72

Click here to load reader

Risk UK May 2014

Embed Size (px)

DESCRIPTION

Screening is essential for security, whether it is bags at an airport, mail into a business or new employees. In the May edition we look at all three areas and offer advice on what measures can be taken to improve security. Also we consider the cost of not going green, better business resilience, IFSEC/Firex and much more.

Citation preview

Page 1: Risk UK May 2014

Security and Fire Management

Mail screening and staff protectionPower over Ethernet benefitsThe cost of not cutting carbon IFSEC and Firex previews (part one)

May 2014

Cover may14_001 06/05/2014 11:19 Page 1

Page 2: Risk UK May 2014

Sophistication is not about size The Integriti Security Management System is an IP connected access control

and intruder security system that offers sophisticated centralised management

for both small systems on a single site, or large systems distributed across the

country or across the globe.

With a growing list of new installations take a moment to think of what you’re missing! The Integriti system offers an

advanced suite of software,

hardware and integrated

solutions to deliver complete

management of your entire

integrated system.

Have you tried Integriti yet?

+44 (0) 845 470 5000Inner Range Europe LimitedUnits 10-11 Theale Lakes Business Park

Moulden Way, Sulhampstead

Reading, Berkshire RG74GB UNITED KINGDOM

[email protected]

a4 integriti 0ne page UK.indd 1 4/12/2013 8:40 am

Project1_Layout 1 05/02/2014 17:39 Page 1

Page 3: Risk UK May 2014

Contents37 Detecting discrepanciesRecruitment advice from Traci Canning of First Advantage

39 The incidentals of incident handlingBy Udi Segall of NICE Systems

41 Zero hour contractsPeter Webster, CEO of Corps Security, discusses the benefit ofzero hour contracts in the private security sector

42 Public noticeHere we look at PEARS, smart solutions for Europe-wide PublicAlert System

44 Business resilience 101Teon Rosandic, VP EMEA, xMatters looks at measures forbuilding business resilience

46 Technology in Focus & Risk in ActionA round-up of some of the latest new products and case studies

56 Preventing heart attacksSeth Berman, executive managing director and UK head of StrozFriedberg looks at the Heartbleed threat

58 Authentification - an updateIan Kilpatrick, chairman Wick Hill Group, looks at the currentstate of authentication

60 Ahead in the CloudWhen is it worth moving to the cloud? asks Roger Keenan is themanaging director of City Lifeline

66 Two years to prepare...Why businesses must act now to prepare for EU data protectionreforms by Christian Toon of Iron Mountain

67 The Risk UK Directory

May 2014

3www.risk-uk.com

ISSN 1740-3480

Risk UK is published 12 times a year and is aimed at riskmanagement, loss prevention and business continuityprofessionals within the UK’s largest commercialorganisations.

© Pro-Activ Publications Ltd, 2014All rights reserved. No part of this publication may bereproduced or transmitted in any form or by any means,electronic or mechanical, including photocopy, recording, orany information storage and retrieval system, without thewritten permission of the publisher.

The views expressed in Risk UK are not necessarily those ofthe publishers.

Risk UK is currently available for an annualsubscription rate of £78.00 (UK only)

RISK UKPO Box 332,Dartford DA1 9FF

Managing Editor Andy Clutton Tel: 0208 295 8308E-mail: [email protected]

Contributing Editor Geny Caloisi E-mail: [email protected]

Design & Production Matt JarvisTel: 0208 295 8310 Fax: 0870 4292015E-mail: [email protected]

Advertisement Director Paul AmuraTel: 0208 295 8307 Fax: 01322 292295 E-mail: [email protected]

Administration Tracey BealeTel: 0208 295 8306 Fax: 01322 292295 E-mail: [email protected]

Managing Director Mark Quittenton

Chairman Larry O’Leary

Editorial: 0208 295 8308Advertising: 0208 295 8307

6 NewsNews stories for security and fire professionals

11 AppointmentsSome of this month’s movers and shakers

13 First class protectionAdam Bernstein looks at modern mail screening solutions andthe protection they provide

19 Five to watch in access controlMike Sussman, Chairman of the Access Control section for theBSIA, discusses how 2014 looks set to be a year of evolution

20 Crossing the lineGeny Caloisi looks at transport security

23 From planes to trainsWhat can our railways learn from airport security? asks DanielWan, marketing leader UK, Honeywell Security Group

25 Energy efficiency for good healthThe CRC Energy Efficiency Scheme is designed to improveenergy efficiency and cut emissions and it could result in finesfor organisations that don’t change their ways

27 London awaits...IFSEC International moves to ExCeL London this year. We look atevent and what the show has to offer from 17-19th June

31 New venue, new attractionsThe IFSEC and Firex events are at a new venue for 2014, but thiswill not be the only new aspect of the three days

33 UK security on the world stageThe BSIA’s Amanda Caton explains the value of overseas eventsin boosting the UK security sector’s profile

35 The CCTV power playPower over Ethernet in security, by Chris Hay, Allied Telesis

44 - How good is your bouncebackability?

EDIT contents_riskuk_may14 06/05/2014 16:59 Page 3

Page 4: Risk UK May 2014

Evacuate everyone

Signalling Solutions

Sonos Pulse EN54-23 Fire Beacons

Stand P200

abblle tto ordder now!!abblle tto ordder now!!AAvaiillaAAvaiilla

EDIT comment may14_riskuk_may14 06/05/2014 17:03 Page 1

Page 5: Risk UK May 2014

5December 2012

www.risk-uk.com

Comment

At the time of going to press, UK media outletswere reporting on the shocking story of a schoolteacher being stabbed during lessons in Leeds.This fatal attack has led to calls for more serioussecurity measures in public areas, but how can itbe managed?

Following the news coverage of serious attacks there are oftencalls to step up security in various public areas. In 1995 whenthe school headmaster Philip Lawrence was stabbed there

was a lot of support for ‘airport-style’ x-ray machines to be putinto schools. In the wake of the Ann Maguire murder in April, thefirst to take place in a UK classroom, the same opinions arebeing put forward. There was also much talk of these scannersbeing installed in train stations after the 7/7 bombings in whichthe terrorists used public transport as a means of carrying theirexplosive devices around London.

While the sentiment behind these calls for scanners isunderstandable, and widely agreed with, the application andmanagement of more heightened security measures is always atricky one for authorities. We all understood the need for raisingthe checks at airports following 9/11 but on joining the queues itwas not long before it became common to hear complaints aboutthe time being taken for travellers to get through the checks.

The public is quick to condemn and quick to forget and it is notlong before the reasons why the queues are happening soonturns to it all being a fuss and too much of a hassle. The sheernumbers of people involved in public area security, be it at anairport, school or train station provides the security industry witha real challenge. How can you apply high levels of securitywithout hindering people going about their daily lives; oncethey’ve forgotten all about their initial demands for the checks inthe first place.

The aviation industry would be the first to admit that after 9/11and subsequent incidents such as the ‘shoe-bomber’ the securityat airports was a little confused as to what was required of it, butit has evolved over the years and the technology being used hasalso helped speed up the process.

The public will never be 100% safe in any environment andauthorities can only do what security managers across the worlddo; compare the risk to the inconvenience and the cost. If allschools are to bring in x-ray scanners for pupils at the start ofevery day then initially I’m sure parents and teachers wouldwelcome it. Give it a few weeks however and the need for kids toleave the house ten minutes earlier than in the past due to thequeues and then the subsequent rise in council tax to pay for thescanners might change the feelings of support for theinstallations.

This is a very tricky balancing act surrounding a delicatesubject. At the moment the threat to teachers and pupils isfortunately very low, although further news announcements willadd to the widespread call for raising security levels. If schoolsdo go down the route of scanners then the experiences of theairport sector will be invaluable and may help provide solutionsthat can take the potential bottlenecks out of the measures.Andy Clutton – Editor

Special measures

Tel: +44 (0)1706 233879

Signalling Solutions

Sonos Pulse Wall

Sonos Pulse CeilingEN54-23 Coverage: C-3-15

EN54-23 Coverage: W-3.1-11.3

EDIT comment may14_riskuk_may14 12/05/2014 11:04 Page 2

Page 6: Risk UK May 2014

News

6www.risk-uk.com

News Mechanical locks still functionalDespite the growing popularity of accesscontrol systems driving the adoption ofelectronic locking devices, mechanical locksare not projected to falter any time soon.Mechanical locks, which are still used tooverride electrical ones in the case of a powerfailure or system error, are forecast to have apositive compound annual growth rate(CAGR) of 3.8 per cent from 2013 to 2017according to IHS.

Adi Pavlovic, analyst for Security & BuildingTechnologies at IHS comments, “Accesscontrol is driving the penetration of electroniclocking devices such as electromagneticlocks, electric strikes, and electronic locks.But this trend will only limit the growth ofmechanical locks in the medium-term; it doesnot necessarily replace them.”

For many end-users, having an onlineelectronic access control solution remainscost prohibitive, so they must continue to relyon mechanical solutions.

Pavlovic adds, “Despite the cost, more end-users are seeing the value of being able tocontrol access rights securely and efficiently,monitor door status in real time, create audittrails and the ability to lockdown all doorsimmediately in the case of an emergency. Asa result, electronic access control solutionsare still forecast to have stronger growthrates than mechanical globally from 2013 to2017 both in terms of revenues and units.

The mechanical lock industry itself isexperiencing an increased penetration ofChinese suppliers into the internationalmarkets. These lower cost suppliers areincreasing their market share in EMEA andthe Americas which is influencing the averagesales price (ASP) of mechanical locksdownward regardless of rising material costs.Chinese suppliers are more prevalent in pricesensitive regions such as Eastern Europe andLatin America, but are increasing theirpartnerships with ‘sister’ companies in the USand Western Europe. The ASP for mechanicallocks globally is anticipated to decline 0.6 percent from 2013 to 2017 as a result.

Overall, the mechanical locks market isslated for positive growth in the medium-term, with strong construction activity inemerging markets and the BRIC countriescontinuing to drive demand for mechanicallocking solutions. However, more maturemarket such as the US and Europe, will seemore of an impact by electronic accesscontrol systems, but cannibalisation shouldbe minimal in the medium term.

Vicon and IQinVision to mergeVicon Industries and IQinVision haveannounced that they have entered into adefinitive merger agreement to create a globalprovider of integrated solutions to the videosecurity market.

The merger has been approved by the boardsof directors of both companies and is subject toshareholder approval, and other customaryclosing conditions. The transaction is expectedto close in Vicon’s September quarter. Underthe terms of the merger agreement, Vicon willissue shares of Vicon common stock toIQinVision shareholders in an all-stock mergerwhereby IQinVision shareholders will ownapproximately 50% of the outstanding commonstock of the combined company. After themerger, Vicon will have approximately9,000,000 shares outstanding.

“Vicon is thrilled to join forces withIQinVision,” said Ken Darby, Vicon Chairmanand CEO. “The Vicon/IQinVision combinationwill yield meaningful operational benefits,together with significant market andtechnological synergies. It’s a logical first stepto strategic growth for both companies.”

Norbain acquires DetectionSuppliesNorbain has announced that it has acquiredDetection Supplies, a supplier of fire alarmand ancillary equipment to the UK fireinstallation market. Detection Supplies willcontinue to operate as a standalonebusiness under the Norbain SD umbrella. Allsales enquiries will be handled directly atthe Detection Supplies offices, based inFordingbridge, Hampshire.

Trevor Saunders, MD and Owner ofDetection Supplies, comments: “I’mextremely pleased to have found such a safehome for the business and the staff. Thismove providesDetectionSupplieswith avery firmfoundationto continueto serve itscustomersand pursueitsexpansionin themarket.

EDIT news may14_riskuk_may14 06/05/2014 23:44 Page 2

Page 7: Risk UK May 2014

Store, manage and control keys, cards and small assets more securely and efficiently with

KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with

detailed reports available. The system will even automatically email transactional information to any

user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys

easier than ever. With our modular design and full scalability, it’s easy to see how we keep making

key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 0115-967-1567

Project1_Layout 1 06/05/2014 17:05 Page 1

Page 8: Risk UK May 2014

News

8www.risk-uk.com

Three new distributors for PaxtonPaxton has announced the addition of threenew distribution partners in the UK with thenews that the company’s product range isnow available through distributors EnterpriseSecurity, Alarm Supplies and Oprema.

Enterprise Security is an independentsingle source security distributor providingCCTV, access control, intruder and fireproducts throughout the UK.

Alarm Supplies is an independentdistribution company with 21 years’experience in security solutions. They workclosely with suppliers to offer qualityproducts to customers located in Scotland,England and Northern Ireland.

Oprema is a multi-brand securitydistributor of IP solutions, CCTV, fire andaccess control, based in Cardiff with anetwork of trade clients across the UK,Ireland, Europe, Africa and the Middle East.

Gareth Johnson, UK Sales Manager atPaxton said: “We look forward to expandingour already excellent distribution basethrough our collaboration with EnterpriseSecurity, Alarm Supplies and Oprema andmaking our products even more accessible.”

Controlling rumours iscrucial to businessA new report advises thatauthorities around the worldshould set up emergencycommunication teams to managethe amount of misinformationcirculating on social media duringdisasters, terrorist attacks andother social crises. A study on theuse of social media in threemajor incidents, including the2008 Mumbai terrorist attack,by Dr Onook Oh, of WarwickBusiness School, Manish

Agrawal, of the University of South Florida, andRaghav Rao, of the State University of New Yorkat Buffalo, revealed that Twitter is emerging asthe dominant social reporting tool to reporteye-witness accounts and share information ondisasters, terrorist attacks and social crises as acollective effort to make sense of what ishappening.

But when it is the online community who arecreating and exchanging the news rather thanofficial news channels, this can not onlyexaggerate the unfolding situation, but alsounintentionally turn it into misinformation,diverting attention from the real problems.

Dr Oh believes authorities or organisationsinvolved in a disaster or terrorist attack need toset up an emergency communication centre toprovide speedy, relevant information on theunfolding crisis and to confirm or dispelmisinformation circulating on social media.

The study, which is the first application ofrumour theory to social media and communityintelligence, analyses three large Twitter datasets: the 2008 Mumbai terrorist attacks, wherea group of gunmen killed 165 and injured 304people, the May 2012 shooting of five people bya gunman in Seattle and the recall of fourmillion cars by Toyota in 2009 and 2010because of a faulty accelerator pedal.

Within minutes of the initial terrorist attack inMumbai, a local resident posted a stream ofpictures on photo sharing website Flickr. Almostconcurrently, a group of people voluntarilyformed a Twitter page with a link to the Flickrsite and spread eyewitness accounts of theterrorist attacks with texts, photos, and links toother sources.

While the flurry of social media activity hadmany positive outcomes, enabling people tocontact family members, encouraging blooddonations and providing eyewitness accounts,it also caused many rumours to circulate.

Dr Oh said: “Natural disasters and crisessuch as terrorist attacks provide the optimumconditions for rumours to spread which can

exacerbate the situation for emergencyresponse operations and cause panic amongstthe public. For example, during the Mumbaiterrorist attacks, the police control room wasflooded with incorrect reports of explosions atleading hotels. Misinformation on the internetwas also influencing what was being reportedon official news channels. In fact, the BBC wasforced to admit they had made a mistake afterusing Twitter coverage of the Mumbai terrorattacks as a source of their official news.

“Given that the motivation of rumouring isfundamentally to make sense of uncertainsituations such that people can deal with apossible threat, the provision of timely andcertain information may lead to successfulcrisis management in partnership withvoluntary online citizens.”

EDIT news may14_riskuk_may14 06/05/2014 23:44 Page 4

Page 9: Risk UK May 2014

Chubb Fire & Security is united in delivering exceptional service to its customers, providing greater access to a wealth of expertise.

Chubb Fire & Security has merged its separately branded businesses in the UK and Ireland to

deliver a richer and more streamlined experience for its customers nationwide. www.chubb.co.uk

© Chubb Fire & Security Limited

www.chubb.co.uk

PERFORMANCE.FOR BEST-IN-CLASS FIRE AND SECURITY SERVICES

UNITED

Project1_Layout 1 06/05/2014 17:07 Page 1

Page 10: Risk UK May 2014

News

10www.risk-uk.com

Acquisitions can sufferhigher security risks thanmergersCompany acquisitions can have adevastating impact on informationsecurity and management.According to a new study byEuropean research company IronMountain, employees of acquiredfirms are more preoccupied with thepotential impact on their role thanwith the need to effectivelyintegrate the information of bothcompanies.

Iron Mountain, a specialist onstorage and informationmanagement, says that the lack of

focus during an acquisition could leaveinformation at increased risk of loss orexposure. The picture is different whencompanies merge, and employees stay focusedon integration and ensuring companyinformation remains well managed.

The top two information concerns ofemployees at acquired firms are: confusion

around responsibilities for managing theinformation (34 per cent) and the prospect ofchange to their information managementsystems (33 per cent). Just over a quarter ofemployees (27 per cent) at acquired firms worryabout consolidating different sets of customeror company records, and less than one in five(17 per cent) worry about how to deal with datadiscrepancies, duplication and overlap.

This contrasts sharply with the concerns ofstaff at the acquiring firm, where 41 per centworry about integrating the two data sets and34 per cent are concerned about the quality ofthe data.

Furthermore, one in three employees ofacquired firms say there are no policies forintegrating records or protecting customer datacompared to just 19 per cent of those at theacquiring firm. Paper records are a seriousconcern, with 44 per cent of newly acquiredfirms saying there is no process for integratingpaper into new digital systems, and 31 per centsaying the same for the storage of the paperarchive.

Charlotte Marshall, MD of Iron Mountain inthe UK, Ireland and Norway says, “Informationmanagement is often an afterthought whencompanies merge. However, given the value ofinformation and the desire of merging firms torationalise cost structures, it should be apriority. Joining forces with or acquiring anotherorganisation provides an opportunity for firmsto re-evaluate their information managementprogrammes and make the changes required todrive consistency, increase security and improveaccess to information.”

The picture for company mergers is verydifferent, with employees at both firms focusedequally on addressing the main aspects ofinformation management. Nearly three quarters(71 per cent) of employees feel supported inrecord integration during a merger, and nearlytwo thirds (62 per cent) feel the same about theprotection of customer data.

Marshall adds, “Our study shows that theemotional impact of acquisitions can causeemployees to lose focus on how information ismanaged. Information on paper is particularlyvulnerable, with many firms having noeffective storage or integration plans in place,thereby leaving potentially valuable data atincreased risk of loss or exposure. Becauseemployees can feel insecure and unsupportedduring times of change, communication is key.Consistent and clear instruction on how todeal with the information challenges aheadwill help employees to understand howinformation should be managed going forward,where the key responsibilities lie, and whatadvantages new information managementprocesses can bring.”

An alliance to deter,detect and illuminateThree UK companies havejoined forces to form the GJDAlliance. GJD Manufacturing,Harper Chalice Group andAdvanced LED Technology (ALT)announced a new strategicalliance where their respectivestrengths and product rangeshave been combined to createa one-stop-shop forprofessional external intrusiondetection.

The new Group, GJD Allianceoffers a total external andperimeter security solutionwith Harper Chalice’s(FenceSecure and WallSecure)systems, GJD ‘s range ofexternal PIR volumetric

detectors and active IR beams together withALT’s illuminators to provide a completeexternal deterrent, detection andillumination solution.

Mark Tibbenham, Managing Director ofGJD said: “I am excited about the Allianceand the real benefits that we bring to ourcustomers. Our combined and integratedproducts seamlessly combine to provide thefirst and second lines of defence and socreate a total perimeter solution and adeterrent to would-be intruders.”

EDIT news may14_riskuk_may14 06/05/2014 23:45 Page 6

Page 11: Risk UK May 2014

People

11www.risk-uk.com

PeopleAnthony CarneySecura Management has promoted AnthonyCarney to Group Head of Research andDevelopment. Anthony, who was previous thefirm’s Head of Engineering, has worked forSecura Management for almost ten years,helping the company develop new alarmsystems under its two brand namesSecurahomes and Pro-tect.

Martin Mann, Managing Director of SecuraManagement states: “Anthony has been key inthe company’s growth. His invaluable experienceand knowledge has allowed us to develop newcutting edge wireless alarm systems andincrease our overall share of the UK’s domesticalarm market. Anthony’s promotion from Headof Engineering to Group Head of Research andDevelopment will enable him to continueproducing cutting-edge systems.”

William MawerThe Board of Image Scanhas announced thatWilliam Mawer has beenappointed as Chairmanand Chief ExecutiveOfficer. William has beenworking as a consultantto the Company for fourmonths and the Board isconfident that his appointment will significantlystrengthen the Company at this time.

William brings considerable experience of thex-ray industry having worked for 13 years withSmiths Group plc. For most of that time he heldsenior executive positions in Smiths Detectionand more recently he has acted in a consultancycapacity for a number of other technologycompanies, providing input on strategy andbusiness development. William has keystrengths in product development and strategicplanning. His experience in the x-ray securitysector will be instrumental in supporting thedevelopment plans and driving forward the salesand marketing strategy. The newly appointedChairman and Chief Executive Officer, said: “I amdelighted to be joining the Board of Image Scanat such a pivotal time in its PLC history.”

Ali AlealiFireVu is further strengthening its businessdevelopment team with the appointment of Ali Alealiwho moves from parent company AD Group where hewas a training and communications specialist. In hisnew position as business development manager Ali willconcentrate on the petrochemical, chemicals, food anddrink processing industries.

Pauline Norstrom, Chief Operating Officer of ADGroup, comments: “Ali possesses extensive businessdevelopment experience in the chemicals, food and drinks industries as well asstrong academic credentials, including lecturing up to degree level, in industrialchemicals and food production applications. VDS is a proven technology withgreat potential and Ali’s appointment will further help FireVu realise ambitiousgoals for 2014 and beyond.”

Carl Martin & Rod ButlerWard Security has announcedtwo appointments to expand itsSouth West and Londonoperations. The company hasrecruited Carl Martin who joinsthe company with over twenty-five years’ experience in securitymanagement as the newAssociate Director for the SouthWest region and Rod Butler(Pictured) who after a careerspanning more than ten years brings in-depthindustry knowledge to the London team.

David Ward, Managing Director of WardSecurity said: “Both Associate Directors bring awealth of experience and industry knowledge tothe company, which will undoubtedly makethem key additions to the team. They are bothvery passionate about growing our clientportfolio as well as ensuring our high standardsin security delivery are maintained.”

Trevor TurnerLodge Service hasappointed Trevor Turneras Director ofOperations. He hasalmost 35 years’experience working withboth securitytechnology andguarding servicesacross retail and distribution sectors as wellas the financial services market.

Trevor began his security career withGroup 4 Total Security before becoming Headof Profit Protection for Comet where heremained for almost 15 years. He has morerecently been working within the mannedguarding industry where he has heldpositions of Director of Commercial andDirector of Operations.

Simon Chapman, managing director ofLodge Service says: “Trevor joins thecompany at an exciting time and will beresponsible for strategically managing theoperational businesses in order to positionus for continued growth - with a focusdirectly on customer service whilst stillseeking out new innovative ways ofdelivering an integrated security solution toour customers and prospects.”

EDIT people may14_riskuk_may14 06/05/2014 23:25 Page 3

Page 12: Risk UK May 2014

People

12www.risk-uk.com

Guy OtherSitexOrbis has appointed Guy Other as its newChief Executive. With over 20 years’ experienceon the b2b market in a broad range ofcommercial sectors, Guy most recently servedas Chief Operating Officer at Stalbridge LinenServices and a main Board Director at JohnsonsApparelmaster.

“We are delighted that Guy has joinedSitexOrbis. We were impressed by his clearstrategic vision and commercial expertise whichhe has used to shape, direct and turnaroundthe operational performance, market share andprofitability of several blue chip companies,”said Layton Tamberlin, SitexOrbis’s acting MDand part-owner.

“I am very pleased to be joining SitexOrbis atsuch a crucial time for the business,” addedGuy. “The situation is similar to when I joinedJohnsons and I look forward to working with ourcommitted investors and the fantastic peoplewithin the business to deliver great service toour customers and some significant growth overthe coming years.”

Kitty Van Der SluisMilestone Systems hasbeen evolving itspartner initiatives overthe years, includingmore resources beingallocated to enhancecollaborations withdistributors. To helplead these activities inEurope, the MiddleEast and Africa, KittyVan Der Sluis is thenew Director of Sales Distribution in EMEA.

“I am looking forward to continuestrengthening the relationships with ourpartners, making use of my previousexperience from the IT and security business. Iam familiar with many of the challenges ourdistribution partners face in driving growth, andMilestone has the right components to addressthese,” says Kitty.

Thomas Lausten, VP of Sales in EMEA, said:“Kitty has gained valuable experience insupporting and improving sales anddistribution channels in Europe, the MiddleEast and Africa in her previous positions at theinternational corporations Anixter and Tyco.Moreover, Kitty has comprehensive knowledgeabout the IP video surveillance business froman earlier position at Genetec.”

John DownieVisual Management Systems has announced the

appointment of John Downie as its new Sales Director, a move that follows onfrom company growth in recent years and strategic plans for the future in theUK and overseas. John will be responsible for developing sales strategies andexpanding the sales of the open platform IP CCTV “Titan Vision” product range.And his appointment coincides with the launch of the new Abacus retailbusiness intelligence system.

John has a wealth of experience in the IP video and PSIM market. Prior tohis appointment he was Commercial Director at Codestuff and before thisNational Sales and Marketing manager at CBC Europe. Jay Shields, ManagingDirector of VMS, said, “John is a seasoned professional and a great addition;his expertise and professionalism will strengthen our existing managementteam. John’s experience will be invaluable as we expand our market sectorsand grow our sales.”

Richard MooreEssentra Security hasappointed Richard Mooreas its UK Director ofSales. In addition tomanaging the day-to-dayactivities of thecompany’s internal andfield based salespersonnel, Richard will beworking with key customers to help identifyand generate new business opportunities

Reporting to Simon Jones, General Managerof Essentra Security, Richard is no stranger tothe Essentra Group, having for the last nineyears held the position of General Manager ofthe Group’s component distribution division.

