SMART Estate Security 2023

A guide to smart and secure living es a e securi y2023 Protecting your world Award-winning security solutions that protect what matters most.

www.securitysa.com 1 es a e securi y 2023 From the editor’s desk.........................................................2 Opinion Security without the skin.....................................................................4 Vehicle Access Control Touchless vehicle access control.....................................................10 Integrated Solutions Ensuring peace of mind.....................................................................14 A comprehensive approach to estate security..........................15 The changing systems integrator business model...................16 Selecting the appropriate vendor for security equipment..............................................................................18 Integrated, intelligent, informed and improved living...........19 Company Profile Halo Technology: Digital radios and PTT.....................................20 Visitor Management ATG talks PoPIA and driver’s licence scanning...........................21 A look at visitor management..........................................................22 Product Showcase Going beyond the gate......................................................................26 JVA electric fence systems.................................................................27 Integration and reliability from CathexisVision.........................27 A good security system starts outside..........................................28 BG1000 barrier gates...........................................................................28 Video-to-mobile visitor management app..................................29 Outdoor access control terminal.....................................................29 Simple panic system for estates......................................................29 OUR COVER Access Control & Identity Management Enhancing security and access control in estates.....................30 Mobile access to multiple locations...............................................32 Securing a luxurious estate...............................................................32 Body-worn Cameras Body-worn evidence............................................................................33 Command & Control Integrating control rooms and response.....................................36 Standard Operating Procedures The difference between a SOP and a SOP...................................38 Scoping out potential estates..........................................................40 Artificial Intelligence AI in 21st century identity technologies......................................42 Directory of estate security product and service providers................................................................45 CONTENTS The benefits of centralised management Gallagher Command Centre empowers the monitoring and control of sites using one platform with integrated access control, intruder alarm management, CCTV, and perimeter security. Gallagher software manages access for residents, tenants, contractors, and visitors, and provides controlled electric fencing and perimeter intrusion detection solutions. 8 A guide to smart and secure living es a e securi y2023 Protecting your world Award-winning security solutions that protect what matters most.

Andrew SMART Estate Security 2023 LETTERS TO THE EDITOR Letters to the Editor should be addressed to Andrew Seldon at [email protected]. Sending material to this publication will be considered automatic permission to use in full or in part in our Letters column. Be sure to include your name, e-mail address, city and postal code. We reserve the right to edit all letters. All rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Technews Publishing (Pty) Ltd, Reg No. 2005/034598/07 A division of Technews Publishing (Pty) Ltd Wild Fig Business Park, Block B, Unit 21, 1494 Cranberry Street, Honeydew Tel: +27 11 543 5800 ISSN 1562-952X Editor Andrew Seldon: [email protected] Contributor Andre Mundell Advertising sales Tracy Wolter: [email protected] Heidi Hargreaves: [email protected] Subscription Services For address changes, orders, renewal status or missing issues, e-mail: [email protected] Subscribe online: www.technews.co.za Design and layout: Technews Production Department Disclaimer While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details are printed as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material. FROM THE EDITOR’S DESK www.securitysa.com Published by Welcome to the first issue of the SMART Estate Security Handbook. It’s not really the first handbook we’ve done on estate security, but the first under the new SMART branding. This handbook is slightly different, although still on the same topic, in that the focus is mainly on integration and the need for products and service providers that make it easy to connect whatever you want to whatever else you want to achieve a holistic solution. The always controversial Andre Mundell, a regular contributor and previous speaker at our estate security conference, contributed two articles to this issue, one willingly and the other I specifically asked if we could include as it provides a short but interesting look into what an integrated and efficient security system should look like. It’s like an autopsy to see what’s under the skin of a security solution. We see the cameras, booms and guards wandering about. Still, if your holistic security system is going to deliver as required, the bits and pieces connecting all the other bits and pieces need to be in place and functioning. Security is much like a Russian Matryoshka doll where you open up one doll, find the next one, and so on. This leads nicely to the issue of standard operating procedures (SOPs), another bugbear in many security operations. Some say each estate should have its own unique SOPs built from the ground up, starting with a risk assessment (or, as Mundell would insist, an independent risk assessment) and designed from there. Others believe that taking an old SOP or borrowing another estate’s document and customising it for your estate is fine. In reality, both arguments are valid, but the proof of their validity is only to be found in the final security operation – does it do the job or only part of it? We also included part of an IDEMIA white paper on AI (the full version is available via the link provided for those interested). With all the fuss about AI these days, it’s worth looking at what is realistically happening to see what can be done right Security integration complexities now. The information provided is not estate-specific but adds value in terms of what estates can expect from all the AI tools and systems offered. As Bernard Senekal from Sentronics mentioned in his presentation at the recent SMART Surveillance Conference, we are still in the ‘narrow AI’ stage, where AI does one task well and can provide valuable insights into the security world. The future will see us moving to ‘general AI’, which goes beyond insight to foresight, and then ‘super AI’, where machines are more intelligent than humans and will kill us all (the last five words are my own, not Senekal’s). That is my very simplistic overview of Senekal’s presentation and the state of AI, but readers will find more insight and depth in the white paper. The brief conference review is at www.securitysa.com/20270r. I hope you enjoy the handbook and the upcoming SMART Estate Security Conference (see more at www.resc.co.za). As always, comments and criticisms are welcome at [email protected].

