Hitech Security Solutions Issue 5 2022

Even more than ColorVu www.hikvision.com Explore New Possibilities With ColorVu Technology VOLUME 28 | ISSUE 5 2022 The authoritative resource for physical and converged security

www.securitysa.com Issue 5 2022 1 VOLUME 28 ISSUE 5 2022 Leaders in security: Jane-Eleanor Morrison Sector focus: Mining Guarding services Power management Communications Jane-Eleanor Morrison’s success story starts from growing up in the stressful pre-democracy times in KZN, moves through a successful career in SAPS, to BMW South Africa where she is now the risk control manager. Hi-Tech Security Solutions spoke to Sean Drishner and Johan de Bruyn fromMezuzah Security Services. Security on mines incorporates more than security technology, it also requires effective communications to support security and safety of people and assets. With Eskom falling apart, making good power management choices is critical to keep your security (and other) equipment functioning as required. Keeping in contact is very complex in some instances, but also simple with the right radio technology in your hand. Editor’s note.............................................2 News............................................................3 Access control & identity management....................................... 21 CCTV, surveillance & remote monitoring.......................... 31 Our cover: Hikvision releases panoramic camera range with ColorVu Hikvision has released a new range of panoramic cameras that use integrated ColorVu technology to provide vivid and full-colour video imaging for a wide field of view in light conditions as low as 0,0005 lux, or nearly total darkness. Even more than ColorVu www.hikvision.com Explore New Possibilities With ColorVu Technology VOLUME 28 | ISSUE 5 2022 The authoritative resource for physical and converged security 10 8 12 18 24 28

2 Issue 5 2022 www.securitysa.com Andrew from the editor’s desk LETTERS TO THE EDITOR Letters to the Editor should be addressed to Andrew Seldon at [email protected]. Sending material to this publication will be considered automatic permission to use in full or in part in our Letters column. Be sure to include your name, e-mail address, city and postal code. We reserve the right to edit all letters. Disclaimer While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details areprinted as provided by the advertiser. Technews Publishing(Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material. All rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Technews Publishing (Pty) Ltd, Reg No. 2005/034598/07 Editor Andrew Seldon: [email protected] Advertising sales Tracy Wolter: [email protected] Heidi Hargreaves: [email protected] Subscription Services For address changes, orders, renewal status or missing issues, e-mail: [email protected] Design and layout: Technews Production Department Published by Technews Publishing (Pty) Ltd 1st Floor, Stabilitas, 265 Kent Avenue, Randburg Box 385, Pinegowrie 2123 Tel: +27 11 543 5800 ISSN 1562-952X Subscribe online: www.technews.co.za HI-TECH SECURITY SOLUTIONS ISSUE 5 2022 There are many companies these days touting their ability to securely authenticate people via mobile devices (or selfies), claiming that it is secure and easy. Some banks are even allowing people to open accounts via selfies without having to physically enter a bank – which is everyone’s dream. The argument often used is that verifying your identity at the bank is simply a matter of the person behind the counter looking at you and your ID or passport and making a decision. In the past this may have been true, but South African banks can now also check your fingerprints against Home Affairs to make sure it’s you. Of course, Hi-Tech Security Solutions carried a few stories about ‘selfie enrolment’ over the past two or three years, and everyone involved stressed the simplicity and reliability of the process. I was recently forced to enrol via mobile for a course I was doing and my experience was anything but simple. And while I am not an expert in the technicalities of it, my experience left me doubting the reliability of the enrolment (never mind the question of who my data is going to, what are they doing with it, how long they intend to hold onto it and more. Quite honestly, fromwhat I have seen of some American companies, I would expect the data sent there to be distributed to every server in the USA within seconds – although I may be biased. And yes, I said America and not China which is the usual whipping boy for privacy hysteria, especially from America). Maybe I’m too old? Leaving the privacy issue behind, the process I used was cumbersome. It didn’t like the picture of me taken by my laptop’s camera (although Microsoft seems happy to log me in as administrator via my mugshot in less than a second). Then it couldn’t get a good enough image of my ID credentials. So I moved onto my smartphone (a Nokia X10, so it’s not a cheapie). Six attempts at reading my ID credentials later and I decided to just take a picture myself and upload it. That worked. However, the idea that a picture taken by someone, somewhere was accepted instead of a real-time scan is a bit offputting. Then came the ‘live selfie’ confirmation. I know more about lighting now than Hollywood celebrities. And after however many attempts I apparently still wasn’t me. Eventually I just said some rude words and thought I’d give it one more try before making it someone else’s problem and it worked. Maybe they were monitoring the audio feed and decided to avoid having to talk to me? The reason for the enrolment was just to get a certificate (if I pass), so maybe that’s OK. Maybe I’m just old and paranoid, but if I was opening a bank account I would be horrified if a bank would accept that enrolment. I would even be prepared to face the trauma of going into a branch rather than trust the process I went through; it’s like saying “here’s a picture of someone’s ID and I promise it’s me.”