“I am excited about having the opportunityto lead and develop a highly talented salesteam who share my passion for providing thehighest levels of pre- and post-sales support,”said Richard. “Our key objective is toencourage our customers and businesspartners to take advantage of the marketknowledge and expertise that we haveacquired over the last 20 years to help themgain maximum advantage from the latest IDtechnologies and products.”

Keith NewtonSilverNet has announced an expansion of its salesteam with the appointment of Keith Newton asBusiness Development Manager. Keith will beworking with consultants, installers, systemintegrators and distributors to identify newopportunities for SilverNet’s range of wirelessnetworking solutions.

Keith, who immediately prior to joining SilverNetwas Sales Engagement Manager for Ericsson, waspreviously a sales engineer for six years for BelAirNetworks.

Managing Director Chris Ballard said: “Keith’sextensive knowledge of transmission issues will be of immense value to us aswe look to provide project support to installers who are competing for newbusiness, as well as providing their existing clients with a cost-effectivealternative to the traditional cabling methods or the use of leased lines.”

EDIT people may14_riskuk_may14 06/05/2014 23:25 Page 4

Page 13: Risk UK May 2014

Screening

It does seem peculiar that in our hyper-connected world that we still rely so heavilyon the movement of physical packages. Yet

this reliance is so under appreciated. Withperpetual warnings about online security – themost recent headline grabber being theHeartbleed virus that effectively opened a backdoor to passwords for hackers and which,allegedly, the USA’s National Security Agencywas itself exploiting – the mailroom andsecurity of inbound items seems to have takena backseat.

Although we live in an era of relative peace –in the West at least – firms do need toremember that if (say) a terrorist wants tocause disruption to an organisation all he hasto do is put in the post a bomb or hazardousitem such as anthrax and let the postman dothe job for them; maximum effect withminimum risk to the sender.

Mail screening has an important role“The mail route,” says Richard Sheil, salesdirector at Todd Research, “into anyorganisation is destined to remain the preferredmethod for anonymously targeting a person orindividual associated with a particular companyor facility.” Whether a live or hoax device, bydefinition items sent this way require littleresource. This is why, Sheil says, these attackshistorically have been the territory oforganisations such as animal rights groupstargeting pharmaceutical and medical researchorganisations. It’s worth noting that the riskfrom dissident terrorist organisations has notgone away as was recently demonstrated bythe series of crude bombs sent to armyrecruiting offices. Sheil points out that thedevices sent bore a Republic of Irelandpostmark and were subsequently confirmed tobe the work of the republican terror allianceknown as the New IRA.

But Antony Paul, marketing manager atNeopost , says the need to screen inbound mailand packages goes beyond terrorist threats andcan include “disgruntled former employees orcustomers.”

Moving into the realms of internal security,firms also need to be alive to what their ownstaff are doing. With the growth of the web andonline shopping, firms need to assess theirmail screening function to cover what staff arehaving delivered to the workplace. Clearly it’smore convenient for staff to have online ordersdelivered to the workplace than to home.

But it’s the fact that by virtue of mail beingenclosed in some form of a wrapper that thetrue contents of an item are unknown untilit’s open or has been scanned. James

Griffiths, business developmentdirector, UK & Ireland, Pitney BowesGlobal Mailing Solutions, picks upon this and talks about a humanaspect of concern: “Companies areobliged to ensure the health andsafety of their employees under theHealth and Safety at Work Act 1974,and mail screening forms anextremely important part ofguaranteeing this safety.” As isoften the case though, many firmsonly implement a mail screening system afteran incident - “it’s rare that these proceduresare implemented before an organisation haswitnessed an incident, and by this time it canbe too late,” says Griffiths.

The threats have evolvedOf course the threats caused by inbound mailvary according to the recipient organisation andnaturally some organisations will be moreprone to mail threats than others. Griffithsnotes that scientific research companies,government agencies and banks are all majortargets because there are large numbers ofpeople who may disagree with their work, andfor these people, mail threats are a simple formof protest. It is because of this danger thatevery Foreign & Commonwealth Office aroundthe world scans its mail.

For many – in living memory – the threat andbulk of mail incidents were in the form of letterbombs, but, reckons Griffiths, nowadayspowder hoaxes tend to be used far morewidely: “Putting a harmless powder - such as

First-class protection

13www.risk-uk.com

Adam Bernstein looksat modern mailscreening solutionsand the protectionthey provide

“The mail route into any organisation is destined toremain the preferred method for anonymously targetinga person”

Explosives in a package

All pics courtesy of Todd Research

EDIT article 1 may14_riskuk_may14 06/05/2014 17:31 Page 1

Page 14: Risk UK May 2014

Screening

baking soda - in apackage, in the hopethat the receiver willfear it’s ricin oranthrax, can beextremely effective,without actuallyinflicting anyphysical harm.”

The power of a“hoax device” isimportant to appreciate.Letter bombs, forexample, are not only athreat to the receiver – thesender is also putting him orherself at risk by creating the bombitself. This is why firms must not becomplacent about hoaxes as they’re a safer andcheaper alternative for someone looking tocause disruption.

But says Griffiths: “If you consider that apowder hoax incident could result in theevacuation of a building, it quickly becomesclear how financially damaging these incidentscan be. If inflicted on the London MetalExchange for example, it could cost multiplefirms millions of pounds worth of losses.” Thisis why powder hoaxes cause maximum impactwith minimum cost, and no physical harm. Evenso, firms can still be on the receiving end ofother low-level threats such as razor blades,broken glass and basic explosives.

Ultimately, employers need to evaluate suchrisks using two key categories says Paul.“Firstly there is a duty of care to protectemployees and secondly [firms must consider]the cost associated with potential buildingdamage or evacuation.”

Every organisation needs to detail a systemfor handling mail, but what that will be willdepend on the organisation, the threat and thevolume of inbound mail to be screened.According to Sheil, evaluation of this is theimportant first step before the right screeningequipment can be specified. Next comes stafftraining.

TrainingBest practice means that all inbound mailshould be screened using X-ray equipmentoperated by trained staff – note the emphasison the word “trained”. Particular attention

should be given to parcelsarriving from randomsources such as couriers“and those wishing toleave mail for individualsat reception that mayresult in itemscircumnavigating the

screening process,” saysSheil.

The key though is not theblind use of technologywithout good training forstaff. As Griffiths puts it,

“without properly trainedpersonnel operating the technology it

quickly becomes redundant as thetechnology can’t work itself.”

Sheil echoes this: “Any equipment deployedis of course only as good as the staff operatingit.” He notes that a solid understanding of theoperational capabilities of the equipmentcoupled with regular training in understandingthe characteristics of possible threat items isessential. Misidentification can lead tounnecessary and highly expensive evacuations.By the same token, mistakes can let threatsthrough.

It’s also important that staff from themailroom, security team and anyone involved inthe process understands the nature of threatsthat can be encountered, how to deal with themand the actions needed to mitigate falsealarms.

Training isn’t a one-time deal. In many firmsstaff turnover is a problem and this includesthose operating mail-screening technology.Griffiths believes it to be “absolutely vital thatall new staff are completely up to speed ontheir training before they operate thesemachines.” He adds that his firm’s portfolio ofmail screening products features built-intraining mechanisms that will test operatorsperiodically.

But what makes a suspicious package? Wellthat, according to Paul, is down to definitionswhich firms should refine so that suspiciouspackages can be reported to the appropriateauthorities.

Another key part of the process is to ensurethat all staff attend a “safe or suspect” courseso that they can identify the tell-tale signs ofsuspicious packages even before they place it

14www.risk-uk.com

“Companies are obliged to ensure the health and safety of theiremployees under the Health and Safety at Work Act 1974, and mail

screening forms an extremely important part of guaranteeing this safety”

EDIT article 1 may14_riskuk_may14 06/05/2014 17:32 Page 2

Page 15: Risk UK May 2014

Large Format Flexi X-ray Plates

for large area x-ray investigationRugged, weather- resistant flat

panel portable x-ray systems

We’ve updated our Corporate Identity

and Logo to reflect Scanna’s continuing

commitment to High Quality, High

Performance X-ray Products.

Visit us at Counter Terror Expo, Stand

D36, April 29-30 to learn more.

Project2_Layout 1 06/03/2014 12:58 Page 1

Page 16: Risk UK May 2014

inside an X-ray machine; regularrefresher courses are crucial.Because mail screening goesbeyond the mailroom, saysGriffiths, firms should ensurethat everyone inside anorganisation can spot asuspicious package. Anyguidance offered should followa programme that involvestraining and certification in linewith PAS97:2012. Importantly,where the alarm is raised over asuspicious package, staffshould not panic but instead,think rationally and followprocedures that they’ve beentaught in line with PAS97:2012.

ProcessesAside from training, mail-handling processesshould be set up so that firms have a logicalworkflow based on PAS97:2012. For example,inbound mail should be scanned first, thensorted and then distributed.

Paul recommends that all items are deliveredinitially to a central point and then passedthrough a dedicated screening device at thiscentral location.

Another step, and one that Griffithsrecommends for those that need addedsecurity, is to also consider having themailroom offsite. Firms that do this (and thosethat don’t should consider it) need to use someform of delivery management software that willlog and track deliveries and provide digitalaudit trails to refer back to.

It is worth noting however, that everybuilding and situation is different, so it’s vitalthat site-specific processes are written andfollowed. Separate actions for finding powders,explosives, sharps etc. should also be includedin these processes, and the procedures shouldbe reviewed periodically to ensure that they arestill appropriate. Griffiths says that firm’s mailscreening supplier should be able to offerreviews of procedures.

Those needing further guidance on settingup processes can turn to the Centre for theProtection of National Infrastructure (CPNI) aswell as counter terror security advisors inorganisations such as the City of Londonpolice.

But there is another aspect to health andsafety obligations owed to staff, and that is

that organisations should be aware of the legalrequirements to operate X-ray equipment. Sheilsays that good suppliers should be able toassist with this including with the provision ofradiation protection training and compliancewith IRR1999 (Ionising Radiation Regulation1999). Griffiths adds that regular servicing of X-ray machines will aid compliance with IRR1999.The Health Protection Agency can also offerguidance.

Technologies can combat the threatsA number of technologies exist to assist mailscreening and, says Paul, in its simplest formdevices are available that exclusively identifymetal within letters and parcels. But for thebest protection against malicious items, hesays that “an organisation really should investin X-ray based technology and depending onthe sizes of and volume of mail an organisationreceives, there is the choice of cabinet orconveyor based technologies.”

It should be obvious to most that cabinetsare more cost effective, simpler to operate andrequire a much smaller footprint thanconveyors. Conveyors, by definition, are muchmore suitable for large sized items or high mailvolumes.

Many cabinet X-ray scanners are equippedwith enhanced powder detection software thatcan identify harmful powders like ricin oranthrax. Todd Research calls their version“Enhanced Powder Detection” and it gives auser greater ability to see items containingpowder which Sheil sees is a rising risk in theUS. Paul too considers that being able todetect powders is very important to security.

But, says Griffiths, customers with a greatervolume of post may need a conveyor X-ray

16www.risk-uk.com

Screening

In many firms staff turnover is a problem and thisincludes those operating mail-screening technology

A bomb in a postal tube

EDIT article 1 may14_riskuk_may14 06/05/2014 17:32 Page 4

Page 17: Risk UK May 2014

1 Papworth Business Park | Stirling Way | Papworth Everard | Cambridgeshire |

United Kingdom | CB23 3WA T: +44 1480 832202 | F: +44 1480 832233 |

[email protected] | www.toddresearch.co.uk

Talk to us today and understand why, for over 50 years, we have partnered with companies to minimise the impact ofdangerous devices to business continuity.

• Hoaxes or live devices can cripple an organisation• Avoid expensive evacuations• Reputational & brand damage • Negative impact to employee morale• Disruption to customers

Are you effectively screening your mail for threats?

TODD_Layout 1 06/05/2014 17:23 Page 1

Page 18: Risk UK May 2014

Screening

18www.risk-uk.com

machine (akin tothose used atairports) while thosein high-risk premisesshould considerusing a tracedetection system -where a swab can betaken from thepackage andanalysed in secondsto see if there areany explosivespresent. Additionally,software can be usedwith conveyors to aidthe detection ofliquid explosives.

For Sheil it was theheight of IRA activityin the 70s and theneed for governmentof the day to deployequipment to combatthe postal threat thathelped his companydevelop a range ofcabinet scannerscapable of examininga single item or mailbag that helps a userto confirm mail as“safe or suspect”.

SupplierrelationshipsAs can be imagined,when it comes tochoosing a supplierto help manage amailroom, there is no one-size fits all solution –every company, site and requirement isdifferent. Griffiths recommends that firms must“pick a supplier wisely and should buy from adistributer that has a direct relationship withthe manufacturer and a proven track-record inthe sector.” For him, buying into products andservice is not simply a matter of cost as thereare other factors such as response times forbreakdowns, experience and customer base –“research is paramount to ensuring that youchose a secure company.” Allied to this is how

the supplier consultswith client over theservice needs beforeimplementation – “if apotential partner doesnot offer this then itshould set alarm bellsringing,” Griffiths says.

Sheil agrees but takesthe point further. Hesays that when choosinga supplier firms shouldnot only look at theirhistory, but also whetherthey have experience ofdealing with similarorganisation in thesector, whether theyoffer a completesolution (fromassessment of risk,capability of supplyingthe correct configurationof scanner, training), andthe ability to support theequipment over its life.He puts this last point atthe top of the list asongoing supportinvolves a critical pieceof an organisation’ssecurity infrastructure.

Support from the rightsupplier should alsoinclude additionaladvice around imageanalysis, as well assome of the typical signsassociated with apotentially hazardousdevice.

Of course technologies do have to be paidfor and the cost of deployment for a givenscreening solution needs to be evaluated “inthe context of major business disruption, ormore importantly, the potential risks toemployees and visitors,” says Paul. Hesuggests that suppliers should be able tooffer financial options in the form of outrightpurchases, leasing or rentals. Leasing ascreening device over a period of time canmassively help in spreading the cost into anaffordable payment cycle.

Sheil concludes with a lesson that he’slearned over years - that it is worth talking toother organisations that have had to dealwith mailroom security to learn what theyhave implemented and how well it works forthem.

Leasing a screening device over a period oftime can massively help in spreading the

cost into an affordable payment cycle

EDIT article 1 may14_riskuk_may14 06/05/2014 17:32 Page 6

Page 19: Risk UK May 2014

BSIA comment

Last year saw a big rise in integratedsystems in the security sector and 2014looks set to follow this pattern with a

number of technologies and trends coming tothe fore so what does the future hold for accesscontrol?

Near Field Communications (NFC)A technology that has been promising to do bigthings for some time is Near FieldCommunications (NFC). Whilst the technology forit has been available for some time, NFC’ssuccess will be determined by the tipping pointfrom the number of enabled mobile devices andthe public’s willingness to use them to gainsecure access to secure doorways. However theuse of NFC has also been spurred on by a numberof new compatible stand-alone locks which areespecially well suited to access control using asmart device. At the moment NFC is more popularin the consumer market. For example, landlordscan send a key to the smartphone of a tenantwhich can then be activated or revoked asnecessary. NFC offers exciting possibilities forsecuring access and the signs are that the marketis poised to increase adoption very soon.

Cloud-based securityThe adoption of cloud-based security is anotherarea that has gained enormous ground in recentyears and looks set to continue vehemently in2014. It’s fair to say there were concerns over thesecurity of using the cloud voiced by somecommentators and potential users when cloud-based access control was first muted.

However, these were largely quashed by awider acceptance of online use of services suchas banking or retail, which have demonstratedthat using IP needn’t compromise vital security.As well as ease of use and installation, cloud-based services also rapidly roll out updates(which is particularly useful in an emergencysituation) and there is no need to store largeservers onsite (which could be attacked orhacked directly) – freeing space and resources.

Security integrationThe momentum of security integration is unlikelyto slow in 2014 – in fact it will continue to be akey market driver moving forward. The benefitsare unquestionable, with the drive for efficiencysavings being the core proposition. It enhancessecurity reaction times – for instance if a door isforced the combined system will sound an alarm,lock-down key areas and direct the security team

to the location of the potential incursion.Integration makes installation and upgradeseasier and more cost-effective and it makes fulluse of legacy and existing systems. There is amassive growth in the use of BACnet protocols aswell, which are adding a new level of softwareintegration which is helping to move away fromthe remaining proprietary software that was oncecommonplace in the security industry.

There has been some debate within thesecurity industry lately about the effectivenessand convenience of using passwords (both forphysical to premises and logical access to ITsystems). Integrated security systems allowauthorised users to minimise the security detailsthey have to memorise and are likely to gainfurther interest this year because of thisadvantage. The ability of integrated systems tointelligently provide access also means thatworkforce management is much easier usingintegrated security. From managing workinghours to activating buildings services only whenthey are needed (and thus saving energy andresources), integration is providing intelligentsolutions that will save real money in 2014.

BiometricsExperience shows that consumer adoption helpsto facilitate business use so I would expectbiometrics to find even greater popularity in2014. The quality and accuracy of biometrics haverapidly improved in recent years, moving on fromfingerprint readers and now readily incorporatingfacial recognition (which is very well suited to‘clean’ areas) and moving towards previouslyniche and more complicated systems such aspalm vein and heartbeat recognition readers.

Security legislationAs well as the technology, legislation is movingforward to meet the demands of the securityindustry. In 2014 we will see the publication ofIEC 60839, entitled, ‘Alarm and electronicsecurity systems Electronic access controlsystems. System and components requirements’– which aims to update the standard to take intoaccount the latest integrated systems. It is beingpublished at the IEC level (World standard) andalso published by BSI as a EN (European)standard. As with all new standards, IEC 60839will have a profound impact on the securityindustry in 2014 – pushing providers furthertowards modern integrated systems and ensuringthat they adhere to the developing needs of allcustomers that rely upon them.

Access control – five to watch

19www.risk-uk.com

NFC offers excitingpossibilities forsecuring access andthe signs are that themarket is poised toincrease adoptionvery soon

Mike Sussman,Chairman of theAccess Control sectionfor the British SecurityIndustry Association,discusses how 2014looks set to be a yearof evolution ratherthan revolution

EDIT article 15 may14_riskuk_may14 06/05/2014 23:06 Page 1

Page 20: Risk UK May 2014

Security at airports, seaports and borders isgetting more sophisticated. Providing up tothe minute information can greatly improve

response times and the functioning of thesebusy public areas. However, when we hear thata 16-year-old boy managed to scrambled over anairport fence and spent six hours undetected atSan Jose airport in the USA, to then stowawayon a flight that took him to Hawaii, we knowthere is a need for more.

All international borders across the globehave to be watchful of the same threats:terrorist attacks, hijacking, the smuggling ofprohibited goods between countries and thegeneral safety and security of passengers, staffand luggage or cargo.

In fact risks in this area are hardly a newphenomenon. The first recorded sky hijackingwas in 1930, by Peruvian activists whocommandeered an F-7 airplane and used it todrop propaganda booklets over their country.This might seem gentle when compared toLockerby or 9/11, but it highlights the need tokeep tight security measures.

Although airports make the headlines moreoften, protecting borders and seaports is alsoimportant. The threats though are different.Jared Bickenback, a market analyst at HIS,specialised in weapons and contrabanddetection explains: “For aviation, securitypersonnel are focused on preventing an attack,so passengers and employees are screened forexplosives, knives, and guns. For borders andseaports, smuggling is the main focus. This caninclude explosives but primarily includescontraband, drugs, and tariffed items. Itemsthat have a tariff are routinely smuggled so portcompanies will use detection equipment tocheck against a container’s manifest.”

The soft and the hard approachA good combination of software and hardware isneeded to achieve maximum coverage and bestperformance.

On the soft side, companies like CNLSoftware, which develops Physical SecurityInformation Management (PSIM) software, areable to provide integrated situationmanagement solution. CNL’s IPSecurityCenterPSIM technology provides a platform tointegrate multiple unconnected securityapplications, systems and devices, controllingthem through one comprehensive userinterface. It collects and correlates events fromexisting disparate security devices and

information systems such as CCTV surveillanceof crowded passenger areas, access control atstorage yards, offshore radar systems, sensors,analytics, and networks, building systems toempower personnel to identify and proactivelyresolve situations.

The way that security operates within a port,and the processes that are put in place are notuniform. Bosch business development managerThomas Söderlund recalls a special project:“One request we occasionally have is to havedifferent operator levels. If a higher leveloperator calls for a particular camera, all otheroperators in lower levels might not be able toview that camera or the associated recordingautomatically. However, operators can requestpermission to view the camera. The softwaresolution we provided consists of an extensiveuser rights management with internal cameraswitching, and storage mapping.”

Danny Peleg, Director of Transportation forGenetec agrees that integrated solutions, suchas Genetec Omnicast, not only allowscompanies to take a holistic approach to theirsafety and security measures, but it also savesthem money.

“When you have a security breach in anairport, you have a major problem,” says Peleg.“You have to find the person and fast. Everyminute of downtime at an airport in the US costsUS$ 25K. The time to recovery is essential.Without an efficient resource mechanism, withan automation process that will lead to the bestapproach you’ll be in real trouble.”

Genetec Omnicast integrates access controlssolutions, video analytics, perimeter intrusionand licence plate recognition (LPR) in a unifiedplatform called Security Centre.

LPR is a preventative method. The numberplates of wanted individuals can be integratedinto the system and cars can be screened onthe approach to the airport. Peleg adds, “Weinstalled AutoVu LPR at an airport in Florida andwithin two weeks they were able to intercept apotentially risky vehicle, that was heading tothe airport.”

Full stopPreventative measures might not be enough tostop a vehicle that is charging towards a port.Bearing in mind that these vehicles will notnecessarily be a small car, you will need aneffective barrier solution.

Neil Sampson, Green Gate Access SystemsMD points out, “The new PAS68 standard,which is an impact test specifications for vehiclesecurity barriers, reflects the growing concernthat a terrorist attack is a serious threat and,should it ever occur, it may well be from a large

Crossing the lineGeny Caloisi looks at

security across thetransport sector

20www.risk-uk.com

Peruvian activistswho commandeered

an F-7 airplane and used it to drop

propaganda bookletsover their country

EDIT article 14 may14_riskuk_may14 06/05/2014 23:05 Page 2

Page 21: Risk UK May 2014

21www.risk-uk.com

vehicle travelling at speed. The attemptedimpacts at Glasgow airport were a poignantreminder that can happen anywhere.”

Sampson also says that the new trend in thisarea is to move away from the traditional onepump unit per bollard install, to instead havingindividually controlled units. This provides thebenefit that should one unit in a row of securityfail, the others are still able to give protection.

Scan and goWhilst an airport is mainly focussed on securingthe staff and passengers that walk through thedoors and screening baggage, a Seaport orBorder Control area is focussed on screeningvehicles and associated cargo. In these cases,proximity scanners and detectors are used.

Flir Systems’ Andrew Saxton, director ofmarketing surveillance, believes that thermalimaging is a game-changer technology becauseof its capacity to deliver accurate threatinformation any time of day or night.

Another specialist in security inspectionsolutions utilising X-ray and gamma-ray imagingis Rapiscan. The company’s products are soldinto four market segments: baggage and parcelinspection, cargo and vehicle Inspection, holdbaggage screening and people screening.

The buzzword in this area is ‘Real TimeTomography’ (RTT). Traditionally an X-ray scanand low speed Computed Tomography (CT)screening solutions were sufficient. Today, withlarger than ever numbers of travellers, speed isessential.

Frederic Brouiller, Vice President Sales EMEA,Rapiscan Systems comments: “As the threatshave developed so has the technology andairports are now looking to the next generationof screening.”

For airports looking to screen handheldbaggage and meet the latest requirements forthe restriction of ‘Liquids, Aerosols and Gels’(LAGs) ECAC Rapiscan, has certified a number oftechnologies.

“In the cargo and border security market theneed for advanced radiation and nucleardetection capabilities is gaining momentum,”says Brouiller. “With currently less than 50 portsusing Rad-Nuke technology, it is down to someof the larger economies such as the UK, US,Brazil and Australia, for example, to lead theway in securing their international ports. Thereis also a demand from authorities to have theequipment in a ‘Security Screening as a Service’business model.”

Law downRegulations for international transportation arebeing reviewed as we speak. Initiatives such as

the US “Beyond the Border” program forperimeter security between the US and Canadaare designed to support agencies with thecomplex task of securing national perimeters.

Europe is also uniting in matters of security.Brouiller comments: “As of the 1st July 2014, theEU requires by law that all air cargo or mailcarriers operating into the Union from any thirdcountry airport (ACC3s) ensure that an EUaviation security validation of its cargo and mailoperations has been carried out by an approvedEU aviation security validator.

“Also from 1 July 2014, air cargo securityscreening needs to take place using equipmentthat meets EU standards. All necessaryvalidations, including on-site visits, need to becompleted before 1 July 2014 in order for aircarriers to obtain the ACC3 status and carrycargo or mail into the EU. Further regulationsinclude a change to the European regulationsfor hold baggage screening as of September2014, when all European airports will need tohave Standard 3 certified equipment if theywant to install a new Hold Baggage Screening(HBS) system.”

A global approach, including internationalagreements about how to deal with securityissues, is fundamental to the good functioningof tourism travel and general business. Butgovernment funding is needed. IHS’ latestreport on the explosives, weapons andcontraband detection equipment market, saysthat sales of explosives detection equipment areprojected to decline by 10.6 per cent in NorthAmerica and 13 per cent in Europe, resulting ingovernments focusing on risk based securitymeasures instead of taking a holistic approach.According to our experts, security solutionsshould be proactive instead of reactive.

Transport security

As the threats havedeveloped so has thetechnology and airportsare now looking to thenext generation ofscreening

EDIT article 14 may14_riskuk_may14 06/05/2014 23:05 Page 3

Page 22: Risk UK May 2014

touchpoint

just got

a lot more

rewarding

Eaton’s industry leading touchpoint membership programme is now bigger and better. Whether you’re an existing touchpoint member or want to join, find out more.