When you need to tag and track your guard at any time. To find out more about our PTT Portable Radio with Built-in NFC contact us at: [email protected] OR phone 012 655 2234 The Halo SS-96 radio is just what you are looking for. The SS96 is a PTT portable radio with built-in NFC that offers tagging and tracking enabling you to use the SS96 in the various scenes such as staff going to work, work attendance, patrolling and other scenes. The SS96 also allows for SOS emergency broadcast to the dispatch platform and all authorised users. • Voice Recording • Global Positioning System • Dispatcher Software • NFC Tagging & Tracking • Send Messages • Stun Function • Unlimited Coverage

4 www.securitysa.com es a e securi y 2023 Security without the skin By Andre Mundell, Alwinco. We all know about the layers of security. Andre Mundell dissects security in this article to see what’s under the covers. At some point, everyone talks about security. The question is, do you have a picture in mind when you think about security? For most people, security is only hardware, which includes a camera system, an alarm system, beams, a guard, or even a dog on the property. Close to 90% of all RFQs, tenders, or quotes for security are only for security hardware, but hardware is only one security component. Many other factors must be in place to call it security and for the solutions to function efficiently. You are not wrong if you think about these items, but that is precisely what they are; items, mere building blocks of the security bigger picture. When you think about a human being, you automatically think about arms, legs, a head, a torso, etc. But if you think about it a little more, you will know that there is much more to a human being than a body. Security is the same. Let us say we take a human body and pull the skin off. If you have never seen this before, I can assure you that it is not a pretty picture, but this allows you to see everything that is kept inside by the skin. In Figure 1, we have ‘pulled security’s skin back’. It might look disorganised, but we used different colours to differentiate between the various definitions. Starting at the beginning When it comes to security, we start with a security risk assessment. You should follow this process before making any securityrelated decisions or purchasing any security hardware or software. Essentially, this process tells you how to eliminate your security risks. You will see in the illustration that you will get recommendations from the security risk assessment. From there, you will get the RFQ process and the costing calculations. The hardware is sourced once the assessment is done and the recommendations are approved. Keep in mind that each section within this illustration has its own connections to make everything function at an optimal level. All the lines going from one segment to the next can be compared to the arteries in the human body. These lines signify data, connections, information flow, and the like. If there is one mistake that most people make when it comes to security, it is to skip the first and most crucial step, a security risk assessment. When you look at the crime stats, you can see that most security structures are based on guesswork. No facts or research support security decisions. The second biggest mistake everyone seems to make is forgetting about the network. A security network is a collection of network cables linked together or connected to an electronic device that allows security data to flow from one point to another. Today, wireless connections are often used instead of cables, but the network is still a critical component. There are two security networks. One is depicted in the illustration, and the other is visible inside the sections control, management, security profile, etc., where everything is connected and intertwined to make it work. In the illustration, you will note that management is connected to all the other aspects of the security structure. Continued on page 6 Figure 1. OPINION

6 www.securitysa.com es a e securi y 2023 TRENDS & OPINION “Without a SOP, you do not have a security plan or any form of control or communication.” Management has different components, including control, hardware, the security plan, communication, processes, policies, etc. Control and communication are directly linked, as there cannot be any control without communication. In line with this, you will note that management and communication, along with policies and procedures, are related. The security plan is directly linked to the risk assessment as the solutions are derived from identifying the security risks. A best guess approach Now, when you look at the illustration and remove the risk assessment part, which is the case with most security structures, you will note that there is no research and no information on what the solutions could be based on. The risk assessment and recommendations are the research required to establish which security solutions will work to eliminate the risks. The risk assessment is where everything starts; it provides the guidelines on understanding and approaching security and what hardware will eliminate the opportunity for crime. Also, when you take control out of the security equation, you will see that everything else will fall apart and that there are just too many loose ends. Most security companies and structures have no standard operating procedures (SOPs). For more than 30 years, people have used the good old copy-and-paste method for SOPs. People do not even know the difference between the three types of SOPs that are used today. Without a SOP, you do not have a security plan or any form of control or communication. Removing the policies and procedures further causes the entire system to crash and burn as policies speak to the hardware, which speaks to the control which is connected to communication and management. We have done multiple assessments where several of these components were absent, which was evident in the security structure’s output value. When even a single item of the security structure is missing, your security will fail. There is a reason we say that a golden thread runs through the entire security structure. Everything is linked; one security section cannot work without another preceding it. You cannot remove one section without affecting all the others. It is like an intricately woven tapestry. If you cut a single thread, the entire tapestry will unravel in time. As mentioned, each of these illustrated sections has multiple facets that must work together to function. For example, all the different types of hardware, from the cameras, the property line, the access control measures to the alarm system, and everything in between, also need to be able to communicate. Furthermore, when all the hardware communicates, the information must go somewhere. This is the control. Command and control In some organisations, it is called a control room. The control must ensure that the information is filtered to the correct people to take action where needed. This forms part of the policies, procedures, and, ultimately, the security plan. It is important to remember that you must have SOPs in place to have control. This comes from control and management, which form part of communication, management, instructions, policies, etc. Can you see all the connections? Can you see that you cannot simply remove something and expect the system to continue functioning? Be that as it may, we seem to achieve the impossible in South Africa. We remove several of these sections and expect security to work. As you can see, when you look at the crime statistics of our beautiful country, it does not work. When we conduct a security risk assessment, we always hope to find all the sections present. However, this is hardly ever the case. What does it mean to be in control Continued from page 4 OPINION