NEWS & EVENTS The ESDA Annual Charity Fundraiser, part of the Electronic Security Distributors Association’s Golf Day, will take place at Benoni Lake Golf Course on Wednesday, 21 September 2022. Covid restrictions did not allow ESDA to host its fundraising drive in 2020 and 2021, but the association is happy to announce its return. This year, the nominated recipient for all proceeds raised is the Gift of the Givers Foundation. The Gift of the Givers Foundation is the largest non-governmental disaster response organisation of African origin on the African continent, and has done much for local communities in need. It needs any form of assistance, hence ESDA believes this is an extremely worthy and reputable recipient, and every cent donated will be put to invaluable use. The cost of a fourball will be R3750 and there will be some spectacular prizes up for grabs. The day is organised, administered and supported by the Electronic Security Distributors Association (ESDA). To register for the event, please email [email protected] with your company name and how many teams you would like to register to participate. If you would like to make a donation toward the cause, or actively sponsor prizes for the ESDA Annual Charity Fundraiser Golf Day, please contact the association on the same address. ESDA’s annual charity fundraiser ADI South Africa, with its leading suppliers from across the video, intrusion and access control industries, is hosting the ADI Expo Limited Edition 2022. The expo will be held in Johannesburg on 6 September and in Durban on 8 September. Industry experts will be on hand to share their expertise and demonstrate their latest solutions. There is loads in store to experience, including power-packed seminars, special offers and lucky draw. Lunch, refreshments and free onsite parking will be provided. Registration is free. To register go to https://go.adiglobal.com/adi-expo-southafrica2022. html (or use the short link: www.securitysa.com/*adi22). For more information contact ADI Global Distribution, +27 11 574 2500, [email protected], www.adiglobal.co.za ADI Expo Limited Edition 2022 Gallagher has announced the launch of its new Security in Focus podcast series called Tech Talk. Hosted by chief technology officer Steve Bell, the series will be the only dedicated podcast for security technicians and installers, promising to be an informative and valuable resource for them. Tech Talk also aims to offer listeners industry insights, best practices, and technical tips on the latest Gallagher product features and version releases, to ensure customers get the most from their security solutions. In addition, the podcast will feature interviews with leading experts, thought leaders and product owners. The first episode delves into the new features included in the latest version of Gallagher’s site management software, Command Centre. “I’m excited to talk about Gallagher’s Command Centre v8.70 release, and how the new features will improve the overall experience. My special guests and I will cover topics such as controller upgrades, MorphoWave reader integration, SALTO integration updates, site plan enhancements, alarm functionality enhancements and more,” says Bell. Having worked in the security industry for 35 years, Bell’s goal is to leave the world of physical security in a better place by speaking up and providing insights. Episode 1 is now available to listen to at https://security.gallagher.com/security-in-focus/ For more information contact Gallagher Security, +27 11 974 4740, [email protected], www.security.gallagher.com Gallagher launches Tech Talk Steve Bell.