Get more than just intruder detection, expect more with touchpoint. Get unrivalled technical support, online materials and rewards.

www.touchpoint-online.com

Project2_Layout 1 22/03/2014 11:46 Page 1

Page 23: Risk UK May 2014

Transport security

Recent statistics from the Home Officerevealed that between January 2012 andJune 2013, four of the top 10 UK crime hot

spots were major railway stations; ManchesterPiccadilly (1,508 incidents), London Victoria(1,483), Kings Cross (1,322) and Euston (1,283).Set alongside a close-to-10 per cent increase inrail passenger theft between April 2012 andMarch 2013, the figures suggest the UK’s railwaystations remain a top target for thieves. Sowhere can security managers on the UK’s railnetwork turn to for inspiration to combat theever-present threat of crime? The answer isairports.

International airports have invested heavily insolutions and strategies designed to betterprotect their passengers, assets and cargo. Whatis more, there are strong parallels betweenairports and railway stations beyond the factthat both serve as transport hubs. In this article,we will explore some of those parallels andexamine the best practice – systems, processesand approaches - that can be leveraged by UKrailways for the safety of all of us.

Both airports and railway stations are some ofthe world’s busiest and most congested spaces.Picture the departure lounge at internationalairports during the summer holiday season withthousands of people and their luggage in one,relatively small space. Equally, walk throughmajor railway stations on a Friday night in rushhour and the sheer number of people isoverwhelming.

Airports approach this in an innovative way,deliberately adopting a strategy that enablessecurity managers to prevent scenarios fromturning into incidents rather than just reacting toevents after the fact. Imagine that a passengerleaves a bag in one of the terminals and walksoff; technologies such as video analytics helpsecurity staff to spot the suspicious behaviour ina busy crowd and pre-empt a potential problem.In addition, by integrating cameras together intoa single unified view – using a videomanagement system – it’s much easier to spot aperson behaving in an unusual way and quicklyguide the security personnel to the source of thetrouble. This proactive approach to managingsituations should serve as an inspiration torailways.

Another commonality is that both transportnetworks never stop their operations andtherefore, their security systems must performto the highest standard both day and night.Continuing to operate without interruption,whatever the circumstances are and evenfollowing an incident, is key.

Take for example when an airport suffers apower outage affecting the operational

systems at the terminal. This failure can causemajor flight delays and chaos at the terminal,with big crowds moving around the building,demanding information about their flights. Inthis type of scenario, security is moreimportant than ever. So how do airports ensurethey deliver a 24/7/365 security solution thatruns smoothly even in extreme circumstances?The answer is integrated security systems thatare designed with automatic fail-over to back-up systems so that in the event of a powerfailure or a security risk, site security isimmediately picked up and controlled by asecondary security site. Like airports, railwaystations can also be affected by adverseconditions outside of their control – severeweather, flooding or fire – that disrupt criticaloperational systems and put thousands ofpassengers at risk. Investing in back-upsecurity solutions – like those used in theairport sector – will give security managers atrailways stations the peace of mind thatcomes from knowing their system can stand upto the toughest conditions and ensure securityis maintained on site.

Airports and railway stations both havedifferent contractors – cleaners, maintenance,shop staff, engineers, train operators – withaccess to sensitive areas of the facilities.Airports are managing their staff with state-of-the-art access control functionality andintegration with HR and building managementsystems ensuring that no unauthorisedpersonnel can access restricted areas. Thesesystems are linked to payroll and as soon as amember of staff leaves or a contractor stopsworking for the organisation, their physicalaccess credentials are updated simultaneouslyensuring access rights are accurate at all times.

Additionally, full integration between the HRand security departments makes staffregistration seamless, saves time for bothsecurity operators and HR staff, whileeliminating administrative errors. This ability tointegrate both systems will help railwaynetworks to manage their budgets, usuallysmaller than in airports, more effectively and tospread security more widely and wisely acrosstheir estate.

Outside the terminalThe value of assets in vehicle parks and storageyards in both airports and rail stations hasincreased substantially over the last few years,especially as metal prices have soared. These

From planes to trains

23www.risk-uk.com

What can our railwayslearn from airportsecurity? asks DanielWan, marketing leaderUK, HoneywellSecurity Group

EDIT article 4 may14_riskuk_may14 06/05/2014 17:36 Page 1

Page 24: Risk UK May 2014

Transport security

sites can often be remote, with large perimeters,and even temporary sites, making them veryvulnerable to theft. Security officials at airportsaround the world need to deliver powerfulintrusion detection systems that secure their siteperimeters and provide electronic access control,and supply integrated video assessmentsolutions for unmatched site protection.

Security manufacturers like HoneywellSecurity can provide solutions, incorporatingradar and video analytics to protect largeperimeters and are also able to provide solutionsthat can be used to remotely monitor andmanage sites that are either permanent ortemporary. In addition, where the welfare of loneworkers is a concern, new security solutions canintegrate with third party systems to monitortheir activity and flag a problem if a workerpresses the emergency alert.

Not only are airports dedicated to transportingpeople and cargo around the world, they aremorphing into highly sophisticated retail outletsin their own right. Many high end retailers boasta presence in major airport terminals. This hasencouraged retail security managers to invest ina range of new technologies designed to reducetheft and shrinkage such as video analytics,point-of-sale alerts and other integrated security

solutions.Similarly, large rail stations have – particularly

in the last decade – started to grow ascommercial centres in addition to transporthubs. Although the profile of the retailer isslightly different, with high end retailersreplaced by chain shops and restaurants, thesame challenges still exist. How can railwaysecurity staff help to protect against theft inorder to attract more retail partners and boostinvestment? Again, borrowing strategies fromthe airports will help here too, specificallyinvesting in video and access solutionsoptimised for a retail customer.

ConclusionAn effective transport security system needs toembrace flexibility, risk management and pre-emptive deterrence. Some of the sophisticatedsystems mentioned above can be perceived aspremium technology and security managers atother transport sectors might face challenges injustifying the investment. However, prevention isalmost always cheaper than cure. By taking ahands-on approach to understanding the needsof each facility, managers can provide quickreturns by avoiding loss and damage. Airportsare an excellent model to follow.

EDIT article 4 may14_riskuk_may14 06/05/2014 17:36 Page 2

Page 25: Risk UK May 2014

Energy costs

Modern organisations have manyconsiderations and responsibilities to theircustomers, government and law but in

recent times the implementation of ‘green’policies has taken a new turn. In the past,companies were not restricted by environmentalissues, nor were they compulsory requirementsand, as a result, some organisations used beingenvironmentally-friendly as a marketingmessage.

Today however, with the widespread concernsregarding climate change, governments aroundthe world have deemed it necessary to includeregulations and legislation as to the performanceof business in terms of their environmentalimpact, which is now often referred to as thecarbon footprint. Since the first G8 ClimateChange Roundtable in 2005 when former PMTony Blair led a discussion regarding a globalplan of action the group has grown to includecompanies such as Ford, British Airways, HSBC,EDF and BP. Now, the Roundtable has amembership of 150 businesses spread across theglobe which, according to Reuters, Friends of theEarth feels represents a major shift by thebusiness community towards efforts to mitigateclimate change.

So with the seeming keenness of the businesscommunity to do something about its carbonfootprint and the promises made by governmentsto reduce carbon emissions ( the UK governmentintroduced carbon budgets as part of the ClimateChange Act 2008 to help the UK reducegreenhouse gas emissions by at least 80% by2050) legislation has become necessary.

The CRCThe UK carbon budget places a restriction on thetotal amount of greenhouse gases the UK canemit over a five-year period. Under a system ofcarbon budgets, every tonne of greenhousegases emitted between now and 2050 will count.Where emissions rise in one sector, the UK willhave to achieve corresponding falls in another.

The CRC affects large public and private sectororganisations across the UK, togetherresponsible for around 10% of the UK’sgreenhouse gas emissions. Participants includesupermarkets, water companies, banks, localauthorities and all central governmentdepartments.

The scheme is designed to target emissionsnot already covered by Climate ChangeAgreements (CCAs) and the EU Emissions TradingSystem (EU ETS) and features a range of driversto encourage organisations to develop energymanagement strategies that promote a better

understanding of energy usage.Organisations that meet the qualification

criteria are required to participate, and must buyallowances for every tonne of carbon they emit.

Qualification for the scheme is based onelectricity usage. For Phase 2, organisations willqualify if, during the qualification year, theyconsumed over 6,000 megawatt-hours (MWh) ofqualifying electricity through settled half-hourlymeters. Qualifying organisations have to complylegally with the scheme or face financial andother penalties.

Organisations which participate within the CRCare required to monitor their energy use, andreport their energy supplies annually. TheEnvironment Agency’s reporting system appliesemissions factors to calculate participants’carbon dioxide (CO2) emissions on the basis ofthis information. Participants must purchase andsurrender allowances to offset their emissions.Allowances can either be bought at annual fixed-price sales, or traded on the secondary market.One allowance must be surrendered for eachtonne of CO2 emitted. The allowance price inPhase 1 has been set at £12 per tonne of CO2.

Fines for failing to report on annual emissionscould increase. Currently organisations are fineda one-off payment of £5,000; paying a further£500 for each subsequent day reports aredelayed, up to a maximum of 40 working days -or £20,000 so there is quite a financial motive forcompliance as well as the environmental factor.

What can you do?So you are in charge of fire and securityprotection at a large hospital. You have aconstant flow of people entering and leaving thesite and a host of potential risks to deal with.How can you possibly begin to consider thehospital’s carbon footprint? And how much will itcost to follow the legislation?

A report by CMR Consultants recommendsdeveloping a carbon management strategy,budget for the energy consumption allowancesfees, and investigate the most effective ways ofintroducing energy-saving measures.

You might think that energy-saving measuresare not possible for 24/7 fire and securitysystems, however there are simple alternativesthat you could specify that will help you avoidCRC fines. In such cases it would certainly proveprudent to look at alternative forms of powersupply such as switched mode technology,already providing savings for various sectors ofthe market.

The CRC is all about savings, however notmeeting its targets will end up losing you money.

Energy efficiency for good health

25www.risk-uk.com

The CRC EnergyEfficiency Scheme (orCRC Scheme) isdesigned to improveenergy efficiency andcut emissions in largepublic and privatesector organisationsand it could result infines for organisationsthat don’t changetheir ways

For further reading visit:www.gov.uk/government/policies

EDIT article 12 may14_riskuk_may14 06/05/2014 23:04 Page 1

Page 26: Risk UK May 2014

Power supply

26www.risk-uk.com

The recently introduced CRCEnergy Efficiency Schemefrom the UK Government

has seen the profile of the greendebate raised significantly

especially in the industrial,commercial and healthcare

sectors. These businesssectors know the problems

associated with high powercosts but also the requirement for

24/7 security and the stresses ofworking with stretched budgets. A

hospital for example has its patients,doctors, nurses, suppliers and visitors to takecare of, all in the face of NHS cuts, plus has theneed for constant protection. Throwingenvironmental performance into the mix couldbe another headache.

The result of the CRC has been an increasedemphasis on a reduced carbon footprint, andone area that many business and individualsare keen to see addressed is that of energywastage, especially in the face of potentialfines for not meeting the required targets.

Traditionally, energy wastage from lowconsumption devices such as security equipmenthas not been high on the agenda. Many will lookat the figures for individual devices and considerthe meagre savings as not being too important.However, that attitude is changing as businesseslook to each and every aspect of their operationsto make a contribution.

Whilst many low power security devicesmight have low levels of wastage, typicalsystems include dozens -maybe hundreds ofsuch devices. Considered as a whole, theenergy wastage from electronic securitysystems is something that end users are nowtaking very seriously. Indeed, many businesseshave increased their budgets to achieve energyreduction targets, and so can usually make

more funding available if a specific solutionreduces the company’s overall carbon footprint.

Increasingly, security/fire installers are awareof switch mode power supplies. Across a widerange of industries, these devices are gainingpopularity, and in the near future many expect tosee traditional linear power supplies disappearaltogether. Manufacturers of power supplies areshifting to the improved technology and themain driver for this is customer demand!

Switch mode power supplies work by utilisinga switching regulator to convert power. A switchmode supply switches between ‘on’ and ‘off’states, and the output voltage is regulated bythe frequency of the ‘on’ and ‘off’ periods. This iswhy switch mode units have superior efficiencyperformance.

The more traditional linear power suppliesregulate voltage output by dissipating energy,typically as heat. Not only is this inefficient, butin certain circumstances can also demandadditional power for the overall system ascooling may be required.

According to Tony Allen of Dycon: “Switchmode units are generally considered to be up to90 per cent efficient, whilst linear supplies canbe as little as 25 per cent efficient- dependentupon the voltage regulation.”

While the higher efficiency performance is themost often quoted advantage of switch modepower supplies, there are also other benefits.Because of the reduced heat dissipation, there isno need for heat sinks, so switch mode units areoften smaller and lighter than equivalent linearoptions.

“Switch mode units are also able to bettercope with input variances and thus provide amore consistent output,” says Tony. “This canhave the additional benefit of prolongingequipment life in the field as well as makingbatteries more efficient in terms of performanceand longevity.”

So for the healthcare operator that has toweigh up not only the cost vs risk scenariowhen it comes to purchasing new equipment,there is obviously the thought of how muchmore are these PSUs going to cost to havefitted compared to the potential problems youcould have from not meeting CRC targets. Thegood news is that a professional grade switchmode power supply costs roughly the same asa less efficient linear mode unit, thus allayingany concerns about budgets and expense.

Whether you have intruder alarm, firedetection, CCTV, access control or peripheralelectronic solutions at your premises, it’s timethat you switched to switch mode powersupplies to help meet CRC requirements; it couldmake all the difference in efficiency and costs.

Saving with switch modeWhile most security equipment can boast low consumption fig-

ures, the sheer number of devices in systems particularly those inlarge premises such as hospitals means that a lot of power can be

wasted. Here we talk about energy efficient PSUs and how theycan save money and reduce a carbon footprint

“Switch mode units are generally considered to beup to 90 per cent efficient, whilst linear supplies

can be as little as 25 per cent efficient”

Tel 01443 471060 www.dyconsecurity.com

Advertisement feature

EDIT dycon may14_riskuk_may14 06/05/2014 23:24 Page 2

Page 27: Risk UK May 2014

IFSEC/Firex

IFSEC International moves to ExCeLLondon this year. In this first part ofour preview we look at event and aflavour of what the show has tooffer from 17–19th June

With the show taking place at its newhome in London in 2014, IFSECInternational’s organisers are hoping

that the event will be bigger and better thanever before. The show relocation has received a£1million investment dedicated to ensuring thatvisitors experience an interactive andspectacular show. With more than 94 per centof the floor plan reportedly already sold for the2014 show indicate the demand from exhibitorsto showcase technology at the event.

In addition to 500 returning exhibitors, morethan 93 businesses have signed up to IFSECInternational based on the event relocating toLondon after previously being absent from the2013 show. Exhibitors returning exclusively forthe London move include: Pyronix, MarchNetworks, SimonsVoss, UniView, CCTV Direct,Security Dynamics, EVVA, Tecnoalarm, HKC andBlok n Mesh. We will look at some of the newproduct launches and service offerings in nextmonth’s edition of PSI.

Confirming support for IFSEC International2014 moving to London, Julie Kenny CBE DL,Chairman and CEO, Pyronix said: “This is thefirst time we have exhibited at IFSECInternational in five years and the exhibition’smove to London is a key reason for returning.We’re using this as a big platform to launch arange of new products to the market and we’rereally looking forward to it. London will alsogive us the opportunity to see more end-usersand specifiers at the show and we’re lookingforward to welcoming those visitors too.”

James Kelly, Chief Executive, BSIAcommented: “The BSIA is a long term andproud supporter of IFSEC International. Werecognise this as the focal point for the industryto gather and learn about the latestdevelopments. Now the show is taking place inLondon, this will present a new opportunity forthe security industry and we expect to see aneven broader audience attending which willhelp to promote best practice within theindustry. We are hugely excited for the event inJune, BSIA members identify IFSECInternational as the leading event in thesecurity calendar and we’re looking forward toseeing the industry coming together.”

In addition to the exhibition itself there willbe dedicated theatres for end-user and trade

education plus, case studies and ninededicated product areas.

Brand new for 2014, Security & Fire InstallerLive will be a dedicated installer offeringcatering for security and fire installationcompanies; this will be the destination tosource the latest tools, products andexperience insightful training sessions.

Security and Fire Installer LiveThere is a new feature launching in 2014,Security and Fire Installer Live, a dedicatedevent held within IFSEC International that hasbeen designed to suit the business needs ofinstallers. As Charlie Cracknell, Event DirectorIFSEC International, explains: “Over 70 percent of IFSEC and FIREX’s annual audience ismade up of installers and integrators, totallingthousands of active and engaged of securityand fire professionals within a community. As avital link in the security buying chain, the IFSEC& FIREX International teams continuouslyengage with the market and leading industrypartners building an in-depth understanding ofwhat installers and integrators really want andneed to help run their business. The Security &Fire Installer Live programme will build upon allthese elements from across our 40 yearheritage and deliver effective solutions that themarket needs.”

The “Meet The Buyer” programme willconnect installers with active buyers and

London awaits...

27www.risk-uk.com

In addition to 500 returning exhibitors, more than 93businesses have signed up to IFSEC International basedon the event relocating to London

EDIT article 11 and 18 may14_riskuk_may14 06/05/2014 23:30 Page 1

Page 28: Risk UK May 2014

IFSEC/Firex

professionals with tenders and live projects andthe Live Party – is set to be an event fornetworking and connections with 1,500 of peersand suppliers. And there is also The NetworkingBar where installers can network, take a breakand catch-up with work and colleagues.

THERE WILL ALSO BE A DEDICATED EDUCATIONPROGRAMME FOR INSTALLERS OFFERING: • End User market buying trends, including

updates on client demands, needs and pricepoints

• Live product demos from the leading industryproviders

• The plug and play zone giving theopportunity to test and touch the latest kitlive at the events

• Thinking IP and Fire, starting out or growing?Installers can connect with information fromthe leading trainers, specialists and to helpfuture proof and build business

• Access to manufacturer technical productspecialists

• Regulation, legislation and insuranceOne of the most popular areas is bound to be

the ‘Garage & Tool Shed’ with big brandgiveaways and access the latest fleet vehicles,financing, tools and kit.

Show areasAs any visitor to a previous IFSEC will tell you,there is a lot to see at the event so the showhas been divided up into nine specific areas,these are:

Safe Cities - Discovering how to protect vitalinternational cities and hubs from attack, with a

key focus on business continuity and resilience,this area will showcase companies and industrypioneers who have the expertise, experienceand knowledge to guide governments andindustry to plan for the protection of theircities.

Intelligent Buildings - This area will create acombined fire and security area for both events,focusing on the common area of systemsintegration and convergence. Unlike otherfeatures, it is not a showcase of new products,it’s about holistic solutions. In a nutshell,Intelligent Buildings – Fire & Security opens upopportunities for inter-operability andinformation sharing between fire, security, IT,data and building management systems.

IT & Cyber Security - Threats from cyber and ITcrime are increasingly important for businesses.When companies, governments and individualsrely on the internet for their day-to-day business,it’s key to protect businesses and assets. Withdedicated providers helping businesses andgovernments to build their IT and cyber securitystrategy with the latest solutions andtechnology, and with dedicated educationsession, visitors will find everything they need toknow about IT and cyber security here.

Video Surveillance & Intruder Alarms -Covering all aspects of video surveillance andintruder alarms, this dedicated product areawill feature the latest products and services inthe industry, including video surveillance,central control rooms, and the innovations withhigh definition technology. Other products ondisplay include ANPR, IP cameras, remotesurveillance, thermal imaging, video analytics,intruder alarm systems, detectors, keypads andcontrol panels to protect perimeters fromoutside threats.

Integrated Security - To have an efficient andeffective security system, it is essential toensure that systems are integrated. At IFSECthere will be a focus on how to ensure systemsare integrated, so that each product doesn’twork in isolation. This purpose built area willprovide access to providers whose job it is toensure that each area of security is integratedand managed effectively.

Access Control - Securing assets is a majorfocus for international businesses andcollaborative efforts between security and ITmanagers are more and more commonplacewhen it comes to protecting both buildings andthe equipment within them. Key to this is accesscontrol. Driven by rising concerns over publicand private sector safety, the access controlmarket is set to be worth $8.6 billion by 2018.

Perimeter Protection & Physical Security -Due to the heightened threat in today’s world,

28www.risk-uk.com

The event education offering has been developed toensure it has the speakers, the content and the

expertise that is really needed by the industry

The UK apprentice and youngengineers challenge 2014,titled ‘Engineers of Tomorrow’,provides installers and youngengineers with a stage tocompete with their peers andrepresent their company

EDIT article 11 and 18 may14_riskuk_may14 06/05/2014 23:30 Page 2

Page 29: Risk UK May 2014

Curious? How to get the highest quality of IP video surveillance images everywhere, especially in areas with excessive moisture and dust? Our focus is surveillance under extreme weather conditions (-60ºC to +60ºC). To enhance safety and security in these challenging environments, Bosch now offers new ruggedized pan-tilt-zoom cameras. To find out more, visit us at IFSEC, Stand F700, 17-19 June, ExCel, London.

Our focus is taking HD quality to the extremes.

Project1_Layout 1 28/04/2014 11:58 Page 1

Page 30: Risk UK May 2014

the importance of protecting property andassets is paramount to all security strategies.The Physical Security area allows visitors tosee a range of products in physical security,such as perimeter protection, locking systems,safes and more. With increased security threatsfrom terrorism, the need to protect businessfrom external threats has never been greater.

IFSEC AcademyThe event education offering has beendeveloped to ensure it has the speakers, thecontent and the expertise that is really neededby the industry. The IFSEC Academy offersaccess to the best free education from webinarsto white papers, seminars to keynotes.

There will be a range of theatres coveringissues such as counter terror, applications oftechnology across integrated security, IPsecurity, intelligent buildings, access controland biometrics, video surveillance and physicalsecurity plus sessions tailored specially forsecurity professionals within different sectorsand global regions.

Working closely with the Security Instituteand ASIS, CPD and CPE points will be availablefor attending IFSEC Academy sessions!

THEATRES INCLUDE:• ipAssured Education Zone - specialist IP

training and education, in association withAnixter and aimed at both trade visitors andsecurity professionals

• Smart Buildings Theatre - taking a holisticapproach to security, fire, IT, datamanagement and business solutions

• Convergence Solutions Theatre - showcasingthe latest technologies and solutionsavailable for applications today across avariety of disciplines and covering three corethemes: safe cities, protecting transport &critical infrastructure, and future control roomtechnologies

• Tavcom Training Theatre - bespoke trainingfrom training provider Tavcom, on CCTV, IP,access control and more

• IFSEC Global.com Centre Stage - looking atthe key issues and trends defining the futureof security

• Risk and Security Management Theatre - realcase studies, panel debates, interactive Q&Asand more. Security professionals can earnCPD and CPE points while learning fromindustry experts and their peers in themedsessions

• Safe Cities - The need for global city hubs(London being the major contributor to UKplc) to future proof, upgrade and plan hasnever been greater with collaboration fromglobal business leaders, mayor’s office, firstresponders and local and central government.Safe Cities utilise a multi-agency approach,led by the government to protect thepopulation, the infrastructure and a city’seconomy against the threat of terrorism,criminal activity and natural disasters.

Engineers of TomorrowThe UK apprentice and young engineerschallenge 2014, titled ‘Engineers of Tomorrow’,celebrates its 14th year at IFSEC Internationalthis year. The competition, with a first prize of£1000, provides installers and young engineerswith a stage to compete with their peers andrepresent their company.

The Engineers of Tomorrow is sponsored byCSL Dualcom and supported by associationsSkills for Security, NSI and the SSAIB withequipment supplied by Texecom and RISCO.The competition offers young engineers theexclusive opportunity to show the industrywhat they’re made of.

Competitors undertake a 90-minuteassessment, assessing a previously installedintruder alarm system, identify the faults, re-commission the system and finish with anyadditional security and safety measures. Eachentrant is assessed by a panel of judges fromthe security inspectorates, training andcommercial organisations, and points areallocated based on performance in the variousdisciplines.

30www.risk-uk.com

The UK apprentice and young engineers challenge 2014, titled ‘Engineersof Tomorrow’, celebrates its 14th year at IFSEC International this year

EDIT article 11 and 18 may14_riskuk_may14 06/05/2014 23:31 Page 4

Page 31: Risk UK May 2014

IFSEC/Firex

31www.risk-uk.com

New venue, new attractionsAs we’ve alreadyreported in thisedition, the IFSEC andFirex events are at anew venue for 2014,but this will not be theonly new aspect of thethree days. Here wehighlight just a few ofthe new products andservices that will beexhibited from 17-19thJune. More nextmonth…

IDISIDIS has announced plans to introduce an arrayof new products to its DirectIP solution suite atthis year’s event. The proposition encompassesa range of Ultra-High Definition (UHD) and full-HD monitors, designed and manufacturedspecifically for security applications to extendthe IDIS single source offering, while new 4kcameras will expand the signature high-performance of the DirectIP line up.

With four times the resolution and pixels offull-HD, visitors to IFSEC will experienceunsurpassed picture quality in 4K resolutionand the one-stop-shop surveillance solution.Presented across dynamic solution zones, theIDIS team will take visitors through each zone,demonstrating how DirectIP delivers benefitsacross the security buying chain, fromdistributors, installers, and integrators throughto end user customers. The DirectIP zones willencompass a range of applications forcommercial buildings, retail, finance, gaming,and logistics sectors.IFSEC Stand G700

Bosch Security SystemsVisitors to the Bosch stand will be taken on atechnology “journey” through the lens showingwhat is new in the world of video technologysuch as the Bosch 4K ultra HD camera forenhanced safety and security. Users will benefitfrom superior identification capabilities duringlive viewing and in retrospective analysis, evenwhen moving objects and challenging lightingpervade the scene. The DINION IP ultra 8000MP from Bosch makes 4K ultra HD relevant forvideo surveillance, displaying every detail whilereducing bit rates, network strain and storagecosts.