of your security? I can explain it in detail, but it will be a 300-page document. In short, being in control means that you know what is happening where at any given time, and that you can act when action is required. What does communication mean? Communication is not just one email or a phone call. It goes much further than that. Every aspect of security needs to be able to communicate, whether it is communication between hardware and software, hardware and a human being, human and human, it does not matter. Without communication, you will not have any policies or procedures, which essentially means that you will not have a security plan. If you want to know whether your security is on par, take the illustration, follow it step by step, and identify the items present within your security structure. This will give you a good indication of where you are in terms of adequate security measures. Furthermore, aspects such as the master copy, control registers, maintenance, and so on are also part of control and management. Although it has not been included in the illustration, ensuring that it is part of your structure is vital. About 12 vital control registers must be in place, but hardly ever are. Also, training is essential and forms part of management, control, and procedures. Seeing the heart of security You will see that we included a heart in our diagram. It is not there for decorative purposes, and the location of the heart is also essential. The heart represents the control room, in other words, the information centre. This is where everything is brought together. Whether you have a big corporate company, a small business, or a home, it still needs a heart. It requires an information centre where all the data and information are filtered into and out again to the right channels. CCTV cameras represent the eyes, and the PTZ cameras are the neck of the ‘security body’. So many companies try to run their security structures without a heart, and this never works. Just like the human body cannot function without a heart, a security structure cannot function without a control or control room. Every aspect of security runs through the heart, which is why it is the most critical aspect of security. The human body, like security, requires a brain to function. This is where artificial intelligence (AI) comes in. AI, like everything else, must be controlled and understood. Uncontrollable AI can complicate security; this topic will be discussed further in a future article. To put the vast network of a security structure into perspective, the illustration contains about the amount of information similar to the size of a needlepoint on an A0 piece of paper. The rest of the paper must still be completed. In the middle of security, two forces are vital in any security structure, whether talking about a small property, business entity, or large corporation. These forces are the security managers responsible for balancing the security structure. For more information, contact Alwinco, +27 62 341 3419, [email protected], www.alwinco.co.za OPINION

8 www.securitysa.com es a e securi y 2023 TRENDS & OPINION For estates, integrating multiple services within one central operating platform provides many benefits. Not only does it allow for fast, effective responses to any security event, but it also enables operators to efficiently manage other estate operations from one platform, creating a streamlined, functional, and safe environment for residents, employees, contractors and visitors. Choosing a platform that meets the needs of your site is vital. Estates often look to integrate security solutions such as perimeter, access control, intruder alarms and video management, into one operating system, enabling them to quickly detect, assess and respond to any security threats. Considering a solution that supports multiple integrations is key, and we encourage sites to think about what services they could integrate beyond their security solutions. Integrating monitoring for critical services, such as electricity metering, generators, water tanks and more, alongside security, offers complete situational awareness, ensuring efficient operation of services and a prompt response to any alerts. This allows sites to identify potential faults early, such as a generator failing, allowing time to respond before an issue becomes critical. Improved experiences for operators and residents An integrated system offers security from curb to core and can create an efficient, user-friendly experience for both operators and residents. For example, a large estate operating Gallagher Command Centre with integrated biometric access control readers can create operational efficiencies for operators and improve resident experience at the same time. Integrating biometric readers means residents are never inconvenienced by forgetting an access card, key, or PIN – their credential always remains with them. Credentials cannot be lost or misplaced, saving operators the time and hassle of issuing replacement credentials, and offering residents peace of mind knowing a misplaced credential cannot be used to gain unauthorised access. The benefits of centralised management IDEMIA’s popular touchless biometric solutions are already integrated into Command Centre. This means estates can make use of the MorphoWave fingerprint readers or VisionPass facial recognition scanners without worrying about integration issues. For those wishing to move to digital access credentials on mobile devices, Gallagher’s Mobile ID makes it simple and efficient. This same estate could also utilise an integration with long range RFID readers to streamline resident access onto the estate. Residents’ vehicles are fitted with windshield tags which allow quick and easy access through boom gates, without the vehicle having to stop. Further operator efficiencies offered by platforms such as Command Centre include the ability to automatically generate reports, which can be sent by email to the appropriate people, such as estate managers. These reports could be an overview of activities from a specified period of time (i.e., a week or month), or in response to a specific security event. For integrated systems, this can save operators considerable time, as all the data is easily and automatically accessed through one system. Mobile technology has also improved efficiencies by enabling operators to monitor and manage systems from outside the control room. Gallagher’s Command Centre Mobile app securely connects an operator’s mobile device to Command Centre, providing greater control by allowing them to manage alarms, respond to door open requests, trigger pre-configured activities, and more, from any location. An integrated central management platform is vital for effective operations. Gallagher Command Centre supports numerous integrations to provide effective, efficient protection from the fence line, in. For more information, contact Gallagher Security, +27 11 974 4740, [email protected], www.security.gallagher.com COVER STORY

