Security you can bank on

October 2013 Integrated Solutions, Financial (Industry)

Keeping money safe, whether physically or online has always been challenging. The draw for criminals is obvious and in the current economic crunch, accompanied by unprecedented unemployment levels, this is escalating as a critical need. Hi-Tech Security Solutions spoke to four industry representatives about what role technology is playing in deterring and preventing theft.

Gareth Dewey, national business development manager, technical, for Protea Coin, said a common trend that companies are leaning towards, regarding staff identification and authentication, is the use of biometric readers. “There are many options available, however, from a cost implication perspective, biometrics seem to have the best ROI.

“The driving force behind biometric readers is to prevent the possibility of buddy clocking and also securing the employees on the premises. Often CCTV cameras can be used to provide visual verification for identification and authentication purposes.”

Ernest Mallett, regional sales director, Sub-Saharan Africa for Tyco Security Products said the company’s focus is on HID iClass and iClass SE with SIO biometric readers in high-risk areas for authentication. “Some of the financial services sector companies have opted for a more secure approach by using TripleDes encrypted RS-485 readers with compatible cards. In both cases, our focus is to eliminate opportunities for card cloning and Wiegand sniffing. Done correctly it’s almost as good as biometric authentication at a lower price.”

Roy Alves, business development manager, MEA at Axis Communications said: “There is a drive to correlate access control with video. The latest iPhones have fingerprint access technology and it’s just a matter of time before all your financial transactions will require your fingerprint.”

Grahame Saunders, divisional manager of the public safety division at NEC Africa commented that in terms of logical access, biometrics is being used to safeguard data in banks and for online transactions. These systems have the ability to be used for both audit and forensic evidence purposes. Users may be requested to sign on not only at the start of a transaction, but also periodically when they commit to certain transactions such as changing data or transferring funds.

Is monitoring happening onsite or remotely?

“Both options are effective, depending on the circumstances. The important aspect to keep in mind is that sufficient information and research needs to be acquired, based on the requirements of the customer and the premises. Whether the customer has the capability, capacity and safety on site to have an on-site monitoring control room needs to be considered. Whether the site is a high-, medium- or low-risk site will also play a fundamental role from a monitoring perspective. Some clients prefer both options from a security and backup point of view,” said Dewey.

“I believe there is a move towards monitoring offsite as bandwidth becomes more readily available. Often though, banks will have their own control room as well as using a third-party offsite facility,” said Saunders.

Alves remains cautious about the bandwidth issue. “High-definition footage does not travel well on the bandwidths we have access to presently. I would suggest that any offsite monitoring should focus on events rather than constant monitoring. Video should be retained on site but be accessible to the control room. There is currently a trend towards mobile platforms but there is still quite a road to be travelled, as video quality is degraded.”

Getting it right

“I believe that a consultative approach is the most important technique that must be followed in order to determine that the correct offering is made. Companies who are looking at implementing surveillance technologies regardless of securing premises, assets or people, should clearly define the requirements or expectations they want to achieve and be willing to invest in the technology,” said Dewey.

“There is a big focus on video and intrusion integration as well. Banks want simplicity and ease of use with secure results,” said Mallett.

“One should get the IT department involved in the process as they are responsible for the smooth running of these systems in terms of networking and cabling. Often the IT department is nervous about security having access to sensitive banking data, so collaboration would be advantageous,” said Alves.

“We have seen a move towards smarter technology with video analytics providing event-driven feedback. Scenarios such as a person running rather than walking, crossing trip lines, movement in doorways, or dropping bags and leaving them unattended, can be programmed into a system and when the transgression occurs, the system alerts the control room,” said Saunders.

“Thermal cameras are often deployed at the perimeter, allowing precise detection of unauthorised people, through the production of a heat signature, before an event can occur. Boom control at entrances act as a holding pen for people entering the property and can be situated at various points between the main entrance at the perimeter and the entrance to the actual building. This allows a virtual lockdown in each sector which is effectively monitored using facial recognition technology and licence plate number recognition (LNPR). Once the person reaches the building they will enter via either revolving doors or man trap cubicles,” said Alves.

“Areas are restricted for various reasons and there are a number of requirements regarding most restricted areas, that is, inductions and certificates. The system should have the capability to manage these tasks,” Dewey continued.

Mallett said that perimeter to vault security can be split into three areas. “In commercial buildings, people would use access cards for entrance. This also applies to logical access whereby if the access control system has not checked you in for the day then the ERP system will not provide you with computer access. Online visitor management is one other aspect of this.

“Cash in transit is next, with biometric access and video as well as POS integration key in these areas. In retail banking, there is less technology in the access control for banking halls, but technology is used to track staff movements and to assist with T&A applications. Video is now migrating to IP solutions, integrated to the access control and alarm systems. Security in this sector is low-key as risk is limited,” Mallett added.

On guard

There is agreement that there will always be a place for physical guarding, whether as a security guard within the bank or as a cash-in-transit officer. “People visiting a bank feel more comfortable if a guard is present, even when there are high levels of security technology,” said Saunders.

“Technology can be deployed not only to supplement the guarding, but also to protect the guard. Cameras in CIT vehicles provide feedback on guard movements and any events. Audio detection in cameras will send an alarm to the control room in the event that glass breaking, gunshots or screams are detected. Often, prior to a crime being committed, criminals will interfere with the camera or its lens. Certain cameras will detect when this occurs and will immediately send a signal to the control room for intervention,” said Alves.

Hot technology

“Facial recognition technology is gaining ground and can be deployed across large architectures like in banks where fraud detection is important. This would allow the banks to identify known fraudsters irrespective of how many branches they frequent,” said Saunders.

“Video analytics is becoming an important requirement when specifying solutions. This includes full HD systems that allow for quality footage and also allow you to decrease your camera count on site. Having a technology solution that allows the user to define zones and triggers within the ATM world is becoming a huge requirement from a security point of view,” said Dewey.

Contacts

Axis Communications, +27 (0)11 548 6780, www.axis.com

NEC Africa, +27 (0)11 656 3416, www.nec.com

Protea Coin, +27 (0)12 665 8000, www.proteacoin.co.za

Tyco Security Products, +27 (0)82 566 5274, www.tycosecurityproducts.com



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.