Bosch will also exhibit Dynamic Transcodingtechnology for smooth live video streaming andHD image playback within limited networkconnections. By simply adding a transcoder orstorage solution from Bosch, integrators cangive customers the ability to view HD images oniOS mobile devices or remote PCs withoutstanding image quality. Combined with theBosch Video Security app, users have a solutionfor full access and control of their HD camerasfrom anywhere at any time.IFSEC Stand F700

Hochiki EuropeAt Firex, Hochiki will be demonstrating aworking preview of its FIREscape+ emergencylighting system which integrates addressablefire detection and emergency lightingtechnology to provide an intelligent way-finding solution that represents a step-changein how people safely evacuate buildings. Atraditional emergency lighting system doesnot allow signs to be ‘shut off’, which candirect people into the path of danger.FIREscape+ addresses this by identifyingwhere in the building the fire is taking placeand communicates the safest route.

Visitors to the Hochiki stand will also seeworking examples of both EN and UL approvedfire control panels that make up the HFP firedetection system offering. HFP utilises

Hochiki’s Enhanced SystemsProtocol (ESP), a communicationlanguage which is practicallynoise-immune, negating falsealarms and reportedly providingone of the most robust systemsavailable. The HFP rangeincludes Hochiki’s latestgeneration of smoke sensorswhich feature the company’sHigh Performance ChamberTechnology. The design of theoptical chamber in theseproducts minimises thedifferences in sensitivityexperienced in flaming andsmouldering fires, helpingreduce false alarms. Firex Stand Q600

EDIT article 11 and 18 may14_riskuk_may14 06/05/2014 23:31 Page 5

Page 32: Risk UK May 2014

IFSEC/Firex

32www.risk-uk.com

TrakaTraka will be offering visitors an opportunity topreview the Traka21 plug and play unit, whichwill be ready for serial delivery starting in thefourth quarter this year.

Traka21 is a key management solution in aplug and play unit, designed for the needs ofsmall to medium sized businesses. The systemallows stand-alone operation, so there is noneed to connect to a PC. However, users can stillaccess basic reports on the screen and can setup PIN codes to allow access to designated keys.Jointly available with the release of the Traka21will be a new single use security seal developedby Traka to be employed without the need for aspecialised tool. The unit also enables users toimport user access rights and export audit datavia USB thumb drive connectivity.

Tanveer Choudhry, Global Marketing Managerfor Traka, said, “As security solutions grow insophistication, physical keys are becoming theweak link when it comes to traceability andaccountability. Not all businesses will have aneed to install one of the larger Traka systems,but they will still require a robust keymanagement solution to ensure that the weaklink does not jeopardise the overall security ofthe operation.” IFSEC Stand D1700

WAGNERVisitors to WAGNER’s stand at this year’s FirexInternational will be able to experience at firsthand fire protection products and solutionsdesigned for the most demandingapplications. Protecting high-value assets,ensuring business continuity and enablingzero-downtime are key features of WAGNER’ssolutions - OxyReduct fire prevention and theTitanus family of air sampling smokedetection systems.

OxyReduct creates an environment wherefires cannot start, by continuously reducingthe oxygen level in a closed room throughadding nitrogen to the air. The oxygen isreduced to a level in which most combustiblesdo not inflame and an open fire is impossible.Importantly, people can enter and work in theprotected area at any time. Unlike traditionalfire protection technologies, OxyReductensures that valuable assets or equipmentwill not be damaged by smoke or water/gasfrom extinguishing systems.

Providing very early warning of smokeprovides a critical advantage for buildingusers, enabling them to react decisively beforea fire takes hold and causes significantdamage. The TITANUS range of air samplingsmoke detection systems offers features thatensure early detection for the whole spectrumof possible fires. Firex Stand P400

EVVAEVVA will be represented at IFSEC for thefirst time. Increasing awareness in exportmarkets and the high market potential of thenew electronic locking systems by EVVA arereasons for participating at IFSEC. The Xesarand AirKey are the main focus of the stand.

Xesar offers companies a host of productsand application options as well as timelessdesign. Xesar scores high with a simpleinstallation, free Xesar software and EVVAKeyCredits.

AirKey turns NFC-compatiblesmartphones as well as identification mediainto keys. The system does not require itsown IT infrastructure. IFSEC Stand D1900

VimpexThe newly developed Vimpex VAD23 range ofVisual Alarm Devices combines aestheticswith design. The detector base-mountedthree-way platform sounder/beacon offersone point of installation for those requiringan EN 54 Part 23 compliant beacon andunambiguous voice messaging or multi-tonesounder. A wall mounted Banshee Excelsounder/beacon, a wall mounted beacon anda ceiling beacon complete the VAD23 range.

The Fire-Cryer range has been furtherdeveloped to include EN 54 Part 3 compliantproducts. Also on show will be the Implaserline of photoluminescent life safety signage.Featuring brightness levels reported to bemany more times than required by theStandards, the Implaser line is ideal forsafety signage in areas such as publicbuildings, tunnels and escape ways. Visitorscan experience the performance ofImplaser’s signs by visiting the speciallyconstructed display tunnel on the stand.Firex Stand P850

EDIT article 11 and 18 may14_riskuk_may14 06/05/2014 23:31 Page 6

Page 33: Risk UK May 2014

BSIA comment

With the world market for fire protectionand security valued at around £176.8bn,raising awareness in overseas markets of

the quality of UK products and services is a keyfunction of the British Security IndustryAssociation (BSIA), the trade associationrepresenting the UK’s private security industry,and in particular its Export Council, a dedicatedforum for BSIA member companies who arefocused on extending their local business tooverseas markets.

In a challenging economic climate, anincreasing number of UK companies are turningto export to strengthen revenue, with membersof the British Security Industry Association’sExport Council receiving an extra boost throughthe Association’s organisation of UK pavilionsat overseas exhibitions, which play a vital rolein forging productive trade links between UKsecurity companies and overseas buyers fromaround the world.

Estimates by the Office of National Statisticsindicated that UK exports to non-EU countriesincreased by £15.7 billion between 2010 and 2011,with the weakening of the pound against othercurrencies enabling UK products to compete moreeffectively against their overseas counterparts.Indeed, exporting is often seen as the key toeconomic recovery, meaning that more and moreUK companies, including those operating in thesecurity sector will be looking further afield forbusiness opportunities in the future.

Despite all of the potential benefits, however,exporting can be challenging for businesses,both in terms of the initial start-up and inexpansion into new markets. Challenges thatare often faced by UK companies includeovercoming the language barrier, as well asunderstanding legal and cultural differencesbetween countries. Support from organisationssuch as UK Trade and Investment (UKTI) and theBSIA can prove to be invaluable in both cases.

One of the services currently offered by theBSIA is the organisation of UK Pavilions atoverseas events. Here, UK security exporterspromote their products and services alongsideeach other at a reduced cost, enabling them toshare expertise while receiving support andguidance from the BSIA.

John Davies, whose company, TDSi, regularlyattends overseas exhibitions, comments:“Overseas trade shows such as IFSEC’sinternational counterparts, Security Essen, MIPSRussia and Intersec Dubai are essential inhelping BSIA Export Council members forge

links with overseas companies, andBSIA members’ attendance of suchevents has shown no sign of slowingdown.”

Tom Sharrard, whose company, IDL, hassuccessfully exhibited at many BSIAoverseas pavilions over the years,comments: “I would recommendthe BSIA overseas pavilions toany security company that isentering a new overseas marketor anyone new to exporting. BSIAtakes care of a lot of theorganisational aspects, includingthe shipping, and makes the whole experiencefar less daunting. Also, there is the support andadvice from other UK companies in the Pavilion.Another major advantage is that the BSIA canoften secure a better location in the exhibitionthan individual companies would be able to.”

Also playing a major role in facilitating accessto overseas events is UKTI’s Tradeshow AccessProgramme (TAP) scheme, which now offersincreased grants of £3,000 per company tosupport their attendance of overseas events.Last year, TAP funding enabled ten BSIAmember companies to attend IFSEC South EastAsia and IFSEC Istanbul, which took place inSeptember and October.

Mike Parry, International Sales Manager forSecurity at Remsdaq , and winner of the BSIAChairman’s Award for Exporting in 2011, adds:“Remsdaq have attended events in USA, Europe,Asia, Africa and the Middle East under the UKbanner. The main reason for us attending in thisway is the partial funding that’s often available,which makes these events far more attractive inthat we can at least do more of them.”

Mark Tibbenham, Managing Director of GJD,also a BSIA member, concludes: “I cannotspeak highly enough of the professionalorganisation and the fantastic image the UKPavilion provided for UK exhibitors. BSIArepresentatives are always on hand to help withabsolutely anything at all. The freightmovements in and out are always very wellcoordinated and organised.

“Certainly, there is a real sense of pride whenbeing on a themed pavilion with other UKcompanies. Above all else, we definitely getvalue for money!”

The overseas pavilions organised by the BSIAare not solely open to BSIA members, but to allsecurity companies keen on gaining a moresecure foothold in export markets.

UK security on the world stage

33www.risk-uk.com

Despite all of thepotential benefitsexporting can bechallenging forbusinesses, both interms of the initialstart-up and inexpansion into newmarkets

The BSIA’s AmandaCaton explains thevalue of overseasevents in boosting theUK security sector’sprofile

EDIT article 7 may14_riskuk_may14 06/05/2014 22:57 Page 1

Page 34: Risk UK May 2014

Upgrade to IP signalling

WebWay unique encryption

We engineer peace of mind into everything we do

Request WebWay from your security provider

solutionsIntelligent GPRS

roaming for a reliable back up

Designed, manufactured

and supported in the UK

Reduced keyholder callout

WebWayOne LtdTrusted Signalling Experts01635 231500

[email protected] www.webwayone.co.uk

Project1_Layout 1 06/05/2014 17:16 Page 1

Page 35: Risk UK May 2014

Power over Ethernet

Arecent Home Office report, the CommercialVictimisation Survey (CVS), found thatcommercial businesses in the UK

experienced some 6.8 million thefts in one yearalone. The problem is even more pronounced forwholesale and retail, with these sectors the mosttargeted by thefts; there are around 19,701security incidents per 1,000 shops, which areprimarily shoplifting.

With statistics of this kind, it’s no wonder thatcompanies are looking to tighten security. CCTVsurveillance becomes a critical element of thesestrategies, as retailers and other businesses lookto protect their stock, staff and customers.

Another report published by the BritishSecurity Industry Association (BSIA) paints apositive picture in terms of how organisationsand retailers are stepping up to this securitychallenge, estimating there are now between 4million and 5.9 million CCTV cameras in the UK.This figure is only set to grow, as technologyadvances and the related costs start to reduceand make these systems more accessible.

Moving from analogue to IPThe use of analogue cameras is dwindling andthe market is moving towards IP cameras thatare capable of sending and receiving data via acomputer network. The technology behind CCTVis changing, and this means even independentshops have the opportunity to push towards IP-led CCTV systems.

It presents a big opportunity for securityinstallers, who will see a shift in emphasis fromsimple video footage monitoring to providingintelligent systems that offer advanced videoanalytics that can spot abnormal patterns ofbehaviour.

Differentiating in an IP-led CCTV world Unlike analogue systems, IP surveillance isfocused on the network rather than the camera.The network becomes the heart of theinstallation, with the cameras and securitysoftware an extension of that core.

This means that your focus as an installerneeds to change, as your primary goal becomesdeploying a network that can handle fast datatransfer and advanced analytics, rather than acamera and monitor.

For the first time, infrastructure is moreimportant than the camera and for manytraditional security installers this can be quitedaunting. Suddenly there’s a game change inyour industry and the IT or network managerscan challenge your expertise.

By extending your skillset to IP you can

future-proof your business and offer customerssolutions that will increase flexibility, resilienceand long-term cost savings.

Power-over-Ethernet NetworkbenefitsPower-over-Ethernet (PoE) networks are ideallysuited to CCTV surveillance and there are anumber of benefits to taking this step forsecurity instalments. IP cameras are poweredstraight from the network switch using a PoEcable, which offers a centralised distribution ofpower for a company’s whole security system.

This versatile approach means that if a poweroutage takes place then any critical device onthe network can be protected by a centralisedsource for power backup, e.g. uninterruptiblepower supply (UPS) or even a generator. It isalso possible to offer customers a more cost-effective approach where they can save moneyby removing the need for a fixed power supplyand local battery at the device.

It is also possible to offer remote managementso that, if a system does go down, you can alsoreboot it remotely. This will save your clientsmoney and prevent the need for an offsite visitfor you or your engineers. Your client won’t beconstrained by either fixed cabling or systemsand will be able to place cameras in even thetrickiest of locations.

The CCTV evolution

35www.risk-uk.com

The importance of Power over Ethernet in security,by Chris Hay, Allied Telesis

Unlike analogue systems, IP surveillance is focused onthe network rather than the camera; the networkbecomes the heart of the installation

EDIT article 2 may14_riskuk_may14 06/05/2014 17:33 Page 1

Page 36: Risk UK May 2014

Power over Ethernet

Intelligent buildingsI highlighted smaller shops as a prospectivecustomer for IP-based CCTV but, on the otherend of the scale, larger premises such asshopping centres, offices and warehouses can allbenefit from using one network system tobecome ‘intelligent’.

Analogue infrastructure relies on multiplesystems (for example a camera system and dooraccess or other systems), which are not alwayscompatible, trying to work together to catch anintruder in the right location. By using an IPsystem, installers can automate alarms, lightingand a host of other functions that communicatewith each other and act accordingly.

The benefits of IP systems can also extend farbeyond security. In the future installers will beable to design an intelligent network to set lightsto come on or even turn the heating on and offas the first person walks through the door or thelast person leaves, and also extend these tocomplete building management.

The potential for business to save energyusing these systems is huge and will be a driverin the upsurge of IP switches and opportunitiesfor installers.

Ensuring uptime in surveillancesystems The advantages of IP security systems areendless, but the network is a key enabler for thistechnology. By using IP all your security systemswill be converged so they can all work togetherto tighten the security of your building.

As multiple systems start being run on onenetwork, ensuring uptime will be key; if thenetwork goes down, so does everything on it. Asa result, high performance and resiliencybecome critical in the network design for yourcustomers’ IP surveillance systems’.

For businesses, margins and profitability arecritical so expenditure is a key focus, but it’simportant to reinforce to your customers thatwith IP-based surveillance the network designmust receive the budget it deserves. If thebuilding and goods are valuable enough toprotect with state-of-the-art security systems,then your clients should not be cutting cornerson the infrastructures they run them on.

By using an IP system, installers can automate alarms,lighting and a host of other functions that communicate

with each other and act accordingly

Telephone : 0191 296 3242 www.ssaib.org

Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guardingand Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuablesin Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.

The leading certification body for Guarding Services.

CERTIFYING SECURITY

SSAIB

EDIT article 2 may14_riskuk_may14 06/05/2014 17:33 Page 2

Page 37: Risk UK May 2014

Pre-employment screening

37www.risk-uk.com

In the European Union,where privacy is afundamental humanright, data privacy anddata protection providespecific protections toindividuals

Traci Canning SVP andManaging Director forEMEA at First Advantage

Pre-employment screening has become astandard tool in risk mitigation strategiesfor companies worldwide. Organisations

understand the need to mitigate risk, but mayface challenges when considering the myriad ofcompeting (and sometimes apparentlyconflicting) legal, regulatory, organisational andgeographic nuances.

Regulatory and audit riskWhile screening programs are designed tomitigate risk in a gatekeeper capacity, theydemonstrate to regulators and auditors that anorganisation has taken appropriate measuresto ensure compliance and governance.

Those hiring in regulated industries arekeenly aware of their obligations. For example,one of the requirements of the FinancialConduct Authority (FCA) is for financial servicesfirms to “assess (your) staff’s competence andtechnical knowledge.” The FCA provides furtherguidance on how to do this, with its applicationof the “fit and proper” benchmark: “The mostimportant considerations are the individual’shonesty, integrity and reputation; competenceand capability; and financial soundness.”

Outside of regulated industries, companiesimplement screening programs to demonstratetheir compliance with fair hiring practices andtheir own internal mission and visionstatements.

But regulatory risk is not limited to specificsectors and industries. In the European Union,where privacy is a fundamental human right,data privacy and data protection providespecific protections to individuals.

In practice, this means an organisation mustbalance its business risk with the privacy andpersonal data protection rights afforded to itscandidates. The following points offerguidelines on key areas of focus to achieve thisbalance:

Permissible purpose. For pre-employment orpre-engagement (e.g. contractor and contingentworkers) screening, the permissible purposecan be defined as the means of determiningsuitability for employment or engagement. Atthe most fundamental level, pre-employmentscreening is information verification – validatingwhat a candidate has declared as their identity,qualifications and history.

Proportionality. The depth and breadth ofscreening should appropriate to the role. Forexample, it could be considered proportionateto conduct a credit check for a managementaccountant’s position, whereas for otherpositions such a check may be considereddisproportionate.

Relevance. A companion to proportionality

above, an organisation conductingscreening should not requestinformation beyond what is requiredto execute the particular checks. So,it would not be considered excessivecollection to ask a candidate for theirmother’s maiden name if a UK BasicDisclosure was being conducted, butit would be irrelevant if onlyeducation and employment checkswere being done.

Transparency. The candidate mustprovide consent to the pre-employment screening. While the followingguidelines are not exhaustive, the consent formshould outline the purpose of the screening(suitability for employment) and the types ofchecks likely to be conducted. As a businessmatter, transparency around the screeningprocess supports a positive candidateexperience.

Understanding the focus areas becomesimportant when considering the geographicnuances of screening. As countries around theworld consider whether their privacyframeworks should strictly follow EU standards,or be based on regional or hybrid models,varying interpretations of the key conceptsarise.

As a practical matter, this creates the needfor flexibility and understanding of what ispossible when deploying programs outside theUK, or when executing programs where UKcandidates have international components totheir history:

Criminal records. Third-party access tocriminal records is not permitted in certainEuropean and Asia Pacific jurisdictions

Credit checking. In certain European, Africanand Asia Pacific countries, this check may onlybe used to determine credit worthiness (not tomake a hiring decision). While civil litigationchecking may be substituted in those countries,it is worth noting that such substitute checksmay not provide verification of address history.

Employment verifications. While it would beconsidered usual to request written verificationof employment history (especially regulatedreferences) in the UK, a US employer would bemore generally accustomed to verbalverifications.

Education verifications. Certain Europeanjurisdictions may require specific additionalconsent from the candidate. Certain institutionsaround the world may not accept e-signature asvalid.

Detecting discrepancies

EDIT article 17 may14_riskuk_may14 06/05/2014 23:09 Page 1

Page 38: Risk UK May 2014

OxyReduct® fire prevention

R E M O V I N G T H E

T H R E AT O F F I R E .

www.wagner-uk.com

entionvee prOxyReduct® fir

ary of Birmingham hasw Librhe neT

chosen OxyReduct® to pr

es, the same as ochivaluable arv

700 other businesses and or

ope.ound Eurar

ary of Birmingham has

otect itschosen OxyReduct® to pr

erves, the same as o

ganisations700 other businesses and or

our fire detection,w good yNo matter ho

xtinguishing or suppression system is, a firee

ork – so some damagehas to start for it to w

vitable. In mission critical applicationsis ine

where any business interruption is unaccep-

arehouse stock or archivtable or where w

are invaluable, a different approach to fire

ention is needed.vpre

our fire detection,

xtinguishing or suppression system is, a fire

ork – so some damage

vitable. In mission critical applications

where any business interruption is unaccep-

esarehouse stock or archiv

are invaluable, a different approach to fire

ys innoOxyReduct® emplo

that continuously reduces the o

room by adding nitrogen to the air

el in which combustibles dovis reduced to a le

not inflame and an open fire is impossible.

, people can eImportantlyy,

isit our in-house demonstration facility andV

xperience a fire-free environment at first hand.

e technologyvativys inno

el in avxygen lethat continuously reduces the o

xygenhe o. Troom by adding nitrogen to the air

el in which combustibles do

not inflame and an open fire is impossible.

, people can enter the area of risk.

isit our in-house demonstration facility and

xperience a fire-free environment at first hand.

xperience a fire-free environment at first hand.e

-uk.comagner.wwww

xperience a fire-free environment at first hand.

Project1_Layout 1 06/05/2014 17:26 Page 1

Page 39: Risk UK May 2014

PSIM

On the railways incidents are a dailyoccurrence and how they are managedhas a huge impact on the network

operator, train companies, emergency services,staff and of course passengers. By improvinghow incidents are handled you can meet yourprimary objective of ensuring the safety andsecurity of all, but also make a hugecontribution to minimising delays anddisruption to the timetable, as well as the costimplications or compensation and stiffpenalties if the railway does not hit itsoperational targets.

Regardless as to whether it is a minor delayto a passenger train, or an act of terrorism,every incident can be divided in to a lifecycle ofthree distinct phases – preparation,management and investigation. How successfulan incident is handled rests on the quality ofthe preparation that has been put in place, thespeed at which the incident is detected and theability of those responsible to carry out theirduties as quickly and effectively as possible, toprevent unnecessary escalation. Finally, youneed to be able to review the incident and learnfrom it, in order to mitigate the risk of itrepeating.

Fortunately, serious incidents on the railwaysare infrequent, but when they do happen theimpact is immediate and intense, with hugemedia attention and scrutiny. However, railcompanies are also painfully aware of thecumulative impact of minor incidents which cancost many many millions annually. In fact, it isestimated that cost per minute of a delay isover £70!

As a result rail operators have investedheavily in a plethora of safety and securitysystems such as CCTV upgrades (analogue toIP, as well as a significant increase in theoverall number of cameras), advanced videoanalytics, access control systems, smokedetectors, fire alarms, perimeter alarms, audiocommunications, help-points, customerinformation and public address systems etc.

The challenge with increasing the number ofsystems is how the people responsible formonitoring them make sense of the mass of BigData that is being pushed at them, withoutsuffering from information overload. And, whenthey are alerted to an incident how do they useall of the tools and systems at their disposal tomanage it, in accordance with best practise?

Situational awareness, or PSIM (PhysicalSecurity Information Management) is an

approach that many railoperators are using to make thewhole process simpler, bytaking this Big Data andtransforming it into operationalintelligence. Aeroexpress inMoscow, ProRail in theNetherlands and King’s Crossstation in London have allrecently announcedimplementations of PSIMsolutions at their operationalcontrol centres, to take thesesiloed gateways, collate themand deliver the operator in thecontrol room with a single,clear, real-time operatingpicture. Here is a typicalexample of how the systemworks…

An alarm is received in thecontrol room, where anoperator is sat at his stationwith three large screens in frontof him. The alarm comes from acamera in an area defined asrestricted for access,registering motion wherepeople are not supposed to be walking freely.

On the left screen he sees what’shappening, with video streamed directly fromthe relevant camera. The video analyticsapplication has identified that it’s a personand then zoomed in to provide a closer look.Meanwhile, the right screen is displaying aGIS map, so he can see exactly where theincident is happening.

The operator uses the middle screen as his‘nerve centre’. All of the feeds from all of thesystems and sub-systems are being unified togive him a total awareness of what is going onand where. What is more, as the incidentunfolds the operator is given clear and conciseinstructions directing him what to do andwhen, in accordance with best practice (pre-defined by the rail operator using adaptiveworkflows). The system further supports theoperator by automatically completing actionsas certain triggers are reached.

A PSIM solution comes in to its own whensecurity and maintenance teams on theground and the third party stake-holders suchas train operators, transport police and otheremergency services need to be involved. Thenthe operator is able to share in real-time vital

The incidentals of incident handling

39www.risk-uk.com

By Udi Segall, Director of BusinessDevelopment at NICESystems

Regardless as towhether it is a minordelay to a passengertrain, or an act ofterrorism, everyincident can bedivided in to alifecycle of threedistinct phases

EDIT article 8 may14_riskuk_may14 06/05/2014 22:58 Page 1

Page 40: Risk UK May 2014

PSIM

information and co-ordinate the response allfrom his chair. For example, if there is a fire ona freight train the operator can review themanifest and details of the cargo beingtransported (e.g. whether it is hazardous) tothe fire crew en-route, so they are fully awareand ready to take the necessary action assoon as they arrive.

A PSIM solution not only captures all of thedata feeds from all of the systems, it is alsostores all of the actions that are being taken.So, whether immediately after the event ordays, weeks or even years later, the entireincident can be reconstructed, synchronisedand replayed in chronological order, whetherfor training, as part of a continuous cycle ofimprovement, or for evidence submission.

By shortening the lifecycle, incidents arehandled faster and investigations can becarried out quicker and in far more detail.Lessons learnt can be fed back in to the systemwithin hours, so if a similar incident occurs theoperator will be hand-held through a newimproved workflow.

In the case of ProRail, the organisation isusing its PSIM solution to facilitate the effectivemanagement of 45,000 incidents a year, of which

45 are crisis incidents on the Dutch rail network.At the heart of PSIM is an understanding

that in high pressure situations people areexcellent at making the right judgements anddecisions based on the information they arepresented with. PSIM takes very complextechnology systems and presents only thevaluable information to the operator in a waythat enables them to use their skills. However,as we are all prone to making mistakes, ortaking the occasional short-cut, the workflowsalso provide a vital fail-safe. So, whether youhave been working in the control room for twoweeks or twenty years, the quality of incidenthandling will be consistently high.

Reducing the probability of an incidenthappening and lessening the impact of thosethat will inevitably occur, not only creates asafer and more secure environment for all onthe rail network, it also means that the savingmade can be redeployed for investment inother areas of the organisation. When we talkabout security it is rightly argued that youcannot put a price on a life, however PSIMprovides a compelling proposition wherebyyou can greatly improve safety and savesubstantial costs at the same time.