4 Issue 5 2022 www.securitysa.com NEWS & EVENTS The end of Covid restrictions has seen many companies getting back on the road to meet customers, partners and potential customers face-to-face. The success of Securex earlier this year showed how the market has been missing out on these meet-and-greet events. One of the events in July was a morning event hosted by Ideco Biometrics and IDEMIA. The event had a number of goals, one being to show off the MorphoWave SP and XP products from IDEMIA – the mid-range versions of the MorphoWave touchless fingerprint terminals. The others were to talk about the companies and what their current focus areas are. Wouter Du Toit from IDEMIA kicked off the presentations with an overview of the company and the world in which it operates. IDEMIA is far more than the access control biometric terminals most known in the market, and the company is focussed on creating secure interactions around the world through reliable identity solutions. Even in South Africa, the company is involved in secure cards for banking and other transactions. The idea is to make all transactions and interactions that require identification smarter and simpler, but secure. This is achieved through enabling people to create identity credentials, whether by card, mobile or biometrics, through to secure and trusted authentication systems, and to the analysis of the data generated. Du Toit also took some time to focus on the supply chain issues the world is facing at the moment. After such a long delay in the supply of components, every company has had to find ways around the shortages. IDEMIA has addressed this by creating a task team focused on ensuring that supplies will be reliable, and adapting some products to incorporate new components once they have been tested and certified by the company. He says that from September this year the company will be able to forecast availability of products with accuracy, and in 2023 things should return to normal in terms of stock holding – barring any unforeseen crises. Identity portfolio Du Toit also briefly went through IDEMIA’s product portfolio, including digital identity products, access control (both fingerprint and facial), integration aspects and MorphoManager, the company’s integrated management platform. He says that while Covid was a boost for contactless biometric devices, sales are still increasing now that restrictions have been lifted. In addition, sales of contact biometrics are also increasing. IDEMIA and Ideco demonstrate their value stacks By Andrew Seldon. Wouter Du Toit (left) and Marius Coetzee (right). In the contactless space, VisionPass is IDEMIA’s facial recognition solution, while the MorphoWave is the contactless fingerprint biometric solution. The initial MorphoWave products were aimed at the high-end market, but the newMorphoWave SP (Simplified Profile) and XP (Extended Performance) are targeting the mid-market. The SP is available for far less than the initial MorphoWaves, which is making it a popular option these days. IDEMIA is also promoting its free and paidfor certification programmes, some of which are available online while others are in-house training. The three certifications available at the moment are Biometric Consultant, Biometric Professional and Biometric Administrator. The Ideco value stack Martin Meltz from Ideco was up next, talking about the long partnership between IDEMIA and Ideco. He also focused on the value stack offered by Ideco, which is built primarily on IDEMIA’s value stack. Ideco is a master distributor for IDEMIA, but it does much more than distribute products. It is also the certified repair centre for IDEMIA, and it develops its own solutions based on products from IDEMIA and others. Its go-tomarket path is via integrators and installers. In summary, Meltz said Ideco offers a full service to clients, starting before delivery where it assists in solution design, integration and quality assurance. It focuses on best practices, not only in terms of the products it sells and develops, but even the enclosures and mounting of the products, as well as integration with other products and platforms. This includes online and onsite training as well as system reports and backups. (Its solutions include biometrics, but also all other identify and access mechanisms, such as cards.) The Ideco value stack is designed to offer a range of solutions for clients, designed and built on an IDEMIA backbone, delivering efficiency and productivity. The value stack is based on identity verification and the associated services and solutions. It includes cloud backup, managed services and integration services. The main components mentioned by Meltz include the following: • Mobile workforce solutions, allowing companies to run time and attendance and identity verification anywhere people are on site. • It also includes a mustering module which will allow companies to do a roll call in case of an emergency, to quickly determine if people (employees, contractors and visitors) have evacuated the building successfully. • Visitor management is also available, with software solutions combined with hardware, including Ideco’s own visitor management device. • Protecting biometric terminals in terms of tamper protection is also available without additional software. Another of its own developments allows multi-door control, so that all doors can be opened in an emergency, and the IDEMIA readers will display a specific colour to lead people to safety. • An IoT Solution (or GSM gateway) has also been developed which allows remote devices to be managed with ease, allowing a central control room to reach each device, even if the national GSM providers don’t offer permanent IP addresses (the IP addresses are managed seamlessly by the gateway). • Messaging seems like a standard in today’s world of smartphones and laptops, but companies can also deliver messages to people via biometric terminals as they enter a building, whether it is a bulk message to all staff, or individual messages to people as their identities are verified. Naturally, messages can also be sent to control rooms if doors are left open or devices tampered with. • Management reporting is also available on all its products through MorphoManager, but Ideco has added to the platform’s built-in reports. The event was ended whenWouter Du Toit presented Ideco’s CEO, Marius Coetzee, with an award of appreciation from IDEMIA and the partnership between the two companies that has lasted for some 20 years. For more information contact: • IDEMIA, +27 11 601 5500, [email protected], www.idemia.com • Ideco Biometric Security Solutions, +27 12 749 2300, [email protected], www.ideco.co.za

www.electramining.co.za Keraysha Pillay, Senior Marketing Manager Tel: +27 (0) 10 003 3057 | Cell: +27 (0) 79 816 9122 Email: [email protected] Contact our team Organised by: YEAR S Register Online For Free Entry Electra Mining Africa Elenex Africa POWERex Transport Expo Automation Expo Why visit? knowledge from technical experts Acquire products & brands Compare from daily free seminars Learn live demos of machinery & equipment Experience with suppliers & service providers Network cutting-edge products and technologies Source with 650+ knowledgeable exhibitors Connect Connecting people since 1972 in the areas of mining, electrical, automation, manufacturing, power and transport. 5 - 9 September ExpoCentre, Nasrec, JHB, SouthAfrica 9AM - 5PM DAILY

