-5351. E-mail: [email protected] — South African Intruder Detection Services Association, Association House, P O Box 17103, Benoni West 1503. Tel: (011) 845-4870. Fax: (011) 845-4850. E-mail: [email protected] Website: www.saidsa.co.za President/Chairman: Johan Booysen. Secretary: Cheryl Ogle.SAIS — South African Institute of Security, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157 or 0861 111 418. Fax: 086 518 4374/(011) 455-4126. E-mail: [email protected]. Website: www.instituteofsecurity.co.za. Chairman: David Dodge. Vice-chairman: Mike Verster. Administrative Manager: Rosemary Cowan.SAN — Security Association of Namibia, Box 1926, Windhoek, Namibia. Administrator: André van Zyl. Tel: +264 61 205 2264. Fax: +264 61 205 2350. E-mail: [email protected] — South African National Security Employers’ Association, Box 62436, Marshalltown 2107. Administrators: SIA. Tel: (011) 498-7468. Fax: 086 570 8837. E-mail: [email protected]. SAPFED — Southern African Polygraph Federation. President: Ben Lombaard 083 793-1152. Secretary: Amelia Griesel 082 786-3347. E-mail: [email protected]. Website: www.sapfed.orgSAQCC FIRE — South African Qualification Certification Committee, Postnet Suite 86, Private Bag X10020, Edenvale 1610. Tel: (011) 455-3157. Fax: 086 518 4374. E-mail: [email protected]. Website: www.saqccfire.co.za Management Committee: Chairman: Brett Jones. Vice-Chairman: Duncan Boyes. SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer. Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty. Vice-Chairperson: Laura Swart.SARPA — South African Revenue Protection Association, Box 868, Ferndale 2160. Tel: (011) 789-1384. Fax: (011) 789-1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co.SDOA — Service Dog Operators Association, Box 49554, Hercules 0030. Tel: (012) 376-2152/3. Fax: (012) 376-2359. E-mail: [email protected] Chairperson: Mr F. van Kraayenburg. Tel: (012) 376-2266.SIA — Security Industry Alliance, Box 62436, Marshalltown 2107. Tel: (011) 498-7468. Chief Executive Officer: Steve Conradie. Website: www.securityalliance.co.zaSKZNSA — Southern KwaZulu-Natal Security Association. Tel: (039) 315-7448. Fax: (039) 315-7324. Chairman: Anton Verster – 082 371-0820.VESA — Vehicle Security Association of South Africa, Box 1468, Halfway House 1685. Tel: (011) 315-3588/3655. Fax: (011) 315-3617. General Manager: Niresh Reddy.VIPPASA — VIP Protection Association of SA, Box 41669, Craighall 2024. Tel: 082 749-0063. Fax: 086 625-1192. E-mail: [email protected]. Website: www.vippasa.co.za. Enquiries: Chris Rootman. Cell: 082 749 0063.E-mail: [email protected]

OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS

SECURITY ASSOCIATION OF SOUTH AFRICA (SASA)

SASA OFFICE BEARERSSuite 147 Postnet X2, Helderkruin 1733

National President: Costa DiavastosCell: 082 498-4749E-mail: [email protected]

National Chairman: Chris LaubscherCell: 082 441-4092E-mail: [email protected]

National Deputy Chairman: Marchel CoetzeeCell: 084 440-0087E-mail: [email protected]

REGIONAL OFFICE BEARERSGauteng: Franz VerhufenE-mail: [email protected]: 082 377 0651

KwaZulu-Natal: Gary TintingerE-mail: [email protected]: 084 429 4245

Western Cape: Dave WaywellE-mail: [email protected]: 083 261 3059

ADMINISTRATIONNational Administrator: Tony Botes Cell: 083 272 1373E-mail: [email protected]: 0866 709 209

Accounts: Yolandi Evans Cell: 061 470-8736E-mail: [email protected]: 0862 124 142

DIRECTORY

Page 35: Security Focus - Vol 34 No 1 - January 2016
Page 36: Security Focus - Vol 34 No 1 - January 2016