A PSIM solutioncomes in to its own

when security andmaintenance teamson the ground and

the third partystake-holders need

to be involved

www.tdsi.co.uk | [email protected] | +44(0)1202 724 999

17th – 19th June, ExCel LondonStand F1100

Visit TDSi at IFSEC 2014 TDSi protects people, assets and

information by providing high quality, cost

effective and well supported integrated

security management systems.

We specialise in the design, manufacture

and support of access control and

CCTV solutions and integrate with other

electronic security solutions, including:

Texecom Intruder Panels

Aperio Wireless Locking

Milestone VMS

TDSi’s VUgarde VMS

Microsoft Active Directory

With customers around the world, millions

of people a day rely on TDSi to gain

secure access to installations of all sizes

and business types. For advice on your

next installation, look no further

than TDSi.

EDIT article 8 may14_riskuk_may14 06/05/2014 23:01 Page 2

Page 41: Risk UK May 2014

BSIA comment

The case for zero-hour contracts

41www.risk-uk.com

Reports of peoplebeing put ‘on call’24/7, with the threatthat their contract willbe terminated if theydon’t turn up at shortnotice, are widespread

Recently the debate overzero hour contracts hasreturned to the mediaand political spotlight.Peter Webster, CEO ofBSIA member companyCorps Security,discusses the benefit ofthese contracts in theprivate security sector

The recent media furore concerning zero hourscontracts has been fascinating both in termsof the diverse opinion that it has generated

and the level of misinformation surrounding thisissue. It’s been particularly interesting to witnessso much vitriol being directed at a scheme that, inthe right hands, is highly beneficial for employerand employee alike.

Exactly how many people are on zero hourscontracts is a subject of some conjecture.Figures from the Office for National Statistics(ONS) suggest that 250,000 UK workers –around one per cent of the workforce – areemployed on these terms. However, a recentsurvey of employers by the Chartered Instituteof Personnel and Development (CIPD) estimatesthat the real number is more than one million,with one in five employers having at least oneemployee on a zero hours contract. This is quitea discrepancy, which doesn’t help whenassessing its impact.

Put simply, zero hours contracts allowemployers to hire staff with no guarantee ofwork. Employees work as and when they areneeded and only get paid for the hours theycomplete. A number of politicians have voicedtheir concerns about the growing use of thesecontracts and Vince Cable, the businesssecretary, recently stated, ‘There has beenanecdotal evidence of abuse by certainemployers – including in the public sector – ofsome vulnerable workers at the margins of thelabour market.’

It has been alleged that some employers areusing zero hours contracts to create anintolerable situation for their employees.Reports of people being put ‘on call’ 24/7, withthe threat that their contract will be terminatedif they don’t turn up at short notice, arewidespread.

While I am against this system being abusedand wholeheartedly condemn the exploitationof those who can least afford to lose their jobs,I fervently believe that zero hours contracts,when used correctly, are good for bothcompany and employee. My positive stance onthis issue is based on my own experience atCorps Security, where we have used zero hourscontracts since 2011.

The vast majority of our contracted officersand all of our temporary employees have no orlimited guaranteed hours in their contracts,primarily due to the fact that they are requiredto attend more than one site, and with shiftcycles there is rarely a set weekly or monthlyworking pattern. However, such is the demandfor the services of our personnel that in practice

the majority are given at least 40 hours of workeach week. Furthermore, we put no barrier inthe way of any officers who wish to supplementtheir income by working elsewhere, provided itdoes not constitute a conflict of interests.

We are certainly not alone and it is verycommon in the manned guarding sector to usethese terms. Flexibility is the key for us and I’mproud that we are able to offer employment to adiverse group of people who otherwise couldfind it difficult to earn money. For example, weemploy numerous retired people who welcomethe chance to do ad-hoc work to supplementtheir pensions, and enjoy being part of anorganisation that places value their knowledgeand skills. We also take on younger people withfamilies who are able to work around theirdomestic commitments. We offer shifts tocolleagues who are under no obligation toaccept them and it does not harm their futureprospects if they do refuse them.

In a growing number of cases, the traditional9am-5pm working day is no longer suited tomodern lifestyles and flexible contractsaccommodate this trend. We appreciate thatflexible contracts have to be flexible for both usand our colleagues. It is also worth noting thatour zero hours contract colleagues have thesame employment benefits as the majority ofour other hourly paid colleagues and no-one isdisadvantaged because of their employmentcontract flexibility. Also, because they do nothave to commit to providing a specific numberof hours employers are more willing to offerthese types of opportunities.

Part of our corporate ethos involves providingour clients with officers who are equipped tocarry out their roles to the highest standards.Our training and skills developmentprogrammes are a cost that we bear for all ouremployees – including those on zero hourscontracts. Having made this investment, it islogical for us to utilise these skills as often aswe can by offering plenty of work for ourflexible workforce.

I sincerely hope that the government takesthe time to understand the positive aspects ofzero hours contracts and avoids making thekind of kneejerk reaction, like it has done withTUPE, which could harm the people it is tryingto protect. While any instances of abuse thatcontravene employment law should obviouslybe tackled, more should be done to encouragethe correct use of zero hours contracts andaccentuate the positives of this type ofemployment.

EDIT article 16 may14_riskuk_may14 06/05/2014 23:07 Page 1

Page 42: Risk UK May 2014

Euralarm - the association of Europeanmanufacturers, installers and serviceproviders of the electronic fire safety and

security industry - represents the electronic fireand security industry at European andworldwide levels. The organisation providestechnical and market expertise for policymaking and standardisation work in the field ofsecurity and fire safety. Among the main fieldsof activity are fire detection and alarms,intrusion detection and alarm systems, accesscontrol, video surveillance, alarm transmissionand alarm receiving centre. Founded in 1970,Euralarm represents over 2,500 companieshaving a total turnover of appr. 16.4 billioneuro, 70% of the total European fire safety &security market.

As a result of the increasing impact oftraditional fire and security risks, as well asinfrastructure failure, natural disasters andterrorism, Europe requires a ‘future proof’integrated alert and response system. It callsfor the capability to integrate existing andfuture technologies, human behaviour andsolutions currently in place in buildings andtransport systems. The management andexchange of knowledge in disaster situationsas well as the harmonisation of nationalsolutions in Europe must be reviewed.

BackgroundToday there is an ever-increasing urbanpopulation density, with citizens spending moreand more of their time in complex buildingstructures such as airports, shopping malls andskyscrapers. The basic need of both individualsand society for protection against eventsendangering life, limb and property has not

changed. However there is a shift in thetypes of dangers, their

complexity and themagnitude of damage.

This requires aconcept that, if

implemented, wouldwarn and inform

those exposed torisks or threatsregardless oflocation andlanguage.Achieving thiswill necessitatethe ability to

reach those

in danger at any time of the day, be it at homeor work, inside buildings, in transport systemsor in public spaces. This is made possible byleveraging various alert and communicationtechnologies and infrastructure, such as indoorand/or outdoor sirens/public address systemsas well as strobe lights along with personalcommunication devices.

In 2008, it became clear that Europe islacking such a comprehensive andmultinational system to alert the population ina crisis situation. Many systems dating fromWorld War II have been dismantled and thesystems, which still exist, do not meet therequirements of a modern, mobile andmultilingual population and life style. TheEuropean crisis management organisations andthe member state are facing a technologicalchallenge and financial risk in providingadequate public alert systems.

European levelThe EU recognised the lacking of acomprehensive and multinational alert systemand made substantial funding in the FP7-Programm available, to investigate modernsolutions based on smart-phones, tablets andsatellite based communication channels. Itsoon became clear that the European fire safetyand security industry represented by Euralarmcould play an important role in findingsolutions to this complex problem. Euralarm’smembers and the members of the nationaltrade associations have an enormousexperience in alarming and informing personsin crisis situations in buildings and buildingcomplexes. Furthermore the hundreds ofthousands of already installed systems couldplay a role complementing new alertingchannels such as Smart-phones.

A complementary channel In August 2012, Euralarm teamed up with theFP7 sponsored Alert4All team to set-up ademonstration scenario that should prove thefeasibility to interlink traditional alarm systemsto the public alert system designed byAlert4All. A small team of Euralarm specialistsimplemented the Fire Alarm-, Voice Alarm-,Security Systems and so called “MassNotification System”, which are able to capturethe crisis alert signals emitted by a satellite,transport them into the building/homes theyare protecting and alert the occupants.

In the fourth quarter of 2013 theAlert4All/Euralarm system was demonstratedsuccessfully on the premises of the GermanAerospace Centre (DLR) near Munich. More the50 participants from all over Europe

Public notificationHere we look at PEARS,

smart solutions forEurope-wide Public

Alert System

42www.risk-uk.com

Today there is anever-increasing

urban populationdensity, with citizens

spending more andmore of their time in

complex buildingstructures

EDIT article 6 may14_riskuk_may14 06/05/2014 17:41 Page 2

Page 43: Risk UK May 2014

representing the research community, civilprotection authorities, first responders andindustry follows the presentation and the livedemonstration.

Using installed baseThe PEARS project has demonstrated that fireand security products not only can, but alsoshould be integrated into public alert systems.The extensive installed base could be easilyupgraded to receive alert signals which couldbe utilised to activate audible and/or visualwarnings. More sophisticated systems, likeMass Notification Systems, can convert publicalert messages into intelligible voice messagesor display the same message on PCs, LCD-screens, etc. Integrating existing safety andsecurity systems into a public alert scenariocould be a cost effective and rapid alternativeto reach large parts of the population.

Domestic security systems, in many casesconnected to alarm receiving and monitoringcentres via bidirectional communication lines,can receive alert messages as well as domesticsmoke detectors properly equipped with acommunication interface can easily integratedin public alert scenarios.

The demonstration enabled Euralarm toexplain its solutions and capabilities to a newrange of stakeholders in the safety and securityworld, who did not know about the potentialofferings of the fire safety and security industryimproving the safety of the Europeanpopulation.

Next stepsEuralarm will take the next step and providepolicy makers and the industry a view towardsincreased safety and security by outliningoptions to close the existing gap betweentraditional systems in buildings and publicalert. Two examples of this are systems forMass Notification as well as home smokedetectors with enhanced functionality foremergency public alert applications.

These solutions contribute to an improvedsafety of the population in buildings andcampuses; not only in situations of major crisis,but also in the traditional fire safety context.With its vast experience in standardisationEuralarm will also support the “public alertcommunity” in defining the rightcommunication interfaces to build up a trulyEuropean Public alert system.

The PEARS projecthas demonstratedthat fire andsecurity productsnot only can, butalso should beintegrated intopublic alert systems

Public alert systems

Available Now!! SA66 & DA66Two new revolutionary electric locks that solve all the issues with transom fittingand Side loading on both single and double action doors. Issues with shear locks,and solenoid bolts are problems of the past.

• Releases under side loads in excess of 100kg (PRen13637)• Holding force of 1000kg• 10mm thick solid stainless steel bolt• 13mm bolt projection• Pulls door closed if misaligned by up to +/- 8mm• Fail safe/fail secure • Bolt stays retracted until door is closed to eliminate bolt noise • Door and bolt position monitors• Surface housings available for both timber and glass mounting• Fire rated BS.476.Part 22-1987

www.secure-access.co.uk Tel: 0845 1 300 855 [email protected]

EDIT article 6 may14_riskuk_may14 06/05/2014 17:41 Page 3

Page 44: Risk UK May 2014

44www.risk-uk.com

Changing business requirements and thedemands of a global economy have driventhe evolution from early technology recovery

solutions within timeframes of days to weeks totoday’s environment of continuous businessoperations. Where disaster recovery once gaveway to business continuity in the mid 1990s,business continuity is now giving way to businessresilience. Availability, recovery, security andcompliance techniques have converged and mustbe managed to create an infrastructure that cansustain true business resiliency.

Business resilience protects your business,people and assets from threats that could impactthe organisation’s viability. If and when yourbusiness is faced with unexpected events,preparation minimises the impact and speed ofrecovery. The business must be ready and rapidlyadapt and respond to opportunities, regulations,risks and threats to maintain reliable, continuousbusiness operations.

Business resilience integrates strategicplanning, organisational structure, business andIT processes, IT infrastructure, applications anddata and facilities. However, it is the practice ofplanning, coordinating, facilitating and executingactivities that ensures enterprise effectiveness inidentifying and mitigating operational risks. Itincludes responding to disruptive events (natural,accidental and intentional) showing commandand control, recovering and restoring businessoperations after a business disruption becomes adisaster and conducting a post-mortem toimprove future recovery operations.

To build a resilient business: risk management,incident management, crisis management andbusiness continuity must be addressed. Despitebeing in different divisions – corporateleadership, HR, legal or risk management – thedisciplines dovetail to create a set of plans andactions that result in organisational resiliency.

During the planning phase strategy, risk andcompany long range plans are evaluated anddocumented into incident management, crisismanagement and business continuity plans.These are living documents annually evaluatedfor improvement and updated. If an event occurs,the plans are examined post incident andimproved to address gaps.

Risk managementA risk management organisation identifies,assesses and prioritises different kinds of riskthat could affect the business. Once identified,plans are developed with strategies to minimise

or eliminate the impact of negative events.Businesses have six types of risk: operational,

financial, organisational, strategic, technologyand legal. They are addressed at the enterpriselevel with strategic and guarded plans as theyreveal potential vulnerabilities.

Risks are summarised in a “heat map” whichillustrates the likelihood and the severity of theconsequences that the risks could have. Whilststrategies mitigate or eliminate risk, the processfor identifying and managing risk is a riskassessment and consists of: • Identify threats or risks.• Evaluate key assets’ vulnerabilities against

identified threats• Determine expected consequences of specific

threats to assets • Ways to reduce risks • Prioritise the risk management procedures

The plans may focus on keeping the companyoperational and reducing financial risks or protectemployees by addressing response protocols tofires or terrorism, instruct ways to alertcustomers of potential outages and addresscommunicating to the public about negativeevents that could impact reputation. It addressespreserving physical facilities, data, records, andphysical assets a company owns or uses.

Incident managementWikipedia describes incident management asactivities of an organisation to identify, analyse,and correct hazards to prevent reoccurrence.These are dealt with an incident response or anincident management team. They are designatedbefore, or created during the event and placed incontrol while the incident is dealt with to restorenormal functions. An incident is an event thatcould lead to loss of, or disruption to anorganisation’s operations, services or functions. Itlimits potential disruption, followed by a return tobusiness as usual. Without effective plans, anincident can disrupt business operations,security, IT systems, employees, customers andother business functions, and become a crisis.

Most companies have existing incidentmanagement or emergency response plans thatguide them in managing the incident to closure. Ifthe event can be resolved without escalation orinvolving organisational areas, the incident isclosed and a lessons learned analysis or afteraction report is published. If the event requiresother resources, threatens employee life safety orproperty, company reputation or viability, itbecomes a crisis and needs to be managed.

As part of the wider management process,incident management is followed by post-incident analysis where it is determined why theincident happened despite precautions and

Business resiliency 101

To build a resilientbusiness: riskmanagement,

incidentmanagement, crisis

management andbusiness continuitymust be addressed

Teon Rosandic, VPEMEA, xMatters looks

at measures forbuilding business

resilience

EDIT article 5 may14_riskuk_may14 06/05/2014 17:37 Page 2

Page 45: Risk UK May 2014

45www.risk-uk.com

controls. This is overseen by the leaders with theview of preventing repetition throughprecautionary measures and changes in policy.This information is used as feedback tostrengthen response plans, further developcorporate policy and implementation.

Crisis managementCrisis management is a large scale, incidentmanagement response. It is the process by whichan organisation deals with major events thatthreaten to harm an organisation, stakeholders,or the public. Three elements common to mostdefinitions are: a threat to the organisation, theelement of surprise and a short timeframe tomake critical decisions.

Unlike risk management, which assessespotential threats and finds the best approachesto avoid threats, crisis management involvesdealing with threats before, during, and afterthey have occurred. It requires skills andtechniques to identify, assess, understand andcope with a disaster, from when it occurs torecovery. It requires the mind-set to think of theworst-case scenario whilst suggesting numeroussolutions to respond to it.

During a crisis, response teams known as firstresponders convene in an Emergency OperationsCentre or virtually if out of business hours orcan’t meet. Response teams use specialisedstandard protocols to manage the event andcommunicate called the National IncidentManagement System and its foundation, theIncident Command System (ICS). Developed bythe public sector, these systems are integratedinto private sector response procedures so rolesand responsibilities are defined and succinctaction plans can be shared and understood.Command, control, coordination, collaboration,communication and consistent process areattributes of ICS.

To manage unplanned incidents, organisationscreate crisis management plans that havestructured guidelines so responders know how torespond. It contains scenarios to constitute crisesand the necessary response mechanisms toaddress them. The other major component is thecommunication plan that is in place to inform andmitigate the negative effects the crisis may haveto protect a company’s brand or reputation. Mostplans focus on internal for employees andexternal communications to the public,regulators, shareholders, customers andsuppliers. The credibility and reputation oforganisations is influenced by the perception ofresponses during crises, which can either save abusiness or be its end. There must be open andconsistent communication throughout theincident for successful crisis communications.

Business continuity managementWhile crisis management focuses on protectinglife safety and property, business continuityfocuses on planning and management ofprotecting business operations; the people, corebusiness processes and facilities. It is theproactive effort undertaken in anticipation ofsignificant events, natural and man-made, thatmay impact a company’s ability to continuebusiness activities.

Business continuity planning ensuresinformation is available to make decisions aboutrecovery prioritisation by senior management andprocedures in place to maintain uninterruptedoperations to sustain business. It is a continuouslifecycle, adapting to meet changing businessneeds, deliverables and customer commitmentsand to ensure there are documented plans torespond to significant risks and events that mayaffect critical business activities.

Although risk cannot be eliminated, thelikelihood of an event threatening the businesscan be anticipated and the potential impactlessened by incorporating an awareness of riskissues and measures taken to control them.

To be resilient where business operationscontinue uninterrupted, identification andmitigation of the organisation’s vulnerabilitiesand risks must be addressed. A completed planincludes data on points of contact, criticalfacilities and operations, subject matter expertsand the key business processes that supportcritical operations and customer commitmentsidentified in a company’s strategic long rangeplan.

Each critical facility, function, programme orproject considers the impact that significantevents has on activities and key businessprocesses and develops plans to prevent, protect,and to recover from events. In businesscontinuity, all plans are communicated, exercised,updated and maintained annually and must bereadily retrievable.

Baseline risks (fire, flood, power outage) andextraordinary risks (terrorism, pandemic flu) cancause business interruptions that paralyse anunprepared business. Business resiliency is thematuration and integration of the individualprocesses of risk management, incidentmanagement, crisis management, and businesscontinuity into one succinct set of processes andcapabilities that work collectively, instead of insilos. This unified, all-hazards approach preparesan organisation for minimal disruption in theevent of a business-impacting incident thataffects the organisation. In an increasinglyunstable operating environment, every business,public and private, needs to be prepared forsignificant unplanned events.

Resilience

Although riskcannot beeliminated, thelikelihood of anevent threateningthe business can beanticipated and thepotential impactlessened

EDIT article 5 may14_riskuk_may14 06/05/2014 17:38 Page 3

Page 46: Risk UK May 2014

46www.risk-uk.com

Technology in Focus

Three control panels offer optionsIntroduced by Bosch Security Systems in 2013,AMAX 4000 is now backed by two new intrusioncontrol panels – AMAX 3000 and AMAX 2100.Together, the three solutions cover a three-stepapplication range: AMAX 2100 is suitable forsmall applications with a maximum of eightzones, AMAX 3000 is designed for facilitieswhere 32 zones are required, and AMAX 4000covers larger properties with up to 64 zones, forinstance a medical centre with severalindividual practices in the building. AMAX 3000and 4000 can additionally be operated inhybrid mode, connecting wired detectors, suchas Bosch Blue Line Gen2 Series, as well aswireless peripherals from the new RADIONfamily. The compact AMAX 2100, running wireddetectors only, completes the portfolio.

The new RADION wireless family includesmotion detectors, surface and recessed mountdoor and window contacts, universaltransmitter, keyfobs and smoke detector. Thismakes it suitable for new installations, as wellas for use in existing installations thanks tocompatibility with existing “DSRF” wirelesssystems and legacy control panels from Bosch. www.boschsecurity.com

Long range PIR offers 220mcurtain for large areas The ADPRO PRO E-400H, the new long rangePIR, extends the PRO E portfolio forapplications with hundreds of metres ofperimeter such as solar parks, gas pipelines,and airports where traditional PIRs with asmaller curtain would be costly from both ahardware and installation perspective.

The PRO E-400H SLR reduces the numberof poles required for installation, the numberof detectors, and cabling resulting inreduced installation time and 65% costsavings. The SLR was designed to deliveraccurate zones (up to seven) for visualverification, and when installed pointing ateach other offers double-knock protectionfor 220m.

TheADPRO PRO E-PIR series providesmaximum tamper protection with360PROtect to eliminate the creep zoneentirely. 360PROtect provides detection forattempted surface mount removal and anti-masking and delivers separate alarms to theCentral Monitoring Station so operators canrespond quickly and accurately. xtralis.com

Sounder for hazardous areas Hochiki Europe has announced the latest addition to its range of intrinsically safe compatibledevices – the CHQ-ISM sounder module. The intrinsically safe devices are incapable of releasingsufficient electrical or thermal energy to cause the ignition of a specific hazardous atmosphericmixture in its most easily ignitable concentration. This is achieved by limiting the amount of power

available to the electrical equipment in the hazardous area to a level below thatwhere ignition is possible. The low power levels also mean that there is no shockhazard due to excess thermal energy and arcing.

With a similar look and feel as the standard modules in the range, the CHQ-ISMis designed for use in the ‘safe’ area of a hazardous area fire detection system and,therefore, does not require specialised certification. It allows any third partysounders and beacons installed in the ‘hazardous’ area to be controlled andmonitored by an analogue addressable control panel that is configured aroundHochiki Europe’s Enhanced Systems Protocol (ESP). The unit is wired either directlyto the panel via the conventional sounder circuits – receiving its 24V power supplyfrom the panel – or via a CHQ-DSC sounder controller module connected to theloop, where it requires a separate 24V power supply. www.hochikieurope.com

EDIT tif may14_riskuk_may14 06/05/2014 23:36 Page 2

Page 47: Risk UK May 2014

Security solutions for today’s challenging times

Global economic pressuresare forcing organisations toreview expenditure acrossthe board. But, the securityissues remain the same. So, do you cut your security?

Pilgrims offers a complete andcomplementary range of security,communications and support services,backed by an unmatched commitment to the highest level of quality, efficiency and client care, to reduce costs not cover.

Our expertise and global experience allowus to deliver robust, practical solutions fortoday’s challenging financial climate.

For more than ten years, Pilgrims has beensupporting clients across the globe, protectingand enabling their businesses to continue inspite of threats from terrorism, seriousorganised crime and natural disasters.

Our personnel are handpicked for theirexperience, skills, training and personality to match the requirements of our clients.This, combined with our continual exposureto the world’s hot spots and difficultregions, makes Pilgrims the ideal choice foradvice and support.

Pilgrims provides a global service, with localknowledge through our employment oflocal personnel, quality control, continualongoing training and our relationships withspecialists and local partners.

ConsultancyOperational ConsultancyManned GuardingTrainingInformation and IntelligenceCommunications SupportTechnical SystemsEquipment

We can help you find the right solution.Call Pilgrims on: +44 (0)1483 228 786

www.pilgrimsgroup.com

Project1_Layout 1 06/08/2013 12:13 Page 1

Page 48: Risk UK May 2014

48www.risk-uk.com

Multi threat firealarm forcompleteprotectionAn algorithm within anewly launched firealarm from Panasonicallows users to detectsmoke, heat and carbonmonoxide (CO) at thesame time. The alarm has beendesigned to be the solution forapplications such as theatres withartificial smoke generators, or factory settingswhere oil mist may be present. Because it onlytriggers when smoke, heat and carbon

monoxide are detected, thePanasonic 4402 promises

high reliability in fire detection. The chemical CO sensor lasts

for up to five years and, says thecompany, consumes very littlepower. In the case ofcontamination to a smokechamber within the alarm, or a

chemical sensor reaching the endits useful life, a service signal will

notify the need of a replacement. Thealarm detects smoke using an infrared light

LED and a photodiode with two lenses, while athermistor detects heat and the CO sensor is achemical type. business.panasonic.co.uk

Door entry video kits simplifyinstallationVidex Security has introduced a new range ofDoor Entry Video Kits employing IP technology.The new kit uses the Videx 4000 Series doorentry panel which can include up to 64 callbuttons and incorporates a colour camera, withIR illumination and a back lit name window. Awide angle (101° vertical, 170° horizontal)camera option is also available. A dedicatedbutton calls the apartment videophone andprovides two way full duplex speech and videocommunication.

For flexibility, there are alternative ways toconnect the entrance panel and videophones.For a simple one -to-one solution, a powersupply can be connected to each device and asingle CAT 5 cross over cable can be connectedbetween them. Alternatively an existing LAN orWAN can be used to connect the devices, or adedicated network can be created usingswitches and routers. Up to ten devices can beinstalled in each apartment as a combination ofvideophones and video monitors, Androidtablets and smart phones, as well as a PC app.www.videx-security.com

Software now provides total PSIMsolutionAralia’s latest software suite now provides acomplete Physical Security InformationManagement (PSIM) solution for securingcritical infrastructure, urban and transportationsystems. The latest version integrates a rangeof security devices including access control,CBRN detection systems, acoustic devices,intelligent fencing, UAVs and various imagingdevices, including FLIR.

All sensor data is archived and indexedwithin a distributed, redundant, industry-standard relational database that can bereconfigured to address specific threats. Thesecure database has been developed tofacilitate rapid and accurate searching ofsensor meta-data.