6 Issue 5 2022 www.securitysa.com NEWS & EVENTS Bosch Building Solutions took to the road in July, hosting an event that promoted its latest products and the direction the company will be taking in the future, which is focused on releasing predictive solutions based on sustainability and trust. Bosch’s Quintin Van Den Berg launched the conference and introduced the speakers, the first of which was Pieter Geldenhuys, director of the Institute for Technology Strategy & Innovation. As a futurist, Geldenhuys had some concerning news, but ended on a positive note as the future, while not all it was supposed to be as we reach peak consumption, will have opportunities for the prepared. In particular, good news applies to Africa, which is the only continent that has positive demographic expectations for the next decades. The changes will be in the global economic realm, but will also be boosted by technology, specifically artificial intelligence (AI) and the Internet of Things (IoT). Just as we have seen the smartphone replacing many previously independent things – from phones to cameras, diaries to contact lists, to-do lists and shopping, and an alarming number of other things – the edge will have a similar impact in future. Cameras will form a significant part of the edge future (in this case, surveillance cameras), Quintin Van Den Berg. Sustainability, trust and predictability By Andrew Seldon. as they will expand their operations far beyond security. We are already seeing the initial phases of this change with cameras doing crowd control, parking management and even temperature reading – among other functions. Right now, we are seeing the edge being populated with an ever-increasing number of devices, from intelligent devices like cameras, to dumb devices that only send simple data home (such as temperature, humidity or water levels). With AI, more intelligence at the edge can be built into cameras, which can run multiple AI apps at the same time to implement these features in one device that has internal processing capacity, internal storage as well as the ability to connect to networks of all types. Artificial Intelligence of Things (AIoT) Nico Broodryk from Bosch was up next, and he spoke about the three pillars Bosch is building its security and building management future on. Trust: End users must be able to trust the quality of their cameras and the analytics running on those cameras. Broodryk says Bosch’s 5-year warranty is proof of the confidence the company has in its cameras, and he states that current cameras from Bosch include “the best analytics available.” Sustainability: In terms of being ‘green’ and helping to lower CO2 emissions. Bosch is working to make its cameras simple to manage, even remotely, which will save installers from travelling every time there is a problem and even, in certain circumstances, to configure new cameras. The power to predict: Predictability is key to the future. Whether it’s the number of people in a retail store, or the length of queues, or traffic control on highways, AI is changing and will change the way cameras are used and the value they provide to users. The company is focused on doing more development on edge processing to reduce the bandwidth and backend computing resources companies need, making cameras intelligent sensors (as Geldenhuys mentioned). Surveillance services from Bosch A big announcement at the event was the VSaaS solution from Bosch (Video Surveillanceas-a-Service), which will allow companies to have only the camera on site, with everything else hosted in Bosch’s cloud. The cost benefits are that the traditional infrastructure required for servers, storage, video management platforms, switches and software licences will be removed and replaced by a monthly fee for the same services in the cloud. Additionally, all upgrades to management platforms, or even firmware on cameras, will be done remotely, and integrators will even be able to configure their clients’ Bosch cameras remotely via the cloud (for certain camera models). The system is ONVIF conformant and will also allow companies to manage their conformant thirdparty cameras via the cloud service. Remote monitoring and management will be via a web browser, a smartphone or a PC-based application. In addition, while not a new feature, leading lines of Bosch cameras will automatically include 16 video analytics functions in every camera in the future. Bosch cameras used with the VSaaS solution will also have the flexibility to store up to 7 days of video footage on the camera and/or transfer it to the cloud, or transfer footage which the analytics identify as suspicious to the cloudbased control room. AIoT in new cameras Moving into the AIoT world, edge analytics applications will also be developed further to improve the efficiency of building operations and security, as well as smart cities and other environments. These cameras will simply connect to the VSaaS server with no configuration needed on site. Three applications will be available at first (probably later this year). These include the building management camera mentioned, which requires no calibration but provides precise detection of objects (human or otherwise) with real-time analytics available. Perimeter cameras will soon offer longer detection distances, automatic calibration and even the ability to distinctly identify crawling people. A camera focused on road and traffic intelligence is also on the way. This camera will offer analytics with better than 95% accuracy in a variety of functions, such as speed measurement, direction, and people and vehicle identification and classification. This article is a summary of the announcements on the day. AIoT has been touted for some time as ‘the next big thing’ in our industry, with some companies putting their toes in the water. Bosch has committed to the idea and will be releasing products to back up its commitment in the coming months. For more information contact Bosch Building Technologies, +27 11 651 9600, [email protected], www.boschsecurity.com

www.securitysa.com Issue 5 2022 7 NEWS & EVENTS Communications are the backbone of security, and a fairly new company on the security scene in South Africa is Arcanum Africa. The company sells a range of products not typically found in the local security market, most of which were developed for military or intelligence use. Hi-Tech Security Solutions spoke to Arcanum’s Peter Stolwerk and Aaron van Schaik to find out a bit more about the company and the products it is bringing to the local market. Stolwerk explains that his background is in military and law enforcement work in Europe and the UK, which has enabled him to gain exposure to these solutions, none of which have been available in South Africa before. The range of products is continually growing, but Stolwerk and Van Schaik highlighted a few that have already proved their worth in the local arena. The products are generally aimed at private security, commercial security and wildlife protection. The first product is uSwitch, which Stolwerk describes as a “relay on steroids.”This little box provides users with control over almost anything on a network (whether a private network or connected to the Internet) in a couple of minutes. uSwitch is an electromechanical relay with a built-in web server that allows you to switch things on or off, or open and close gates, and more, from a computer or mobile device. In an environment with many IP cameras, connecting cameras to the uSwitch monitors the cameras around the clock. If a camera freezes or becomes unresponsive, the system will automatically trigger a reboot without having to physically go to the camera – which is useful in covert operations, or to save time and money to send out a service vehicle at a remote location. Rebooting can also be done manually. In remote regions, like game farms or mining sites without cellular connectivity, the uSwitch works just as well on a private network that has no Internet connectivity. Failsafe mesh network Another communications solution the company offers is HyphaMesh. These devices communicate with each other and form a mesh network in almost any setting. Whether tethered to a fixed position or on a person, the Hypha devices communicate with each other and are able to find another route to a bridge or switch if one device goes down. The bridge is a Hypha device that is connected to a satellite or GSM network, allowing the whole network to function as if everything were connected. In a situation like this, every individual carrying a device (for example) will be able to use their phone or tablet as if they were in an area of connectivity. It is also possible to create a private network that does not have Internet access, allowing the Hypha devices to create and use their own network for communications. Each device is preprogrammed to search for other devices and automatically become a node in the network. Arcanum also provides a range of surveillance cameras that can be used in a mesh network in remote areas. The battery power on one of these cameras will last about 400 days before it needs a recharge (unless it has a solar charger). The cameras can communicate via 4G connections, or to a bridge or hub (at a distance of up to 500 m as long as it has line-of-sight; less if there is dense bush or some other obstacle in the way). To save bandwidth, the cameras take high-resolution images when the PIR detects movement and sends these to the hub, where the AI analytics will determine if the images contain a person, vehicle or Specialised surveillance and communications By Andrew Seldon. other object of interest. In anti-poaching efforts, this will prevent false alarms when animals walk in front of the cameras, only raising an alert when a person or vehicle is identified. Arcanum says these cameras take only 10 minutes to install and one can have up to eight cameras per bridge, and multiple bridges. They also include low-light functionality up to about 35 m, with up to 80 m in daylight with a clear view. All communications are secure by default, encrypted according to the AES-128 (128-bit encryption) standard. In addition, any images stored on the devices will be similarly encrypted. “In remote regions, like game farms or mining sites without cellular connectivity, the uSwitch works just as well on a private network that has no Internet connectivity.” Just off the boat Among other ‘toys’ Arcanum has released, or will be releasing shortly, are artificial intelligence solutions (including for drones), as well as a jamming detector that alerts you if someone decides to jam your wireless communications network. The anti-jamming device is very sensitive, so companies will know the moment a jamming operation begins. Arcanum is also selling Camect, touted as the most private camera hub for your home. The Camect hub detects IP surveillance devices installed in your home and takes control of them. It includes a range of AI algorithms to differentiate between people, pets, cars, bicycles and others. It is controllable from a computer, smartphone or tablet, allowing users to set zones and times when alerts should be raised. Camect allows you to view live and recorded video from your mobile device, and is compatible with a host of cameras, including ONVIF-conformant devices (or it can access the RTSP stream). All of this is managed from one hub. Arcanum currently sells direct to end-users, but is open to partnerships with companies that have the required skills to support its product range effectively. For more information contact [email protected] or go to www.arcanum-africa.com

8 Issue 5 2022 www.securitysa.com People are drawn to the security industry for a variety of reasons. For Jane-Eleanor Morrison, however, the television series Hill Street Blues convinced her she wanted to fight for justice and “catch the bad guys”. Of course, as a coloured female from a conservative family, growing up in KwaZuluNatal, there were more than a few challenges she had to overcome. Jane matriculated in 1989 in Durban, in the middle of the era of stayaways and general political unrest in the coloured community in that area (although it certainly wasn’t restricted to that community or area). In those days, the expectations in her community were that she would get married, settle down, have children, and perhaps find a job in a retail store. Jane, however, wanted more. She wanted to broaden her horizons and gain further education. Moreover, she knew that being a coloured, lesbian female would make it difficult to establish a career and find her own destiny in KZN, so she made the decision to leave. (In those less enlightened times, her sexual orientation, although evident, remained hidden until she hit her thirties.) Her parents were very protective of Jane as their only female child, but eventually allowed her to move to Johannesburg with her cousin. She stayed with her mother’s cousin in Soweto for a while, amid the unrest there which made her want to join law enforcement. Of course, she would have been called a traitor if she joined the SAP. Six months later she, her cousin and three friends found employment and moved into a flat together in Hillbrow, Johannesburg. An opportunity at a braai One evening while the group was having a braai on their balcony with some friends, they witnessed a woman being robbed. From Hill Street Blues, to Hillbrow, to managing risk for BMW By Andrew Seldon. Jane-Eleanor Morrison’s success story starts from growing up in the stressful predemocracy times in KZN, moves through a successful career in SAPS, to BMW SA where she is now the risk control manager. Jane-Eleanor Morrison. LEADERS IN SECURITY JANE-ELEANOR MORRISON One of the friends was Eddie White, an SAP member who became her mentor for many years. Seeing the crime, Jane jumped over the ground floor balcony, chased the criminal down and “put him down.”The thief was later escorted to Park Station, no doubt feeling very sorry for himself. This led to Eddie advising and assisting her in joining the SAP (before it became SAPS). She was fast-tracked and started at the Police Training College in September 1991. At this stage, the police still segregated its colleges to keep the different races apart (future training colleges would be integrated). Jane was in the last intake of what used to be known as the ‘Kitskonstabels’. She says the training she received was good and it taught her discipline, patience and various facets of the law. It also “opened her horizons,” for which she is grateful. As the only English-speaking coloured woman at the college, she also had to learn Afrikaans quickly, as all instructions and exams were in Afrikaans. Nonetheless, she still won the award of ‘Student of the Semester’ due to her determination to make it work. Having graduated, she started as a uniformed officer earning the princely salary of R1270 per month (R970 after deductions). She was soon promoted to work in the detective group, where she was the only nonwhite woman. Following that she moved onto the Highway Patrol division that was created to patrol the country’s national roads. The highway division was using BMWs donated for the task, equipped with the ability to trace vehicles equipped with Tracker devices. In a four-month period, Jane and her partner recovered the most vehicles for Tracker when compared to her colleagues. Joining the private security industry Based on her performance, Tracker offered her a job, and in June 1998 she started with the company as a control room operator, soon moving up to supervisor and then investigator. While with Tracker she continued her education (as she did in the SAPS), and Tracker sponsored Jane in obtaining her National Diploma in Policing and then Forensic Investigation. Jane spent 18 years at Tracker doing investigations and as an expert witness for the company in various court cases. In the last four years of her employment with the company, this involved moving from province to province, wherever arrests were made. Jane was also involved in recovering stolen vehicles from Lesotho, Botswana and Zimbabwe.