Sensor data can be processed, and the threatlevel assessed, using Aralia’s proprietarysoftware libraries - developed by analysis ofoperational systems over a period of fifteenyears. The library includes target tracking,behavioural analysis and 3D scenereconstruction. Aralia has introduced a reviseduser interface to make best use of theincreased capabilities of the PSIM software.The interface combines geo-referenced displayswith conventional mimic diagrams, to ensureefficient presentation of security information.www.araliasystems.com

EDIT tif may14_riskuk_may14 06/05/2014 23:36 Page 4

Page 49: Risk UK May 2014

49www.risk-uk.com

Technology in Focus

Upgraded features forcloud-based VSaaS Genetec has announced newfeatures and a reduced pricingplan for Stratocast, its cloud-based video surveillance-as-a-service (VSaaS), powered bythe Microsoft Azure cloud-computing platform.Stratocast is designed to meetthe needs of small andmidsized businesses thatrequire a reliable and cost-effective video surveillancesolution without the expenses and complexitiestypically associated with installing and managingon-premise surveillance systems. The newfeatures and pricing model are expected to beavailable mid-April 2014, including support formulti-channel encoders, a health-monitoringdashboard, integrator branding options, andgeo-redundant storage.

New features include: support for Axis multi-channel encoders will allow customers to easilymigrate their analogue system to Stratocast,while still preserving their investment in existinganalogue cameras that continue to beserviceable; a new health monitoring dashboardwill provide warnings of system events andinformation about the client and cameras thatare affected, allowing channel partners tomonitor and facilitate rapid troubleshooting andremote assistance; geo-redundancy inStratocast provides a failover mechanism in theunlikely event of a failure at the primarydatacentre location. This option provides agreater level of resiliency and redundancy byseamlessly replicating recordings to a secondarydatacentre hundreds of miles away from a user’sprimary location, while remaining within thesame region; finally, in-app branding allowsStratocast Partners to add their logo within theStratocast client, as well as customise theirStratocast landing page to increase theircompany’s visibility to end users.www.genetec.com

On-site Wi-Fi access made easyThe capital cost of Wi-Fi controllers is quiteoften what prohibits retail stores, offices,schools and hospitals from providing freeWi-Fi access for staff, visitors andcustomers. SilverNet’s recently launchedCloud managed Mesh Wi-Fi solutionreportedly overcomes this price barrier byproviding a method of configuring,controlling and monitoring Wi-Fi accesspoints without the need for expensivecontroller hardware. It achieves this by aCloud-based software management toolcalled SilverCloud which enables Wi-Firadios to be collectively managedregardless of their physical location, via abrowser on a PC, tablet or smartphone.

“For small to medium size applications,the cost of controller hardware can quiteoften double the price of a Wi-Fi project,”said Keith Newton, SilverNet’s BusinessDevelopment Manager. “By introducing aCloud-based solution we are aiming tomake it affordable for many businesses andorganisations to have on-site Wi-Fi,including education, healthcare, industrial,retail, hospitality and temporary events typeapplications. The added bonus is thatSilverCloud software features an easy to useon-screen dashboard which eliminates thecomplexity normally associated with themanagement of Wi-Fi.” www.silvernet.com

An IP platform for an Evergreencontrol roomFrequentis has released its new platform 3020LifeX, a fully IP-based integration platform forpublic safety control room ICT solutionstogether with a supporting evergreenphilosophy. It’s designed to ensure that thecontrol room constantly adapts to the manychanging factors affecting it to deliver aconsistently high service in the most costeffective manner.

The new 3020 LifeX IP-based integration

platform has a suite of easy-in, easy-outapplications delivering what the company isdescribing as a new dimension in userexperience and management configurationwhile supporting now and then functionalityfrom Frequentis or others, which is an essentialpart of the evergreen philosophy.

Various mobile applications including RadioStatus Server and Radio Web Dispatcherguarantee emergency personnel consistentquality of access to information andcommunications, whether in the field or indoorson the intranet. www.frequentis.com

EDIT tif may14_riskuk_may14 06/05/2014 23:37 Page 5

Page 50: Risk UK May 2014

50www.risk-uk.com

Access control over GSM (TIF pic M)Urmet has introduced an access controlsolution that operates via GSM. The intercomunits, which are available with Urmet’s S-Steelpanel, use a SIM card for communication andaccess control. When activated, a call isestablished to a pre-designated number –either a landline or a mobile telephone –creating a line of communication and giving theuser the ability to open up to two access points.

The self-contained door unit, consists of adoor panel, antenna and PSU and will workwith a SIM card from any operator, enablingaccess points to be controlled using a mobiletelephone or landline. Installation is reportedto be quick and there is no need for additionalcabling to the unit, apart from mains power.

With up to 62 programmable button optionsavailable, this solution is listed as ideal for bothresidential and commercial buildings and ispredominantly used for gate installation wherethe distance from the gate to the house orbuilding is very large. In a block of flats, forexample, the door panel can call a resident’slandline, or divert to their mobile so that theyare aware of who is visiting their home. Theresident can then answer accordingly. With thein-built technology, the resident is able to openup to two access points in the building usingthe telephone keypad. This might be the gate tothe property and the front door to the livingquarters. Users are also able to dial in and,using a password, open an access point whennot at the property. www.urmet.co.uk

Long distance 4K transmissionchipsetL2Tek has announced availability of the newgeneration of Valens chipsets compliant withthe HDBaseT 2.0 specification. Enabling thetransmission of 4K video over longerdistances, The Valens Colligo family addssupport for multiple cable types andinterfaces, including USB 2.0, HDMI 2.0 andaudio interfaces, as well as infrastructuressuch as fibre optics which allow transmissionover much longer distances. All the new chipsfeature enhanced performance, improvedrobustness and noise resistance.

The Colligo product family comprises ofseveral new chipsets, with the initialintroduction of three chips: VS2000 – 5PlayGen 2.0; VS2310 – 5Play Gen 2.0 Plus; andVS2311 – 5Play Gen 2.0 Fibre.

The Colligo chips are described as flexibleand designed to address the needs of variousmarkets, particularly Pro-AV, consumerelectronics, broadcasting and healthcare.Manufacturers will be able to implement theColligo chips into new HD projectors, singlewire TVs, digital signage displays, multi-stream video switching / distribution /aggregation, daisy chaining, video extendersover CatX / fibre optics cables, AV matrixesand AV receivers. www.l2tek.co.uk

PC substitute decodes 1080p videoAimetis Corp has announced the launch of its Aimetis A10D Thin Client, a securePC substitute designed to readily decode1080p Full HD video from over 30network video camera manufacturers. The A10D is ideal for users who needmore functionality than a traditional decoder, but want less complexity andfewer maintenance costs than a PC.

The Aimetis A10D supports up to 60 FPS in 1080p, supports video streamsin MJPEG, MPEG4, and H.264 and provides a single HDMI output. It isdesigned to be used in systems with Aimetis Symphony video managementsoftware or Aimetis E-Series Physical Security Appliances. Compact designand intuitive user setup make the Aimetis A10D ideal for public view monitorsin retail applications and video walls in large-scale deployments. The totalcost of ownership, as compared to a PC solution, is reported to be less due tosimplified IT management and reduced end user training.www.securitybuyinggroup.co.uk

EDIT tif may14_riskuk_may14 06/05/2014 23:54 Page 2

Page 51: Risk UK May 2014

Technology in Focus

51www.risk-uk.com

New CCTVline-upannounced Y3K hasannounced anew line-up ofHD CCTVsurveillancecameras andcomplete end-to-end solutions. The range now offerscustomers different levels of image quality andfeatures suitable for applications in businessesfrom SMEs up to multi-national corporations.

The new range of professional CCTV solutionsincluding domes, bullets, PTZs, recorders,monitors and complete systems, will beavailable in 960p HD and 1080p resolutions –Xvision HD 960H (960p) and Xvision Pro HD(1080p) respectively. The IQCCTV line-up hasalso been added to and will now feature an HD960H (960p) and an HD-SDI CCTV range (720p). www.y3k.com

PTZ for low light surveillance withFull HD performanceJVC has launched the VN-H557U Megapixel non-endless PTZ camera with Super LoLux HDtechnology. The VN-H557U’s 2-megapixel imagesensor produces 1920x1080 pixel resolution at30 fps for full HD imaging performance withH.264 and MJPEG dual streaming.

Super LoLux HD technology provides coloursensitivity of only 0.4 lux in full enablingDay/Night operation in colour. Image quality isfurther enhanced by a high quality 10x opticalzoom lens with a focal range of 6.3 to 63.3mm.Total zoom capability is extended to 100x usingthe camera’s internal 10x digital zoom function.Additional features include PoE, 3D noisereduction, 350° pan/tilt operation, audiocommunications and on-board SD recording. www.jvc.com/security

4K camera is announced The Axis P1428-E 4K network camerafeatures a resolution four times higher thanHDTV 1080p, at 3840 x 2160 pixels at 30frames per second. The camera is thereforeideal for overlooking large areas like parkinglots and public squares while also being ableto capture fine details.

The P1428-E offers other features such asremote zoom and focus, a built-in slot formicro SD/SDHC/SDXC memory cards and I/Oconnectors for interfacing with externaldevices. Initially, it is likely that mostcustomers will be using a standard HDTVmonitor. 4K makes it possible to enhance anyportion of the screen without losing details.To manage bandwidth consumption, userscan view the live video stream in HD 1080pand take advantage of 4K recordings forforensic purposes. The camera is scheduledto be available in Q3 2014 through Axis’distribution channels. www.axis.com

Two-way wireless pet immunedetector extends familyThe KX10DTP-WE from Pyronix utilises a PIR andmicrowave module to provide security and theadded reliability needed in commercial andmore hostile residential environments such asthe garage or conservatory, at the same timegiving the assurance that a property can beprotected, even with a pet inside.

The 10m dual technology, pet immunedetector is the latest product to join theEnforcer two-way wireless family. Connecting toeither the 32 zone Enforcer control panel, or iffurther flexibility is required, the EURO-ZEM32-WE can be utilised to connect to the commercialCastle Euro control panels. www.pyronix.com

64 channel NVR with four-step setup launchedThe SRN-4000 NVR from Samsung is able tosimultaneously record and multi-stream thetransmission of images at a bandwidthspeed of 400Mbps. It also offers thepotential to record and store, via 12 internalhard drives, video captured by 64 x 2Megapixel cameras for up to 108 days or upto 43 days for the same number of 5Megapixel cameras.

The 12 internal hot-swappable hard drivessupport RAID5 and RAID6 recording whichprovides protection against unrecoverableread errors as well as whole HDD failure. TheSRN-400 also features an iSCSI interfacegiving users access to large storage devices,if required. The SRN-4000’s on-screen userinterface ensures that it can be configured inonly four steps using the ‘Easy Setup’wizard, whilst cameras can reportedly beregistered without complication via a quickset up process. www.samsungsecurity.com

EDIT tif may14_riskuk_may14 06/05/2014 23:54 Page 3

Page 52: Risk UK May 2014

Orchard Theatre solves accesscontrol issuesGreen Gate Access Systems has solved theon-going issue of access and security atDartford’s Orchard Theatre via the use of acomputer based access control system. ThePaxton Net2 entry control system isconnected to the building managementnetwork, allowing the use of swipe cards foremployees and ‘disposable pin codes’ forknown and pre-booked disabled visitors.The new security measures have enableddisabled visitors to request a parking spacewith a booking and receive a reservation andpin code emailed to them, for use on anallocated date and time slot. Theatresubscribers can also be issued with anannual swipe card.

Originally contacted by Orchard Theatre in2012 to review their parking security, GreenGate Access Systems considered severaloptions for the project, with the consultationprocess lasting a number of months toensure the right system was installed. Theoriginal hydraulic blockers have beenrepaired and serviced, warning sirens andred/green traffic lights have been installedand most importantly, the Paxton Net2 entrycontrol system has been introduced. Accesscontrol is mounted on an O&O Totum, part ofthe overall safety package that also includeshighways grade waning, no entry signs andunderground safety loops with directionallogic. Blockers rise swiftly after a vehiclehas entered and minimises tail-gating.

52www.risk-uk.com

Risk in action Imperial WarMuseum getsTraka keydefenceThe Imperial WarMuseum (IWM)London hasenlisted the helpof Traka toimplement anautomated keymanagementsystem. As partof an ongoingrefurbishmentproject, due to be completed this July, theIWM decided to implement an automatedkey management system. Previously, theadministration of 400 keys across two siteswas managed manually, a time-intensivetask that created inherent security risks. Anautomated process was needed to betterprotect the collections, and also to secureaccess to other parts of the museum.

A 300-key Traka system was installed onthe main site and a 100-key system wasinstalled at a neighbouring site. Thesolution ensures that only authorised staffare allowed access to the key cabinet, andwithin it they can only access designatedkeys. The system automatically recordswho has taken which key and when,meaning there is complete accountability ofwho is responsible for which key, 24 hoursa day.

Thanks to the partnership between Trakadistributor, Secure Technology Solutionsand security integrator, Pointer the systemcan be used in conjunction with LenelOnGuard access control, so that staff canaccess keys through their existing securitybadges. This creates seamless integrationwith the existing security management andallows the reporting and subsequent audittrail of who has accessed which key to befed through to the central database andreports whether the keys have beenreturned.

Tim Strofton from the Imperial WarMuseum says, “Before the Traka keymanagement system was installed we wereaccounting for all the keys manually, whichwas a very time-intensive task. Changing toan automated system improved ouroperational efficiency significantly andgave us greater peace of mind.”

EDIT ria may14_riskuk_may14 06/05/2014 23:37 Page 2

Page 53: Risk UK May 2014

Risk in action

53www.risk-uk.com

Peterborough housing associationgets IP solutionBritannia Fire & Security has secured theheadquarters of the Axiom HousingAssociation in Peterborough using IP-addressable equipment from ACT, includingproximity readers, door controllers and ACT’saccess control software suite.

Axiom operates more than 2,200 homesacross Peterborough, Cambridgeshire andLincolnshire, and provides housing andservices to over 5,500 people. Supportedservices assist vulnerable people, thoseleaving care, people with learning difficultiesor with mental and physical health needs.

The access control solution installed atAxiom House uses ACTpro 4200 controllers.These are four-door controllers which can beextend up to 16 doors using ACTpro doorstations, and networked together with theACTpro software suite to control up to 4,000doors. Bandwidth use of the ACTpro system isminimal, and the ACTpro software suite offersauto-discovery and easy maintenancealongside advanced features such as timedanti-passback and counting areas.

Two hundred Axiom staff members havebeen issued with proximity (125 kHz) ACTProxfobs, giving them easily-controlled privilegesin order to open doors around the building.Standard rights access is 7 to 7, five days aweek, but senior administrators have year-round access to all areas, including sensitiveareas such as alarm systems. Axiom opted for

new suppliers whenmoving premises andwanted to balance easeof access and theprecise control that anIP-addressable systemprovides.

Joseph Seery ofAxiom says, “TheACTpro software is easyto configure andupdate, and we areable to run reports incommon data formatssuch as CSV which canassist other departments such as humanresources. In the event of a fire drill or a fire,we can print a report for mustering purposes.An important feature is that system-usersmust use their fob to identify themselves to areader at the main entrance before the fobswill open any internal doors.

“Having a flexible access control systemhelps Axiom in many small ways which canadd up to making general facilitiesmanagement a lot easier. Examples includeenrolling staff from our satellite offices whovisit regularly onto the system and evenissuing fobs to our refuse collectors so thatthey can access specific areas of the site on acontrolled basis during specified time slots oncertain days of the week.”

At Axiom House, the ACT installation is linkedto Galaxy intruder alarms from Honeywell.

Security behind steel doors forGriffin CloseThe safety and security of tenants in GriffinClose, a property located in Willesden andmanaged by Origin Housing, has beenimproved following the installation of DeltaSecurity’s Model 9 Steel Doors.

This installation extends the relationshipthat Delta Security has with Origin Housing,as the Model 9 Steel Door has proved to be asuccessful deterrent to anti-social behaviour(ASB) across other properties in itsjurisdiction.

Origin Housing is a provider of affordablehousing and care and support services inLondon and Hertfordshire. It owns andmanages over 6,000 homes, has a turnover of£45 million and aims to provide great homesand build strong communities in the area.Delta Security has installed approximately 30doors, replacing all communal front entrancesand internal security doors. They have been

installed with a fullyisolated, digital door entryand fob system, whichallows tenants andcaretakers only into theareas of the property thatthey are permitted.

Aaron John, Director ofEchelon Consultancy, theprocurement and assetmanagement consultancyadvising Origin Housing,says that ASB was asignificant problem on theestate: “Griffin Closerequired a high security doorthat would deter thosewanting to vandalise and enter the propertyillegally and the Delta Model 9 door met ourspecification exactly,” he explains. “It has avery robust locking mechanism and despite itbeing extremely secure, it looks good andsuits the profile of the building.”

EDIT ria may14_riskuk_may14 06/05/2014 23:38 Page 3

Page 54: Risk UK May 2014

Hotel upgrades to IP surveillanceCountry house hotel Down Hall has installedIDIS DirectIP using a phased approach toupgrade from its existing legacy analogueCCTV. On the Hertfordshire and Essexborder, Down Hall chose IDIS partner,Rutledge Integrated Systems (RIS), tomanage the security upgrade following arefurbishment to include an exclusive gym,sauna and steam room facility.

Now complete, the first phase ofupgrading 70 cameras across the Down Hallestate includes a full-HD solution comprisinga range of DirectIP mega-pixel cameras,network video recorders (NVR), bundledvideo management software, and networkswitches. Covering the gym, sauna, steamroom, and plant rooms, Down Hall is alreadyrealising the benefits of the surveillancethrough the improvement of staff and guestsafety, and the ability to quickly identify anysuspicious behaviour, while retrieval offootage has reduced from hours to minutes.

Andrew Oxley, General Manager at DownHall, noted, “The operational benefits interms of saving time and the ability toquickly detect and respond to crime areimmediate while we expect to significantlyreduce our maintenance costs comparedwith the legacy system. The RIS teamensured minimum disruption to staff andguests, making sure our new facilitiesopened on schedule as we head into ourbusiest period of the year.”

Andy Rutledge, Managing Director, RIS,added, “Our fifth DirectIP project, we knewwe could offer a competitive solutioncombined with a staged roll out, whichallowed us to install in hours rather thandays. The intuitive interface, very similar toanalogue systems, means we then handedover to staff quickly and with minimum fuss.”

54www.risk-uk.com

Frozen goods protected by RFtemperature alertMusgrave Retail Partners, a convenience storefranchiser and food wholesaler, has installedSecureTemp, the RF temperature alert solutionfrom SecureSeal Systems.

SecureTemp provides Musgrave with a way toprotect frozen inventory in transit betweentemporary cold stores and three distributioncentres located across the UK. Technologyprovides the ability to wirelessly monitortemperatures down to -25C at distances of upto 800 metres. The SecureTemp display-receiver provides Musgrave’s control roomswith a large display of current and historicaltemperature and a range of visual and audiblealerts should critical temperature thresholds bebreached.

“Reading sensors over such significantdistance without hard-wiring is a technicalchallenge that our latest 868MHz technology isdesigned to achieve,” comments Ron Dimelow,SecureSeal Systems Project Manager. “Byproviding real-time data, graphical history andalerts to the on-site management team,Musgrave can ensure their frozen stores are100 per cent protected.”

EDIT ria may14_riskuk_may14 06/05/2014 23:38 Page 4

Page 55: Risk UK May 2014

55www.risk-uk.com

Risk in action

Morrisons upgrades security withHD IP videoWm Morrisons Supermarket’s “farm to fork”business strategy is getting extra security over40 critical sites, after Express Data upgradedits facilities security and management usingMobotix HD IP-video security systems. The UKfood retailer has over 500 stores across Britainand subsidiaries including Farmers Boy, amanufacturer and distributor of food products;Woodhead Bros, a meat processing business;FlowerWorld, a wholesale flower business andother business interests including multi-channel online retailing.

In 2008, Morrison’s Data Centre ServicesManager, Darryl Shears, began a program tostrengthen the resilience and security aroundits critical IT infrastructure as part of a widersoftware migration from legacy systems to aunified Oracle based platform.

“We have sites that range from northernScotland to Bridgwater in the South West andSittingbourne in the South East. Managing thisestate from a centralised team in Bradford is alogistics challenge,” says Shears, “We need tobe able to monitor key comms rooms and ITequipment remotely both proactively to stopany issues from escalating and to react quicklyto ensure any problems are dealt withefficiently.”

To this end, Morrisons decided upon astrategy to upgrade each of these IT and

communications rooms with environmentalmonitoring, remote surveillance and remoteaccess control technology.

Following an evaluation programme andbased on a number of reference site examples,the supermarket group selected a solutionincluding Mobotix CCTV cameras, Panduitenvironmental monitoring and access controltechnology. “The Mobotix solution, especiallythe hemispheric technology, allows us to usejust one or two cameras to cover single ormultiple rooms with the resolution andreliability we required,” explains Shears, “Inaddition, the built-in flash storage supportmeans that we can still record the site even ifwe have a network connectivity issue.”

The team based in Bradford can use theMobotix cameras to view anybody requiringaccess to a safe room and remotely open doorsand monitor any activity within the room. Thesystem has the option for fully bi-directionalaudio and requires only 5W per camera, whichaligns with the company’s stated aim to uselow energy technologies across its operations.

Over the last 24 months, Express Data hasworked with Shears and his team to implementupgrades at an additional eleven sites andcreated a standard blueprint for the resilienceand security at each of the critical sites. Thebuild includes power redundancy and bestpractice access procedures with full visualaudit trail. The supermarket has deployed over140 cameras across its sites.

Addressable detector makes savings in estateFike Safety Technology has supplied itsQuadnet analogue addressable system for aresidential building complex in India. TheWembley Estate in the Gurgaon District ofHaryana has eight tower blocks with 13 floors ineach. The use of Fike’s fire detection technologyhas reportedly resulted in cost savings for theproject, whilst providing fire protection.

The initial tender specification required theinstallation of 575 conventional detectors, 600manual call points, 120 sounders and eightconventional panels, one for each tower, andone repeater panel for the security controlroom. The total cabling requirement was inexcess of 50,000 m. Spectrum Safety SolutionsPvt proposed a different solution using a singleQuadnet panel and Fike’s multi-criteriaaddressable detector.

“It was the use of Fike’s addressable detectorthat enabled us to completely re-design thesolution and offer the client cost savings andthe advantages of analogue addressabledetection compared to the specified

conventional system,” said Vijay Arora,Spectrum Safety Solutions’ GeneralSales Manager. “The multi-criteriadetector offers multiple modes ofoperation combining smoke and rate ofrise heat detection, with a built-in inputmodule, fault isolator and optionalintegral sounder. This allows thedetectors to be matched to theenvironments in which they areinstalled and reduces the amount ofcable required as no separate soundercircuit is needed.”

The final installation consisted of fiveconventional manual call points on each floorbeing wired to an input module in anaddressable detector. A single four-loopQuadnet panel communicated with all 575addressable detectors in all eight towers. Noadditional sounders were required to beinstalled, as the built-in sounders in thedetectors were used where required. The singleQuadnet panel replaced the originally specifiedeight conventional panels, thereby reducing theproposed eight manned stations, one in eachtower, to one for the whole complex.

EDIT ria may14_riskuk_may14 06/05/2014 23:38 Page 5

Page 56: Risk UK May 2014

The revelation in April that a programmingerror in a commonly used encryptiontechnique may have given hackers access

to usernames and passwords for websites hassent shockwaves through the securitycommunity. Dubbed Heartbleed, the error isbeing called one of the broadest securitybreaches in Internet history. In its wake, theCanadian tax authorities and UK websiteMumsnet are just two of a growing number oforganisations that have been targeted byhackers. According to some observers, it couldtake months or even years before all websiteshave been updated. Though this need not bethe case, as the fix is relatively easy for any

organisation that istechnologically savvy and fastacting. Never before has theimportance of having an incidentplan been more important.

Preparation and incidentresponse are key factors inminimising risk and the longer-term fallout from a newlydiscovered vulnerability or anattack. However, manyorganisations are not takingappropriate steps to addresssuch risks. Indeed, research hasfound that virtually all FTSE 350companies and eight per cent oforganisations in the Forbes’sglobal 2000 are leaking data. Inresponse, the government andGCHQ have urged largebusinesses to carry out cybersecurity health checks.

A programme of regular cybersecurity audits, sometimesreferred to as a cyber healthcheck, will ultimately allow anorganisation to respondappropriately and effectivelywhen faced with a newlydiscovered vulnerability or a

breach. In common with a financial audit butnot necessarily as all-encompassing, thesecurity audit should be supported by externalexperts with the appropriate level of knowledgeand insight, alongside key individuals fromwithin the organisation. The audit will allow arisk-based review of the effectiveness ofinformation systems and suggest remedialsteps to improve overall security against abackdrop of rapidly-changing cyber threats.

The review must be tailored to theorganisation and its risk landscape, with thefirst step of an audit focusing on reviewingexisting controls and procedures. Mostorganisations already have firewalls, passwordpolicies, encrypted data protocols and restrictedaccess controls in place to counter potentialcyber threats, alongside policies governingmobile devices, cloud storage and data sharing.But when were these last reviewed, let aloneput to the test? Similarly, most organisationsaim to be current with security patrols andresponses to newly discovered vulnerabilities,but in practice many IT departments areunderstaffed and unable to keep up with theconstantly changing threat and scope.

The use of bring-your-own-device (BYOD) andpersonal online accounts have becomeincreasingly prevalent. This creates additionalopportunities for hackers and given the varietyof devices on offer, makes the IT department’ssecurity mission that much harder toaccomplish. Any internal review should,therefore, establish everyday working practices,including the use of personal smartphones anddata storage for work-related tasks.

When assessing such risks, it is important toalso review the use of other portable devices, asthe accidental loss of an unencrypted laptop ordisk drive could have serious financial andreputational impact. In a recent incident, aconsultancy advising financial institutionsallowed staff to use their own thumb drives tostore business information. Months aftercompleting a project with a major internationalbank, lawyers at the bank were mailed a thumbdrive accompanied by a note stating that thedevice, which clearly contained confidential bankdata, had been found on a train. Thoughconfidential information for many bank

Preventing heart attacks

Preparation and incident response are key factors in minimising risk andthe longer-term fallout from a newly discovered vulnerability

Heartbleed reinforces the importance of clear plan ofaction says Seth Berman, executive managing

director and UK head of Stroz Friedberg

56www.risk-uk.com

EDIT article 10 may14_riskuk_may14 06/05/2014 23:03 Page 2

Page 57: Risk UK May 2014

employees and customers had beencompromised in the incident – a loss that wasboth costly and embarrassing to the bank — theconsultant who lost the data had no idea that thedata breach had even occurred, since it made noeffort to track or restrict the use of such devices.