www.securitysa.com Issue 5 2022 9 “There are always new ways in which we can improve efficiencies and optimise security operations, and that has been and still remains my focus going forward.” Her education continued during this period, with Jane doing courses in management, before she was approached by BMW South Africa, this time in the field of technical security and the physical security sector. She made the move to BMW in 2016 and has not looked back since. Industry challenges Despite achieving the success she has, Jane still faces day-to-day issues with the security industry, primarily on the human resources side. The high turnover rate of security officers means that security service providers employ a pool of people who are trained to think the same way and are afraid to think out of the box. This often means mass hiring practices with no due diligence with respect to compliance to the law, skills upgrades and so forth. “Sometimes it feels as if their only focus is to provide a warm body to meet contractual obligations,” she says. Despite this, standards can never be compromised, and Jane insists that her service providers conduct proper assessments and can prove that the people supplied to BMW obtained an 80% or higher pass mark. She also conducts personal interviews before deploying any guards and has developed a set of standard operating procedures (SOP) for all onsite personnel to adhere to. She says there is also a negative stigma attached to lesbian black women within the security industry, as they do not form part of the ‘old white boys’ club’. Slurs are limited because it is known that repercussions can be followed in today’s industry. However, shunning is still prevalent. Non-white women in the security industry are underestimated and exploited in many spheres. Many major security companies lack black female representation at the board level and she believes this should change. Diversity is a topic that is being addressed by corporates, so there is optimism that things will change in a positive way. Serving the youth of South Africa Jane is not only focused on the security industry, however. She is active in the LGBTQ+ community as a coach to young people having difficulty in accepting and understanding their gender identity. Her advice to these youths is pertinent to all youngsters concerned about their future, and that is to work towards what you want, don’t stop and don’t give up. She believes that if you want something there will be an internal desire and drive to achieve it, and if you pursue it and persevere, there will be light at the end of the tunnel. “Every decision you make in life will have repercussions,” she states. “If you are careful and make the right decisions, the right repercussions will follow, enabling you to achieve your goals as long as you steadfastly chase them.” With her passion for law enforcement, she also advises young people to work hard and find people who can mentor and assist them in achieving their dreams – even if this takes time, and it will. She warns them not to give up in the interim and to stay away from crime and drugs. She says the same mantra she teaches the security officers at BMW applies; it may sound simple, but it is vital: • Do what you are supposed to do. • Do not do what you are not supposed to do. • Do not do what you should not do. Finally, Jane also advises people to think outside the box. “Thought is free; use and apply your mind to what you can do differently that will benefit yourself and your organisation.” Not done yet While Jane has an enviable track record in the security industry, she is not done yet. She is still learning and wants to move into more strategic management roles, which includes her dream of running the company’s full security function, not only in South Africa, but for the African continent. She also wants some expat experience to compare strategies employed at other BMW plants in different countries, adopting and sharing best practices across the global group. She ends by noting: “There are always new ways in which we can improve efficiencies and optimise security operations, and that has been and still remains my focus going forward.” LEADERS IN SECURITY

10 Issue 5 2022 www.securitysa.com Hikvision has released a new range of panoramic cameras that use integrated ColorVu technology to provide vivid and full-colour video imaging for a wide field of view in light conditions as low as 0,0005 lux, or nearly total darkness. Large areas can be very difficult to secure, often requiring multiple cameras to provide full coverage. With traditional cameras, monitoring these kinds of area can also be difficult in low light conditions, or at night. To address these challenges, Hikvision has integrated ColorVu into its panoramic cameras, which use the ‘image fusion’ algorithm to stitch together images from two side-by-side lenses for a seamless, 180° view. The results are reduced equipment requirements (with fewer cameras needed to cover large areas), improved situational awareness based on a single, wide-angle image and no blind spots; and the ability to capture every detail in full colour – even in near-total darkness. A super-wide angle view, with no blind spots Hikvision image fusion technologies in the new panoramic cameras provide significant benefits over traditional wide-angle cameras. By using ‘pixel-level’ matching between the images from the left- and right-side sensors, this prevents any blind spots, or image ‘twisting’, or ‘distortion’. Equally importantly, the image fusion process includes both brightness and colour processing technologies that ensures consistency across the entire wide-angle image. This is a significant improvement vs. traditional panoramic cameras, which do not Hikvision releases panoramic camera range with ColorVu Vivid and full-colour video imaging for a wide field of view with lighting as low as 0,0005 lux. compensate for the different lighting conditions experienced by left- and right-side lenses. AI capabilities that further boost security All models in the new panoramic camera range use Hikvision AcuSense AI technology to differentiate between real security threats and other moving objects such as animals, falling leaves and heavy rain. This helps security teams to focus on real security incidents, and to minimise costly false alarms. Additionally, the devices can be equipped with Hikvision Live Guard sound and light alarms, which deter would-be trespassers from entering sites or buildings, preventing losses or damage to property and improving safety. Ideal for multiple scenarios and locations The new panoramic cameras provide reliable 24x7 security in a wide range of expansive indoor and outdoor locations. These include parking lots, parks, scenic areas, farms, stadiums, and traffic intersections. For more information contact Hikvision South Africa, +27 87 701 8113, [email protected] www.hikvision.com COVER STORY

Explore New Possibilities With ColorVu Technology Even more than ColorVu ColorVu + Deep Learning ColorVu + Live Guard ColorVu + 4K ColorVu + Varifocal ColorVu + Panoramic Smarter detection around the clock Day and night protection Capture richer, more colorful details Zoom in with vivid color The whole scene in vivid color Even more than ColorVu Hikvision South Africa (Pty) Ltd 9 Eden Road, Waverley O ce Park Building 2, Bramley Johannesburg 2090, South Africa Call Center : +27 (87) 701 8119 Website: www.hikvision.com @Hikvision South Africa

12 Issue 5 2022 www.securitysa.com Storing explosives underground, in close proximity to active mining operations, poses a serious risk to the safety of miners. A global gold mining company understood this problem and searched for a solution to minimise the risk, as well as satisfy stringent industry regulations. Having had a good relationship with the FS Group, the client reached out to the company, which consulted with other experts and in-house resources to develop a concept proposal. The concept system was a quick-response water deluge system which would result in complete saturation of the entire area. Detailed schematic drawings were produced, supported by hydraulic calculations to provide functionality of the design. Once approved, specifications for the water supply were issued and construction at a dam 100 metres above the risk area began. The procurement and fabrication team obtained all the raw materials and began the preparation of the components for transportation and assembly onsite. Sprinkler heads, valves and other items were packaged for safe delivery, valves and solenoids were wet-tested, and interfaces were set up and pre-commissioned. All equipment was then shipped to the mining site. Water deluge fire suppression system The FS Group custom-designed and installed an electronically actuated water deluge fire suppression system for an underground explosives magazine. FS Systems selected an electrically actuated water-type sprinkler system as the method of fire extinguishment and control. The sprinkler heads were positioned with consideration of the practicality of the desired location in the excavation tunnels. The sprinkler heads selected allow the discharge of a minimum of 25,9 litres per minute, per nozzle, and cover an area of around 4,5 m2. This is a dry system, and all nozzles in a zone will discharge water should the system be caused to operate. Steel piping was used in the risk areas and all exposed pipes were wrapped with an impact-resistant, fire-retardant material. Valve components were tied into the water supply and prefabricated sections of pipework were fitted and hung from the tunnel roof. An Edwards EST3 fire alarm control panel was used as the primary fire detection system, to which other detection solutions were fitted. The combination of the detection technologies provides a double-knock detection network that was designed for highly sensitive fire detection capabilities with the highest immunity against false alarms. Any combination of two or more devices will cause the system to operate the solenoid units on the deluge valves. The EST3 system was integrated via fibre-optic connectivity into the mine’s site-wide Edwards fire detection network, which was the standard in use at the mine at that time. Secondary activation of the sprinkler system was done via the operation of one of two manual call points which are located on the emergency exit routes from the storage magazines. A tertiary activation of the sprinkler system was done through a third-party system and is monitored from a remote location. This underground system was interfaced into the site-wide fire control network using fibre-optic networking components. Live testing and a comprehensive handover were done to prove the functionality of the system, and the result was an automatic, electronically actuated water deluge system for the underground explosives magazine, complying with the best engineering practices and current regulations. See a video of the installation by following the QR code. For more information contact FS Systems, [email protected], www.fs-systems.co.za DV-5 deluge valve, diaphragm style, 1-1/2 through 8-inch (DN40 through DN200) deluge system – wet pilot actuation. SECTOR FOCUS: MINING