A security audit must include a focus on thehuman element. From staff inadvertentlyactivating viruses or malware by clicking onlinks in emails, to malicious insiders, perhapsmotivated by the prospect of financial gain orrevenge, firms need a thorough understandingof all such threats and a plan to combat them.As an example, staff must recognise the riskposed by phishing emails and know how toreport such incidents. While the vast majoritymay hit the Delete button upon receiving asuspicious email, only one unwitting member ofstaff needs to fall for a scam before securityhas been breached. Such attempts at obtaininginformation are commonplace and mayintroduce a virus, activate malware to logkeystrokes, copy emails, or even record phoneconversations. Processes to report all cybersecurity incidents to a designated team mustbe implemented to allow threats to be dealtwith immediately.

In addition to taking steps to avoid abreach, companies must also prepare aresponse plan in case a breach happens. Theplan must include a clear chain of command, aprocess of escalating news of a potentialbreach or new vulnerability, and a teamincluding inside and outside experts torespond rapidly in case of an incident.Companies that lack a plan for response wastevaluable time figuring out how to respond tovulnerability or a breach – allowing them tobecome easy prey for the hackers.

Heartbleed is the latest reminder of thefinancial, reputational and organisational risksfacing victims of cyber attacks. However,security cannot be left as an afterthought,with recent incidents again reinforcing theimportance and value of regular securityaudits. The time has now come fororganisations to take such risks seriously anddevelop strategies to minimise the potentiallong-term impact.

In addition to taking steps to avoid a breach,companies must also prepare a response planin case a breach happens

Cyber crime

EDIT article 10 may14_riskuk_may14 06/05/2014 23:03 Page 3

Page 58: Risk UK May 2014

123456. Amazingly, surveys show that this isthe most popular password forauthentication. And simple passwords are

still the most used authentication method.However, popularity, in this case, just doesn’tequate with success.

Security breaches are becoming a dailyoccurrence and high profile companies such asYahoo, Target and Tesco are just some of thefamous names amongst the victims ofpassword theft.

Recently, on a Netherlands server,researchers discovered compromisedcredentials for more than 93,000 websites,including 318,000 Facebook accounts, 70,000Gmail, Google+ and YouTube accounts, 60,000Yahoo accounts, 22,000 Twitter accounts and8,000 LinkedIn accounts.

However, instances like these represent justa fraction of the organisations suffering frompassword theft. The majority do not publicisethe fact, as there is no requirement to notifyanyone, nor have they been publicly ‘outed.’

So we have a long established way of doingthings that is proven on a daily basis to beinadequate and insecure yet the majority ofcompanies still use it. How long will this stateof affairs last? Will we see another decade ofconsistent, repetitive authentication failures?

Probably not, because the Darwin principleapplies. Those affected by password theft willeither come up to the mark, and improve theirauthentication, or decline and go out of business.

Moreover, strong authentication is on a highgrowth curve, driven by the multiple waves ofchange rolling across organisations, both smalland large. Recent developments in computinghave led to increasingly fractured and distributednetworks, which are harder to protect.

These developments include the growth ofmobile computing, remote access, tablets,smartphones and BYOD, together with theincreasing popularity of wireless, the cloud,virtualisation and social networking. Alongsidethis, there has been a rapid growth of data,meaning there is even more to protect than everbefore.

Authentication is the most basic step towardsprotecting networks and while passwords stillhave a role, that role is increasingly as part of a

multi-factor authentication process. Other forces driving the move towards strong

authentication include the increasing pressureson companies to achieve security compliance,with the consequences of failure including heftyICO fines and possible reputational damage.

Greater press coverage of computer securityfailures, such as the insecurity of mobilesdevices and smartphones, has also had aneffect, creating more visibility of the problems.

Authentication typesGetting the right kind of authentication needscareful thought. A key question is “Is theauthentication method something that staff canuse relatively easily?” Get something toocomplicated and you could have problems.

Another key issue is using the right level ofauthentication. Do you need different levels fordifferent staff, for different applications, fordifferent departments? Is your authenticationmethod flexible enough to cope with that?Broadly speaking, users are looking forauthentication methods that provide the bestcombination of ease-of-use, security, and, ofcourse, cost. Currently, the main options are:• weak single-factor authentication

(passwords)• strong complex passwords, usually with a

minimum of characters, including specialcharacters, and recommended to be regularlychanged

• strong two-factor authentication (passwords+ something else, such as a token)

• strong three-factor authentication(passwords + something else, such as a softtoken + a mobile phone).

Weak single factor authentication(passwords)This is the use of single static passwords, stillthe most common form of authentication andused by most organisations. However,companies are increasingly aware that even ifthey continue with passwords for part of theirworkforce, there are employee types such aspower workers, knowledge workers, mobileworkers and remote workers, where proof ofidentity is important.

Authentication – an update

Those affected by password theft will either come up to the mark, andimprove their authentication, or decline and go out of business

Ian Kilpatrick, chairmanWick Hill Group, looksat the current state of

authentication

58www.risk-uk.com

EDIT article 9 may14_riskuk_may14 06/05/2014 23:01 Page 2

Page 59: Risk UK May 2014

59www.risk-uk.com

Any password system not collecting andstoring passwords in a secure (encrypted)format is fundamentally vulnerable.

Encrypted passwords - While encryptedpasswords are more secure than simplepasswords, and superficially secure, they areactually at risk of attack by various methods,such as brute force attacks, dictionary attacksand rainbow tables.

Strong complex passwordsThat’s what many of us use to access oursecure online areas and are used in companiesto overcome the disadvantages of weakpasswords. They need to be not only strong,and typically including special characters ornumbers, but also different for differentapplications, and changed regularly.

Strong complex passwords, when encrypted,are significantly less vulnerable to rainbowtables and similar methods. They are howevervulnerable, as many users employ the samepasswords for social and online sites as fortheir business.

Strong authentication Strong authentication involves one of a range ofelements such as hardware tokens, soft tokens,fingerprint recognition, swipe cards and phoneas a token, or phone as a recipient of a softtoken. Most strong authentication deploymentsare used together with passwords (two-factorauthentication).

Strong two-factor authentication - Strong twofactor authentication is a much more securemeans of authenticating users onto networks,as it requires two separate security elements.

It comprises something you know (apassword) and something you have, e.g. atoken, which generates a one-time password(OTP) or a fingerprint. Software and hardwaretokens are currently the most popular two-factor solutions, due to their low cost, ease- of-deployment, ease-of-management and thestandard of security they provide.

According to Gartner, hardware tokens stillhave the largest installed base of any method(70%). In the last few years, however, there hasbeen a move towards the deployment of othertypes of tokens, including mobile phones, andhardware USBs, such as SafeStick or Ironkey.

The rapid fall in the price of tokens meansthey are now available from only a few poundsper user per year. That is less than the cost ofONE password-related helpdesk call, so tokenscan represent a major cost-saving, as well as animprovement in security.

Strong three factor authentication - This is farsuperior and involves something you know (e.g.

password), something you have (e.g.authentication token) and something you are(e.g. fingerprint, retinal scan, facialrecognition). While biometric authentication isobviously more costly and complicated to use,it is appropriate for high securityapplications/departments such aspharmaceutical R&D, finance, etc.

Trends Contextual authentication - Contextualauthentication is growing, but not yetmainstream. It uses contextual information(such as users’ behaviour patterns) to decidewhether a user is genuine. It can improve onthe use of a password, without the need fortraditional two factor strong authentication.

Mobile devices can play a significant role incontextual authentication. They can capturerelevant contextual information such as tappingrhythm, voice recognition, facial contours, andiris details.

A strategic view - A growing trend amongstenterprises is to take a more strategic view ofauthentication. Companies are acknowledgingthey may need different levels of authenticationfor different scenarios, different users anddifferent applications. They are looking for oneflexible authentication method which canfacilitate these different levels. Currently,however, most enterprises and SMEs still tendto use a single authentication method.

The Cloud - The popularity of the cloudshould be noted, with researchers predictingthat by year-end 2016, about 30% ofenterprises will choose cloud-based services astheir delivery option for new or refreshed userauthenticationimplementations - upfrom about 10% today.

Mobile devices -Smartphones and mobiledevices are playing agrowing part in theauthentication scenario.They are already widelyused as authenticationtokens; they function asfairly powerfulcomputers and are anendpoint in themselves,so need protecting; andthey can be used forbiometric and contextualauthentication.

Smartphones and mobile devices are playing agrowing part in the authentication scenario

Passwords

EDIT article 9 may14_riskuk_may14 06/05/2014 23:02 Page 3

Page 60: Risk UK May 2014

Cloud computing is one of the mostsignificant changes to take place in thecomputing, data communications and data

centre worlds over the last few years. Inessence, cloud computing is remote hosting,with a user application running on someoneelse’s virtualised servers in a remote locationwithin a data centre rather than the user’s ownmachine on his own premises.

While the concept of cloud computing is notnew, it is still in its infancy, with many providersoffering different and incompatible services indifferent ways.

Moving to the cloudIn general, applications which work well in

cloud today are ones where datacommunications traffic is light and notparticularly time critical, where security isimportant (and it always is) but not critical,where a new application can be writtenespecially for the cloud implementation andwhere fast scalability gives a worthwhilebenefit to the user.

Although cloud is continuously evolving,there are some areas which many organisationsstill steer away from putting there today. Thebiggest concern for all cloud users wasoriginally security and this remains the case, inspite of strenuous efforts by software vendors.

If the organisation’s mission critical computingand corporate intellectual property is on site orin a professionally managed colocation datacentre, behind a corporate firewall, with knownand trusted staff in control of it, management

feels the risk of theft orunauthoriseddisclosure is less thanif it is in anotherlocation, under thecontrol of unknownstaff who may or maynot put the company’skey interests first. Ifsomething goeswrong, the company’sown staff will workthrough the night toput it right, whereasmanagement may not

trust an outside provider to deliver the samecommitment. Perhaps those fears are notjustified, but research continues to show theyremain real.

Another area requiring much care is anythinginvolving real time data traffic, such as voicetelephony. Whilst it is certainly possible to runvoice over the open public internet (Skype doesit all the time), running it to a guaranteed andconsistent level of quality is quite different. Insuch cases, users are better avoiding publiccloud and sticking with known specialisedcolocation data centres, and especially theLondon colocation data centres with a widerange of carrier connections and experience, orgoing to a specialised provider of hostedcommunications, who will certainly be locatedin such a facility.

Like the introduction of any new way ofworking, cloud throws up unexpectedproblems. But the long term benefits aresufficiently high for both users and providersthat, over time, most of the objections andbarriers will be overcome.

A future in the cloudCloud computing in commercial data centres isunquestionably the way computing is going andwill continue to go. But some computing, IT andcommunications applications are more suitedto cloud implementation than others. Choosingwhich to implement first, and which will workwell in practice, requires skill and forethought,but will be rewarded with a steady, reliablemigration, easier maintenance and loweroperating costs. For many organisations, theremay never be a full migration, as missioncritical and security critical applications remainin house and other run remotely in the facilitiesof cloud providers.

The way in which organisations employpeople has changed over the last fifty years. Themodel of a 1960’s organisation was one whereeveryone was a full-time employee. Today it isone where the business is run by a small, tightteam pulling in self-employed specialists andsubcontractors as and when needed. Perhapsthe future model for IT is the same – a smallcore of IT in-house handling the mission-criticaloperations, guarding critical data and corporateintellectual property and drawing in less criticalor specialised services remotely, in real time,from cloud providers located in remote datacentres as and when needed.

Ahead in the cloud

The biggest concern for all cloud users was originally security and thisremains the case, in spite of strenuous efforts by software vendors

When is it worth movingto the cloud? asks RogerKeenan is the managing

director of City Lifeline

Migrating to the Cloud

60www.risk-uk.com

EDIT article 13 may14_riskuk_may14 06/05/2014 23:04 Page 2

Page 61: Risk UK May 2014

Bringing together the entire security

buying chain

WWW.IFSEC.CO.UK 17-19 JUNE 2014 ExCeL LONDON

In 2014 IFSEC International, the largest and longest running security event moves to a truly international venue.With more than 40 years at the heart of the security industry, re ecting inno ati e industry trends and ro iding insight into the atest techno ogy to ee usinesses and go ernments secure

Put the date in your diary now! www.ifsec.co.uk/add2014

PROTECTION & MANAGEMENT Week

IFSEC International

is art of

Project1_Layout 1 01/08/2013 12:11 Page 1

Page 62: Risk UK May 2014

Manufacturers are always looking for waysto improve their products, especially inthe field of technology. With display

resolutions, cables, discs and 3D technologybeing revamped and reworked, TV displays arebecoming more detailed, lifelike and visuallyappealing. Ultra HD-4K technology makes use ofhigher pixel density, larger screens and thehuman eyes’ visual acuity to create a moredetailed, in-depth image on display screens.This article focuses on what Ultra HD-4Ktechnology is in greater detail, examine wherethe technology is heading.

Ultra High Definition (Ultra HD)has four times the resolutionof a 1080p display (3840 x

2160) and is equivalent toan 8-megapixel image.What this means for the TV

viewer is that the image willbe extremely sharp even whenone is viewing from a veryclose distance. On a 1080pdisplay, viewers who sit tooclose to the screen will seelittle squares which areactually the spaces betweenthe pixels. On an Ultra HDdisplay, the pixels are so smallthat it would take a

magnifying glass to view the spacebetween them at normal viewing

distances. Simply viewing on an Ultra HDdisplay does not automatically guarantee abetter image, because there are many othervariables, such as transmission quality and theactual content, but it certainly improves thepossibilities.

What is Ultra HD? “Full HD” or 1080p are both ways to describe adisplay consisting of 1,080 lines of verticalresolution and 1,920 of horizontal resolution. 4Kis also known by multiple names, such as 2160and Ultra HD. Ultra HD-4K must beapproximately four times the total resolution of1080p, or at least two times the verticalresolution and two times the horizontalresolution of 1080p. Most Ultra HD-4K should

therefore have an approximate aspect ratio of3840 (1.89:1) or 4096 (1.90:1). The ConsumerElectronics Association’s 4K Working Groupdecided in the fall of 2012 to call the 4K productcategory Ultra HD in order to minimiseconsumer confusion and position Ultra HD-4Kperformance as being beyond current HDTVstandards. It is important to be familiar withboth the technical terms as well as those termsused to describe Ultra HD-4K in the sales worldin order to understand and sell this technologyto clients.

The increase in pixel density allows for moredetails and less-visible pixel images, amountingto a clear, vivid image on the screen. Ultra HD-4K has the potential to make use of largerscreen sizes while providing a better-lookingimage than Full HD resolutions are capable of;therefore, the industry has deemed it worthy ofthe classification “ultra-resolution.”

With four times as many pixels and lessvisible space between pixels, Ultra HD-4Kdisplays positioned at the same distance fromthe viewer as 1080p are able to display a betteroverall picture. In fact, in his blog post “What isthe Point of Diminishing Returns for TV ScreenSizes?”, CEA Chief Economist and Director ofResearch Shawn Dubravac calculates that if aconsumer replaces their 55-inch HD TV with anUltra HD-4K TV of the same size, they can sitfour feet away instead of the average seven.Similarly, the consumer could remain seven feetfrom the screen and simply upgrade to a 92-inch, or even 153-inch, Ultra HD-4K TV for a fullimmersive experience. This technology presentsthe first logical opportunity for consumers tobuy the big screen they have always wantedwithout needing to expand their room size orstray from the recommended seating distance.

Ultra HD-4K data The downside to Ultra HD-4K is that since thereare more pixels, there is also more data thatneeds to be transmitted from a source to thedisplay. Luckily, all the players in the industryare currently working to overcome this obstacle.

UltraHD-4K is approximately four times thepixel resolution of 1080p, but requires twice tofour times the bandwidth through HDMI,depending on frame rate and colour space. Inorder to understand the specific bandwidthrequirements and implications at both hardwareand transport layers, it is prudent to explorehow this new format is currently defined in theHDMI specification, and the implications thereinfor system design and implementation. HDMI isthe current predominant format in the encryptedHD-AV (with DRM) delivery space for bothcommercial and consumer electronics.

Seeing is believing!This month we take a

look at the nextgeneration of screens,

Ultra High Definitionor 4K. Will you be

upgrading yourmonitors any time

soon?

62www.risk-uk.com

Ultra High Definition (Ultra HD) has four timesthe resolution of a 1080p display (3840 x 2160)

and is equivalent to an 8-megapixel image

EDIT article 19 may14_riskuk_may14 06/05/2014 23:09 Page 2

Page 63: Risk UK May 2014

63www.risk-uk.com

Ultra HD delivery platforms and distribution Nearly two-dozen Ultra HD-4K compatible

televisions and monitors were announced orshown by more than a dozen companies at CESin 2013 and are currently available in theconsumer market. In addition to supportingnative Ultra HD content, virtually all of thesedisplays can upscale 2D and 3D HD content andsupport “second screen” features as well asdigital streaming services. The most prevailingquestion today revolves around the timeframefor content availability to consumers at home.There are a variety of options being considered,including: broadcast, cable and satellite;download or streaming over the Internet; andBlu-ray Disc.

Device hardwareFundamental suitability of a device to be able tosupport Ultra HD-4K is quite simple. In the caseof HDMI ports, the HDMI transmitter, repeater(e.g. switch, splitter) or receiver silicon mustsupport at least 297MHz Clock. First-generationHDMI chipsets (circa 2003-2007) were165MHz/4.95Gbps, to support the 148.5MHzoperating Clock of 1080p60. From 2007 anupgrade to 225MHz/6.75Gbps silicon becameubiquitous, offering support for 1080p60 at 10-bit Deep Colour (5.56Gbps) and 12-bit DeepColour (6.68Gbps). At the time this documentwas developed, most devices still use the225MHz silicon, which is not enough for the297MHz required for Ultra HD-4K. Newgeneration silicon released by some leadingchipset vendors in 2012 have settled on300MHz.

Unless a device contains this new 300MHzsilicon (or higher), it cannot support Ultra HD-4K. Application example: many Blu-ray playersoffered firmware upgrade to support 3D, as noextra bandwidth was required for that. Theexisting 225MHz HDMI chipsets were sufficient.However to support 2160p a physical change tohardware is required. Furthermore, a couple ofyears ago the claim of “HDMI v1.4” wassometimes used by CE device manufacturers topromote support for things like 3D and AudioReturn Channel. However Ultra HD-4K was justas much a part of the v1.4 spec, but this was notsupported by such devices due to hardwarelimitations. This was just one of several reasonsfor HDMI Licensing to abolish reference toversion numbers, due to their misleadingnature.

HDMI cable suitability A good quality, certified “High Speed HDMICable” is required to achieve Ultra HD-4Ksupport (to 30fps). The challenge is in finding

an HDMI cable that is labelled High Speed thatactually is High Speed. There is a proliferation inthe market of mislabelled cables due to the pre-2010 legacy of 1080p being the benchmark, andthe misunderstanding that “1080p” and “HighSpeed” meant the same thing. 1080p istransmitted on a 148.5MHz Clock, being4.455Gbps aggregate data rate. By contrastUltra HD-4K requires double this at 8.91Gbps,and a genuine High Speed cable should betested to 10.2Gbps.

As “HDMI 2.0” mode arises in coming years,being TMDS character rates from 340 to600Mcsc, a new “Reference Cable Equaliser”will be enacted to aid an existing High Speed(Category 2) HDMI cable to support theincreased data rates. This will however still beexpected to draw some length limitations, yet tobe determined. Ultra HD-4K formats to beaffected by this elevation will be those thatcombine High Frame Rate (HFR) and DeepColour; 2160p/50/59.94/60, 10 or 12-bit, 4:2:0or 4:2:2. There is no defined HFR 4:4:4 mode.

DisplayPort DisplayPort was developed in 2006 by VESA. Itutilises four data transmission lanes, comparedto HDMI’s three, with each initially supportingfixed data rates of 1.296 or 2.16Gbps. In 2009the 1.2 specification was released, adding athird, higher data rate level of4.32Gbps/channel. This amounts to an

Ultra HD/4K

The increase in pixel density allows for moredetails and less-visible pixel images, amountingto a clear, vivid image on the screen

EDIT article 19 may14_riskuk_may14 06/05/2014 23:10 Page 3

Page 64: Risk UK May 2014

aggregate 17.28Gbps, sufficient tosupport Ultra HD-4K at 10-bit DeepColour to 60fps. DisplayPort-enableddevices have the same needs as HDMIhardware in providing compatibility atboth the silicon and firmware levels.While DisplayPort has yet to be adaptedfor use in Ultra HD-4K TVs, it isimportant to be aware that wheninstallers begin designing a DisplayPortsystem to deliver and display Ultra HD-4K content, each device in the systemshould support Ultra HD-4K at both thephysical and firmware layer. A

DisplayPort cable with demonstrable supportfor 10.8Gbps for 2160p30, or 21.6Gbps (highestrating for DP, for 2160p60) is then required forsuccessful hook-up.

CATx cable extension systems As previously mentioned, the data channels inHDMI transmit Ultra HD-4K at 1.485GHz. This iswell beyond even the native capability of CAT7a,and around six times the TIA/EIA specifiedbandwidth of CAT6. Well-designed, purpose-built electronics and technology like PAMtheory can certainly close the gap, but there willalways be a limit to how much CATx cable canbe used for Ultra HD-4K applications. It ispossible, but tough to correctly accomplish.Like with source, repeater, and sink devices, thebandwidth capability of the primary siliconemployed inside the transmit (Tx) and receiver(Rx) units of a CATx-based extender system isalso key in identifying Ultra HD-4K support.Many such extenders utilise HDMI equaliserchipsets which cap out at 225MHz, and are thusinsufficient. Technicians should always avoidgeneral claims like “HDMI v1.4” as this iscompletely non-definitive. Only chipsetbandwidth and listing for actual featuressupported can be deemed relevant inidentifying product suitability.

HDBaseT HDBaseT is an exception to the above assertion,as it retimes the signal in a PAM-16 (PulseAmplitude Modulation) baseband format,essentially changing the rules of native CATx(which, after all, is designed for Ethernet). It hasfrom the outset supported all of the same UltraHD-4K formats as HDMI, up to and including30fps iterations. It can also be implemented

with DisplayPort I/O for support of all formatswithin the scope of the 5.2 and 8.6Gbpsaggregate data rates. It is a 10Gbps formatwhich in application conveys TMDS signalling(as used by both HDMI and DisplayPort).

At its heart, the Valens VS-100 chipsetspecifies support for Ultra HD-4K to 100m overCATx cable, or 40m when using the VS-010(HDBaseT-Lite) chipset. The HDBaseT Alliancehas declared that the technology will bescalable in future to support higher frame rateversions, potentially to 20Gbps for 2160p 48-60(4K-HFR). However, as retiming of the signal isinvolved, with silicon being firmware driven inthe HDBaseT system, the transmission is not inthe native space of the end point devices(assuming HDMI or DisplayPort connections).This provides some extra risk to interoperabilitysuccess and stability, but this can be managedby using quality, compliant product.

Fibre The issue of running HDMI over long distances,often referred to as long-haul, has been an areaof great debate since its inception. With HDMI2.0 nearly doubling the frequency and bitrateon the cable, long-haul issues may be furthercompounded. For distributing Ultra HD-4Ksignals over significant distances, typically over30 meters, one solution is to add an HDMI-to-fibre converter. Since fibre optic utilises lightinstead of copper to transport data, the signalcan cover significantly greater distances beforefailure. Installing and terminating fibre opticcables requires very specialised tools andtraining to ensure proper functionality. However,if installed and terminated properly, fibre toHDMI converters will send Ultra HD signalshundreds of feet without any visible ormeasurable degradation.

Blu-ray While a movie in Ultra HD-4K is within the rangeof data that a Blu-ray Disc can store, the Blu-rayDisc Association (BDA) recently established atask force to study possible format extensionsin order to ensure the most efficient way totransport Ultra HD-4K data on discs. The groupwill work on investigating both technicalfeasibility and market demand for Ultra HD-4Kand look into aspects such as higher framerates, enhanced colour, additional audiotechnologies, etc. in regard to how theseaspects play into future Blu-ray Discdevelopments. In the meantime, companiessuch as Sony Pictures Home Entertainmentwork to release remastered Blu-ray moviescompatible with existing players and providedtheir dealers with PC-based servers that feature

64www.risk-uk.com

Like any new technology entering the marketplace,there are challenges in demonstrating the

consumer benefits beyond existing tech

EDIT article 19 may14_riskuk_may14 06/05/2014 23:10 Page 4

Page 65: Risk UK May 2014

Ultra HD/4K

65www.risk-uk.com

a variety of content shot in 4K.

Broadcasting and streaming During CES, LG demonstrated Ultra HD-4Kterrestrial broadcasting that is currently beingtested in Korea. Netflix also demonstrated aprototype Ultra HD-4K streaming service withSamsung at CES but indicated that moreadvancements would need to be made beforethis technology is readily available. Finally, REDis also in the process of developing their RedRayplayer, which will be capable of streaming UltraHD-4K content via the Internet and can also playHD and 3D content at either 48 or 60fps. Theplayer is projected to come with an expandable1 TB internal HDD, and will support multipleHDMI outputs, including one for 7.1 surround.While these advancements are greatlyanticipated, they are still in the early stages ofdevelopment and it will be some time beforethey are affordable and feasible in the consumermarket.

In addition to the current advances of UltraHD-4K displays, many are speculating thatfuture products will enable even more dramaticimprovements to colour reproduction andpicture quality.

The term “Gamut” is used to describe thevariety of colours a display or a source signalcan reproduce. The specification for the colourgamut of HD displays (HD-REC709) was animprovement over standard definition. Now withthe increased attention on Ultra-HD, Sony hasannounced that their Ultra HD streaming servicewill feature xvYCC colour, which will be animprovement over HD colour.

If Ultra HD-4K eventually realises the colourgamut described by the ITU, the images possiblewould be radically improved over the currentHDTV and xvYCC colour. This would equal, andcould exceed, the improvements in picturequality offered through the increased resolutionalone. The visually stunning gamut describedwill be able to show colours so saturated thatthey could faithfully reproduce carnations,geraniums, marigolds and even sunflowers — allof which have colours that cannot be reproducedwith the current HD gamut.

That kind of enhanced colour reproductionwill not be possible with current televisiontechnology, but the ITU offers a glimpse of UltraHD-4K improvements to come in futuregenerations and gives the industry a hint atfuture innovations to come to Ultra HD-4Kscreens.

How will 4K impact my business? Like any new technology entering themarketplace, there are challenges in

demonstrating the consumerbenefits beyond existing tech.In the case of Ultra HD-4K, it isstill a niche product, squarelyfocused on affluent earlyadopters. As prices come downin the next year or so, a broaderaudience will begin to realisethe benefits of incredible depthand clarity, even on the largestdisplays. Many consumersremain in the honeymoon stagewith HD, but larger panel sizeshave begun outselling smaller TVs. These largerscreen sizes are likely to lead to increasedinterest in higher resolution. Right now, thetarget consumer for Ultra HD-4K likely alreadyowns multiple HD sets and is looking for thebest big-screen experience in order to achievethe most cinematic experience in the home.However, the primary Ultra HD-4K contentavailable for consumer TVs will initially be fromup-scaled sources.

The HD vs. Ultra HD-4K debate certainlybridges from manufacturers’ marketing to theretail floor. Dealers are concerned that the pricedelta may be a major inhibitor to sales. As UltraHD-4K moves further into the consumer market,manufacturers will likely take similar stances toSony, who provides their Ultra HD-4K TVconsumers with a bundled 4K video player andtablet remote which include a variety of short-form 4K content and full-length feature films.

The counter is that buying Ultra HD-4K nowhelps to future-proof the home theatre. Notonly are the TVs feature-rich, with 3D,connected services and high-speed processors,but they can also enhance the contentdisplayed and in the case of HD content, canupscale the content close to Ultra HD-4Kresolution. Currently, content is still beingremastered to take advantage of the upscalingcapabilities, but the future is not that far off,and native Ultra HD-4K video content will soonbe widely available.

ConclusionIn summary, despite all of these potential UltraHD-4K content and delivery options underdevelopment, most Ultra HD-4K TV viewers willbe watching primarily upscaled content untilnext year. It will be a challenge to educateconsumers on the value of Ultra HD-4K, butwhen specified correctly according to the needsof the individual project, the benefits areevident. The promise of immersive images andenhanced resolution is enough to win over theconsumer who is interested in owning the beston the market today.

The promise ofimmersive images andenhanced resolution isenough to win overthe consumer

The full version of thiswhitepaper was developedwith assistance by thefollowing individuals andreviewed by CEDIA’sworking group: DavidMeyer of Kordz, DanSchinasi from Samsung,Joel Silver of ImagingScience, Marc Finer fromDEG: The DigitalEntertainment Group andRay Stanley of Sony. To seethe full version visit:www.cediaeducation.com/resources/whitepapers

EDIT article 19 may14_riskuk_may14 06/05/2014 23:10 Page 5

Page 66: Risk UK May 2014

The European Parliament recently votedthrough amended data protectionproposals. These new reforms represent the

EU’s first major overhaul of data protectionlegislation since 1995 and will bring with themsignificant changes to the way personal datacan be used. Once approved by the EuropeanCouncil, the 28 member states will have twoyears to become fully compliant. For manybusinesses this will seem a long way off. It canbe tempting to wait to make any changes untilthey become a legal requirement, but thatwould be a mistake.

In the wake of the widely-publicised NSArevelations around government snooping,consumers across Europe will welcome thegreater personal protection and rights proposedby the new EU reforms as a long-overdue step inthe right direction. Many businesses, however,will be challenged by the new obligations thatare likely to come their way.

The new EU data protection reforms areintended to replace the current patchwork ofnational laws. Companies would be accountableto a single European supervisory authority,rather than 28, enabling simpler, more cost-efficient business in the EU, the economicbenefits of which are estimated at 2.3 billionper year.

The draft requirements directly addressissues such as customer consent and the needto notify regulators of a data breach within 24hours. Many firms currently invest more

resources dealing with the fallout andinvestigations of data loss, rather than onadequately protecting it in the first place.

This needs to change and the reforms arelooking to address this. Failure to protect datasufficiently will have serious financialconsequences, with the potential for fines in theevent of an incident of up to five per cent of aprivate sector organisation’s turnover.

However, financial penalties for data breacheshave been in place for some time, and haveapparently done little to encourage increasedresponsibility in the management andprotection of sensitive information. Businesseswould do well to act now to better protect theirinformation, regardless of the threat of incominglegislation.

It is up to businesses to scrutinise, mitigateand manage their own information risk supplychain, as part of a Corporate InformationResponsibility (CIR) programme.

Examples of good practice are already inplace. In Germany, for example, organisationsare already obliged to make a member of staffresponsible for data protection and ensurecompliance in line with national laws. Thebiggest challenge for the EU will be to get allcountries to match this standard. Meeting newrequirements will involve taking stock ofcurrent practice and ensuring processes andpolicies are up to scratch. Waiting until thelegislation is passed could be too late formany. For example, processes for identifyingand reporting an incident need to be efficient,with the monitoring of data integrity commonpractice. This has become more complex withthe prevalence of social media and mobiledevices. Consequently, there is a greaterrequirement for firms to understand exactlywhat information they hold in physical anddigital formats and where that information isheld.

A data breach does not just represent afinancial risk, it represents a serious threat tobrand reputation and customer loyalty. Withsocial media on the rise, bad news travelsfaster and further than ever. Even the smallestincident could have serious consequences forthe future of an organisation if they are foundto be at fault.

Every organisation should give seriousconsideration to its role as the responsiblecustodian of sensitive information. Businessesacross Europe would be advised to considertheir exposure to information risk and seize theopportunity of the impending regulatorychanges to assess whether they have the rightprocesses and policies in place to minimisethat exposure.

Two years to prepare...

The new EU data protection reforms are intended toreplace the current patchwork of national laws

Businesses must act nowto prepare for EU data

protection reforms saysChristian Toon, head of

information risk, Europe,Iron Mountain

Data protection

66www.risk-uk.com

EDIT article 3 may14_riskuk_may14 06/05/2014 17:36 Page 2

Page 67: Risk UK May 2014

ACCESS CONTROL - BARRIERS, BOLLARDS & ROADBLOCKERSHEALD LTDHVM High Security Solutions "Raptor" "Viper" "Matador", Shallow & Surface MountSolutions, Perimeter Security Solutions, Roadblockers, Automatic & Manual Bollards,Security Barriers, Traffic Flow Management, Access Control SystemsTel: 01964 535858 Email: [email protected]: www.heald.uk.com

AUTOMATIC VEHICLE IDENTIFICATIONNEDAP AVIPO Box 103, 7140 AC Groenlo, The NetherlandsTel: +31 544 471 666Fax: +31 544 464 255E-mail: [email protected]

ACCESS CONTROLKERI SYSTEMS UK LTDTel: + 44 (0) 1763 273 243Fax: + 44 (0) 1763 274 106Email: [email protected]

ACCESS CONTROL – BARRIERS GATES & ROAD BLOCKERSFRONTIER PITTSCrompton House, Crompton Way, Manor Royal Industrial Estate,Crawley, West Sussex RH10 9QZTel: 01293 548301 Fax: 01293 560650Email: [email protected]: www.frontierpitts.com

ACCESS CONTROL

ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILESUKB INTERNATIONAL LTDPlanet Place, Newcastle upon TyneTyne and Wear NE12 6RDTel: 0845 643 2122Email: [email protected] Web: www.ukbinternational.com

ACCESS CONTROL MANUFACTURERNORTECH CONTROL SYSTEMS LTD.Nortech House, William Brown CloseLlantarnam Park, Cwmbran NP44 3ABTel: 01633 485533Email: [email protected]

ACCESS CONTROLAPT SECURITY SYSTEMSThe Power House, Chantry Place, Headstone Lane, Harrow, HA3 6NYTel: 020 8421 2411Email: [email protected]

B a r r i e r s , B l o c k e r s , B o l l a r d s , P A S 6 8

ACCESS CONTROLACTUnit c1 South city Business centreTallaght D.24 Irelandwww.accesscontrol.ietel: 00 353 1 466 2570 UK Lo Call Number: 0845 300 5204

ACCESS CONTROL & DOOR HARDWAREALPRO ARCHITECTURAL HARDWAREProducts include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101E: [email protected] Web: www.alpro.co.uk

ACCESS CONTROLSECURE ACCESS TECHNOLOGY LIMITED

Authorised Dealer

Tel: 0845 1 300 855 Fax: 0845 1 300 866Email: [email protected]: www.secure-access.co.uk

ACCESS CONTROLCOVA SECURITY GATES LTDBi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & BollardsConsultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68Tel: 01293 553888 Fax: 01293 611007Email: [email protected]: www.covasecuritygates.com

...andlots

more

ComputerSecurity

Anti-Climb Paints& Barriers

Metal Detectors(inc. Walkthru)

Security, Search& Safety Mirrors

Security Screws &Fastenings

Key ControlProducts

Empty Property &Lone Worker Alarms

Traffic Flow &Management

see ourwebsite

Best Value Security Products from Insight Securitywww.insight-security.com Tel: +44 (0)1273 475500

www.insight-security.com Tel: +44 (0)1273 475500

ACCESS CONTROL – BARRIERS, GATES, CCTV ABSOLUTE ACCESSAberford Road, Leeds, LS15 4EFTel: 01132 813511E: richard.samwell@absoluteaccess.co.ukwww.absoluteaccess.co.ukAccess Control, Automatic Gates, Barriers, Blockers, CCTV

ACCESS CONTROL – MANUFACTURERROSSLARE SECURITY PRODUCTS Rosslare Security Products manufactures the Security Industry’s largest and most versatile range of Proximity and Smart Card readers.Bletchley Park, Milton Keynes, MK3 6EBTel: 01908-363467 Email: [email protected] ISO 9001 and ISO 14001 Certification

ACCESS CONTROL – SPEED GATES, BI-FOLD GATESHTC PARKING AND SECURITY LIMITED4th Floor, 33 Cavendish Square, London, W1G 0PWT: 0845 8622 080 M: 07969 650 394F: 0845 8622 090info@htcparkingandsecurity.co.ukwww.htcparkingandsecurity.co.uk

ACCESS CONTROLINTEGRATED DESIGN LIMITEDIntegrated Design Limited, Feltham Point, Air Park Way, Feltham, Middlesex. TW13 7EQTel: +44 (0) 208 890 5550 [email protected]

mar14 dir_000_RiskUK_jan14 06/03/2014 14:11 Page 1

Page 68: Risk UK May 2014

BUSINESS CONTINUITY MANAGEMENTCONTINUITY FORUMCreating Continuity ....... Building ResilienceA not-for-profit organisation providing help and supportTel: +44(0)208 993 1599 Fax: +44(0)1886 833845Email: [email protected]: www.continuityforum.org

BUSINESS CONTINUITY

PHYSICAL IT SECURITYRITTAL LTD

Tel: 020 8344 4716Email: [email protected]

CCTV

BUSINESS CONTINUITY SOFTWARE & CONSULTANCYCONTINUITY2E232 Edinburgh House Righead Gate Glasgow G74 1LSTel: +44 (0) 845 09 444 02 Fax : +44 (0) 845 09 444 [email protected]

CCTV & IP SECURITY SOLUTIONS PANASONIC SYSTEM NETWORKS EUROPEPanasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP Tel: 0844 8443888 Fax: 01344 853221 Email: [email protected] Web: www.panasonic.co.uk/cctv

END TO END CCTV SOLUTIONS/RECORDERS, CAMERAS, NETWORK PRODUCTS

DEDICATED MICROS1200 Daresbury Park, Daresbury, Warrington, WA4 4HS, UKTel: +44 (0) 845 600 9500Fax: +44 (0) 845 600 9504Email: [email protected]

CCTVPECAN Stortech Elec, Unit 2 spire green CentrePinnacles West, Harlow, Essex CM19 5TSTel 01279 419913 Fx 01279 419925www.pecancctv.co.ukemail [email protected]

CCTVG-TECGtec House, 35-37 Whitton DeneHounslow, Middlesex TW3 2JNTel: 0208 898 [email protected]

DIGITAL IP CAMERASSESYS LTDSupplying digital IP camera for rapid deployment, remote sitemonitoring, fixed and short term installations. High resolutionimages available over mobile and wireless networks to any standard web browser.1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QGTel +44 (0) 1730 230530 Fax +44 (0) 1730 262333Email: [email protected] www.sesys.co.uk

COMMUNICATIONS & TRANSMISSION EQUIPMENTKBC NETWORKS LTD. Barham Court, Teston, Maidstone, Kent ME18 5BZwww.kbcnetworks.com Phone: 01622 618787Fax: 020 7100 8147Email: [email protected]

CCTV/IP SOLUTIONSDALLMEIER UK LTD3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QHTel: +44 (0) 117 303 9 303Fax: +44 (0) 117 303 9 302Email: [email protected]

MANUFACTURERS OF A COMPLETE RANGE OF INNOVATIVE INFRA RED AND WHITE LIGHT LED LIGHT-ING PRODUCTS FOR PROFESSIONAL APPLICATIONS INCLUDING CCTV SCENE ILLUMINATION, ARCHITECTURAL UP-LIGHTING AND COVERT SECURITY.

ADVANCED LED TECHNOLOGY LTDSales: +44 (0) 1706 363 998Technical: +44 (0) 191 270 5148Email: [email protected]

CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTSALTRON COMMUNICATIONS EQUIPMENT LTDTower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJTel: +44 (0) 1269 831431Email: [email protected]: www.altron.co.uk

SURVEILLANCE / CCTVIDIS EUROPE1000 Great West Road, Brentford, LONDON TW8 9HH Tel : +44 (0)203 657 5678Fax : +44 (0)203 697 [email protected]

BUSINESS CONTINUITY 4 Scotia Close Brackmills Northampton NN4 7HR01604 769222www.bcontinuity.com

MANUFACTURE STANDALONE ACCESS CONTROL PRODUCTSPSU’S, KEYPADS, ELECTRIC LOCKS, BREAKGLASS, EXIT BUTTONSRGL ELECTRONICS LTD“Products to Trust – Power to Help”Pelham Works, Pelham Street, Wolverhampton WV3 0BJSales: +44 (0) 1902 656667 Fax: +44 (0) 1902 427394Email: [email protected] www.rgl.co

www.insight-security.com Tel: +44 (0)1273 475500

mar14 dir_000_RiskUK_jan14 06/03/2014 14:11 Page 2

Page 69: Risk UK May 2014

CONTROL ROOM & MONITORING SERVICES

DISTRIBUTORS

INFRA-RED, WHITE-LIGHT AND NETWORK CCTV LIGHTING RAYTECUnit 3 Wansbeck Business Park, Rotary Parkway,Ashington, Northumberland. NE638QWTel: 01670 520 055Email: [email protected] Web: www.rayteccctv.com

THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESSCONTROL AND INTRUDER DETECTION SOLUTIONSNORBAIN SD LTD210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TPTel: 0118 912 5000 Fax: 0118 912 5001www.norbain.comEmail: [email protected]

ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PROD-UCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.ADI GLOBAL DISTRIBUTIONChatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RNTel: 0161 767 2900 Fax: 0161 767 2909Email: [email protected]

TRADE ONLY CCTV MANUFACTURER AND DISTRIBUTOR

COP SECURITYLeading European Supplier of CCTV equipment all backed up by an industry leading service and supportpackage called Advantage Plus. COP Security, a division of Weststone Ltd, has been designing, manufac-turing and distributing CCTV products for over 17 years. COP Security is the sole UK distributor for IRLAB products and the highly successful Inspire DVR range.More than just a distributor.

COP Security, Delph New Road, Dobcross, OL3 5BGTel: +44 (0) 1457 874 999 Fax: +44 (0) 1457 829 [email protected] www.cop-eu.com

CCTV SPECIALISTSPLETTAC SECURITY LTDUnit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XHTel: 0844 800 1725 Fax: 01788 544 549 Email: [email protected] www.plettac.co.uk

ADVANCED MONITORING SERVICES EUROTECH MONITORING SERVICES LTD.Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring• Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm ResponseTel: 0208 889 0475 Fax: 0208 889 6679E-MAIL [email protected]: www.eurotechmonitoring.com

CCTV & IP SOLUTIONS, POS & CASH REGISTER INTERFACE, EPOSFRAUD DETECTIONAMERICAN VIDEO EQUIPMENTEndeavour House, Coopers End Road, Stansted, Essex CM24 1SJTel : +44 (0)845 600 9323Fax : +44 (0)845 600 9363E-mail: [email protected]

WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS,PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.MAYFLEXExcel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJTel: 0800 881 5199Email: [email protected]: www.mayflex.com

EMPLOYEE SCREENING SERVICESTHE SECURITY WATCHDOGCross and Pillory House, Cross and Pillory Lane, Alton,Hampshire, GU34 1HL, United Kingdom www.securitywatchdog.org.ukTelephone: 01420593830

sales@onlinesecurityproducts.co.ukwww.onlinesecurityproducts.co.uk

EMPLOYMENT

IDENTIFICATION

EMPLOYMENT

URGENTLY NEEDED…National Franchise Opportunities with an established Security Companywith over 4000 installs specialising in Audio Monitoring.Try before you buy scheme. Contact Graham for full [email protected] TEL: 01274 631001

www.insight-security.com Tel: +44 (0)1273 475500

mar14 dir_000_RiskUK_jan14 06/03/2014 14:11 Page 3

Page 70: Risk UK May 2014

SECURITY PRODUCTS AND INTEGRATED SOLUTIONSHONEYWELL SECURITY GROUPHoneywell Security Group provides innovative intrusion detection, videosurveillance and access control products and solutions that monitor andprotect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology withtraditional analogue components enabling users to better controloperational costs and maximise existing investments in security andsurveillance equipment. Honeywell – your partner of choice in security.Tel: +44 (0) 844 8000 235E-mail: [email protected] Web: www.honeywell.com/security/uk

INTEGRATED SECURITY SOLUTIONS

THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRYSSAIB7-11 Earsdon Road, West MonkseatonWhitley Bay, Tyne & WearNE25 9SXTel: 0191 2963242Web: www.ssaib.org

INDUSTRY ORGANISATIONSPLANNED PREVENTATIVE MAINTENANCE

TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRYBRITISH SECURITY INDUSTRY ASSOCIATIONTel: 0845 389 3889Email: [email protected]: www.bsia.co.uk

INTEGRATED SECURITY SOLUTIONSINNER RANGE EUROPE LTDUnits 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,Reading, Berkshire RG74GB, United KingdomTel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001Email: [email protected]

PERIMETER PROTECTIONGPS PERIMETER SYSTEMS LTD14 Low Farm Place, Moulton ParkNorthampton, NN3 6HY UKTel: +44(0)1604 648344 Fax: +44(0)1604 646097E-mail: [email protected] site: www.gpsperimeter.co.uk

SECURITY MAINTENANCE CONSULTANTS• Planned Preventative Maintenance (PPM) Specialists • Price Comparison Service (achieving 20-70% savings)• FM Support / Instant Reporting / Remedial Work• System Take-Overs / Upgrades / Additions• Access, CCTV, Fire & Intruder, BMS, Networks & Automation• Free independent, impartial advice Tel: +44 (0)20 7097 8568 [email protected]

UPS - UNINTERRUPTIBLE POWER SUPPLIESADEPT POWER SOLUTIONS LTDAdept House, 65 South Way, Walworth Business ParkAndover, Hants SP10 5AFTel: 01264 351415 Fax: 01264 351217Web: www.adeptpower.co.ukE-mail: [email protected]

POWER SUPPLIES – DC SWITCH MODE AND ACDYCON LTDCwm Cynon Business Park, Mountain Ash, CF45 4ERTel: 01443 471 060 Fax: 01443 479 374Email: [email protected]

The Power to Control; the Power to Communicate

POWER

PERIMETER PROTECTION

STANDBY POWERUPS SYSTEMS PLCHerongate, Hungerford, Berkshire RG17 0YUTel: 01488 680500 [email protected]

INFRARED DETECTIONGJD MANUFACTURING LTDUnit 2 Birch Industrial Estate, Whittle Lane, Heywood, Lancashire, OL10 2SXTel: + 44 (0) 1706 363998Fax: + 44 (0) 1706 363991Email: [email protected]

UPS - UNINTERRUPTIBLE POWER SUPPLIESUNINTERRUPTIBLE POWER SUPPLIES LTDWoodgate, Bartley Wood Business ParkHook, Hampshire RG27 9XATel: 01256 386700 5152 e-mail:[email protected]

COMPLETE SOLUTIONS FOR IDENTIFICATIONDATABAC GROUP LIMITED1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HHTel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 [email protected]

STANDBY POWER SPECIALISTS; UPS, GENERATORS, SERVICE & MAINTENANCE

DALE POWER SOLUTIONS LTDSalter Road, Eastfield Industrial Estate, Scarborough, North Yorkshire YO113DU United KingdomPhone: +44 1723 583511 Fax: +44 1723 581231www.dalepowersolutions.com

SECURITY PRODUCTS AND INTEGRATED SOLUTIONSTYCO SECURITY PRODUCTSHeathrow Boulevard 3, 282 Bath Road, Sipson, West Drayton. UB7 0DQ / UKTel: +44 (0)20 8750 5660 www.tycosecurityproducts.com

www.insight-security.com Tel: +44 (0)1273 475500

mar14 dir_000_RiskUK_jan14 06/03/2014 14:11 Page 4

Page 71: Risk UK May 2014

SECURITY

CASH MANAGEMENT SOLUTIONS LOOMIS UK LIMITED 1 Alder Court, Rennie Hogg Road, Nottingham, NG2 1RX T - 0845 309 6419 E - [email protected] W - www.loomis.co.uk

CASH & VALUABLES IN TRANSITCONTRACT SECURITY SERVICES LTDChallenger House, 125 Gunnersbury Lane, London W3 8LHTel: 020 8752 0160 Fax: 020 8992 9536E: [email protected]: [email protected]: www.contractsecurity.co.uk

CCTVINSIGHT SECURITYUnit 2, Cliffe Industrial EstateLewes, East Sussex BN8 6JLTel: 01273 475500Email:[email protected]

FENCING SPECIALISTSJ B CORRIE & CO LTDFrenchmans RoadPetersfield, Hampshire GU32 3APTel: 01730 237100Fax: 01730 264915email: [email protected]

INTRUSION DETECTION AND PERIMETER PROTECTION

OPTEX (EUROPE) LTDRedwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibreoptic perimeter security solutions are owned by Optex. Platinum House, Unit 32BClivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZTel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311Email: [email protected] www.optex-europe.com

V

INTRUDER AND FIRE PRODUCTSCQR SECURITY125 Pasture road, Moreton, Wirral UK CH46 4 THTel: 0151 606 1000Fax: 0151 606 1122Email: [email protected]

INTRUDER ALARMS – DUAL SIGNALLINGCSL DUALCOM LTDSalamander Quay West, Park LaneHarefield , Middlesex UB9 6NZT: +44 (0)1895 474 474F: +44 (0)1895 474 440www.csldual.com

INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONSRISCO GROUPCommerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,Manchester, M24 2SSTel: 0161 655 5500 Fax: 0161 655 5501Email: [email protected]: www.riscogroup.com/uk

ONLINE SECURITY SUPERMARKET EBUYELECTRICAL.COMLincoln House,Malcolm StreetDerby DE23 8LTTel: 0871 208 1187www.ebuyelectrical.com

LIFE SAFETY EQUIPMENTC-TECChallenge Way, Martland Park, Wigan WN5 OLD United KingdomTel: +44 (0) 1942 322744Fax: +44 (0) 1942 829867Website: http://www.c-tec.co.uk

PERIMETER SECURITYTAKEX EUROPE LTDAviary Court, Wade Road, BasingstokeHampshire RG24 8PETel: +44 (0) 1256 475555Fax: +44 (0) 1256 466268Email: [email protected]: www.takexeurope.com

SECURITY EQUIPMENTPYRONIX LIMITED Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronixwww.linkedin.com/company/pyronix www.twitter.com/pyronix

SECURITY SYSTEMSBOSCH SECURITY SYSTEMS LTDPO Box 750, Uxbridge, Middlesex UB9 5ZJTel: 01895 878088Fax: 01895 878089E-mail: [email protected]: www.boschsecurity.co.uk

VICON INDUSTRIES LTD. Brunel Way Fareham Hampshire, PO15 5TX United Kingdomwww.vicon.com

SECURITY EQUIPMENTCASTLESecure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QYTEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042www.facebook.com/castlesecurity www.linkedin.com/company/castlesecuritywww.twitter.com/castlesecurity

INTRUDER ALARMS – DUAL SIGNALLINGWEBWAYONE LTD11 Kingfisher Court, Hambridge Road, NewburyBerkshire, RG14 5SJTel: 01635 231500Email: [email protected] www.webwayone.co.ukwww.twitter.com/webwayoneltd www.linkedin.com/company/webwayone

www.insight-security.com Tel: +44 (0)1273 475500

mar14 dir_000_RiskUK_jan14 28/04/2014 17:50 Page 5

Page 72: Risk UK May 2014

DualCom SignallingKeeping up the perfect balance

of quality and cost

Stand F1300 www.csldual.com ©CSL DualCom Limited

Putting you in control

Project1_Layout 1 26/04/2014 21:49 Page 1