RISK MANAGEMENT Underground mining is an important industry in South Africa and has, since its inception, been a cornerstone of South Africa’s economy, but it can be a hazardous workplace. The changes which have come about in our country make it necessary to prepare the industry for the challenges which are facing all South Africans in the twenty-first century. The mining industry continues to improve conditions for mine workers, striving for zero harm, however, innovations which improve worker safety and increase operational efficiency are still needed. A safe and productive working environment is critical for any operation in the mining sector. Various technology and security companies provide solutions to meet these company’s specific needs to ensure that people, equipment and assets are safe. Biometric identification and authentication are currently being utilised at various mines in South Africa and in the SADC region. Fingerprint biometrics are still the most widely accepted form of biometrics. However, more mines and large industries are looking at newer technologies, hence facial recognition technology is also becoming more popular in the mining industry. Currently, what one tends to see within the mining industry is finger vein detection. These devices detect the pattern of the blood vessel under the skin simultaneously with a fingerprint match. This technology offers an unrivalled, secure form of identification, and since these devices detect wet and rough fingers, more mines were seen to be installing them. Another technology is 3D facial recognition, which provides hands-free recognition ideal for the mining industry. This technology has indeed made waves within the industry; entering or exiting a mineshaft is simple, secure and quick. By Johlene Selemela, ZKTeco SA. Innovations which improve mine worker safety and increase operational efficiency are still needed. Through biometric technology, mining companies have better control over short-time and over-time hours worked at access points where shift control procedures are executed. Access control systems can be upgraded to meet one of the most important mining safety requirements, the ‘shaft clear for blasting’ procedure, by automatically and electronically providing assurance that all personnel have left the area to be blasted. Fingerprint readers can readily be linked to systems including everything from payroll systems to what meal choices staff may make, or what certified skills they have, when they are due for leave and even when they are next due for a medical checkup. In the latter case, a miner, for example, won’t be allowed underground if his checkup is overdue. In addition, the technology can improve risk management and ensure compliance with mining safety regulations through the implementation of a management and control system for monitoring and enforcing safety issues relating to personnel working underground, such as lamp issues as well as red ticket and competency certificates. Tracking the location and number of people underground can be tricky, and is crucial considering the underground working conditions. Unfortunately, traditional technologies such as GPS andWi-Fi tracking do not work well, or even at all in many situations. New technologies are therefore needed to overcome the limitation or failure of common location tracking devices in these environments. For more information contact ZKTeco (SA), +27 12 259 1047, [email protected], www.zkteco.co.za Have biometrics changed the way mines operate? SECTOR FOCUS: MINING

COMPREHENSIVE, HOLISTIC SOLUTIONS FOR THE MINING SECTOR The Elvey Group, part of the Hudaco Group of Companies, addresses several needs within the mining sector with numerous integrated and holistic solutions from various divisions within the group. ELVEY SECURITY The highly experienced Elvey team conducts comprehensive site evaluations prior to the selection and deployment of solutions to ensure that each solution is customised to provide maximised security benefit for the mine. This results in: • A complete understanding of the site-specific requirements • Providing customised security solutions • Mitigating risk • Saving lives • Protecting assets • Saving money Controlling vehicular access and preventing vehicle theft Physical access control at the perimeter and within mine properties is essential to ensure that only authorised people enter and exit the premises, thereby ensuring protection of assets. A number of vehicle and pedestrian barriers and physical access control solutions are available to ensure that both the perimeter and the areas within a mine property are secured from unwanted ingress and egress. Boomgate System’s Genius Rapid Access Barriers have proven themselves in the field. With built-in LED indication, there is no need for extra traffic robots to be installed. Rapid Spike barriers help prevent vehicle theft at the mine employee parking areas. Intruder protection Texecom kits and alarm panels ensure that management is instantly alerted when intrusion occurs. Aligned to the alarm systems and motion detectors (internal and external) are complementary products such as communicators and smoke detectors. The Texecom Connect app lets users access and control their security system directly from their smartphone or tablet. Texecom security solutions are suited to use throughout mines. The Ajax range of wireless intruder detection and fire detection products provide mining clients with the advantages of rapid and easy installation, coupled with complete mobility. Products which are of specific relevance in the mining space include: • MotionCam Outdoor recognises intrusion and confirms it with a series of animated photos. Visual verification helps to instantly ascertain the situation. • Motion Protect plus is a 2-in-1 glass protect and motion protect unit. It detects motion, LISA-analyses it and compares signal forms from two sensors in real-time. If forms are similar, the alarm is raised. • Door Protect plus is a 2-in-1 vibration detector and door protect unit. The DoorProtect opening detector notifies of first signs of room intrusion by means of a broken door or window. • LeaksProtect identifies pipe breakage and leaks. It raises the alarm with the first flood signs and notifies users when the water dries up.

RkJQdWJsaXNoZXIy MjEzMjU=