10 www.securitysa.com es a e securi y 2023 VEHICLE ACCESS CONTROL Touchless vehicle access control RFID access for vehicles is a growing market, its reliability depends on what the estate needs and what solutions they select. The popularity of touchless access control skyrocketed during the pandemic. Facial recognition technology witnessed a surge in interest and, to a lesser extent, touchless fingerprint recognition (which was already available before COVID). RFID technology has been around for years and allows for seamless access and exit of vehicles, making it another form of touchless access control. Vehicular access has its supporters and detractors. One of the negative comments always made is that all you are doing is verifying the vehicle or perhaps even the vehicle’s number plate when opening the boom or gate – who knows who and how many are in the vehicle. This can be dealt with to a degree with cameras at the entrances, but it is still an issue many estates worry about. Nevertheless, RFID access for vehicles is a growing market, and many estates (residential and business) have opted for this approach to speed up the process of moving vehicles through access control points. SMART Security Solutions asked three companies for their insights into RFID and its utility and adoption in today’s estate market. The companies we approached were: • Impro Technologies. • Techsolutions. • ZKTeco. SMART Security Solutions: What are some benefits of using RFID for vehicular access control compared to traditional methods? Has RFID technology improved the efficiency of vehicular access control in gated communities? Impro Technologies: Impro Technologies, in partnership with Nedap, offers a range of solutions for gated estates using select long-range and number plate recognition technologies integrated with Impro’s Access Portal solutions. This solution increases security using regulated access control, which is valuable for residents living in a gated environment. This allows easy, convenient, and secure access to the estate and facilities and makes the management of contractors and staff onsite easier. RFID technology enables secure data and transactions for access within the estate by means of encrypted and site-specific tags that are difficult to duplicate. Theft or removal of tags is prevented through tamper-proof technologies that destroy the tag if an attempt is made to remove it. Techsolutions: Firstly, we see two main groups in terms of gated communities: • Residential estates. • Road closures. For both these groups, RFID-Access provides the following benefits: • Improved security for vehicles and drivers: drivers do not have to wind down their windows or lean out the window to enter codes. We have had estates moving to RFID access due to attempted hijackings. • Improved traffic flow, especially for the larger estates during peak times. There is no other vehicle access system that matches the throughput that RFID access provides. One of our biggest sites is a road closure with close to 2000 registered vehicles and an average daily movement of 1900 vehicles in and 1900 vehicle movements out. (Some move in and out more than once per day). • Improved management: With most estates, there is a turnover of residents moving in or out. It becomes a challenge to manage resident access. Unlike remotes that can be transferred between people and/or get lost or stolen, each RFID tag is vehicle-specific and breaks when removed from the windscreen. Through the cloud-based interface, it is easy to assign tags to residents’ and/or their families’ vehicles and to disable tag access. • A few estates use RFID access to entice residents to pay their levies. They disable the tags of residents who have not paid.

VEHICLE ACCESS CONTROL • Unlike QR codes that can be easily copied, cloned or forwarded, the RFID access tags are encrypted, making it much more secure. • For golf estates, RFID access enables the segmenting of access, allowing only club members access to certain areas. • RFID access is monitored through the cloud, enabling us to maintain software and troubleshoot remotely. We have been able to assist clients in finding network and power problems without going to the site. Some of the first installations we did 15 years ago are still running and operating daily. Many years ago, we did our first installation at the office park where we had our offices. There were four incoming lanes and four exit lanes fitted with biometric readers. We converted one incoming and one outgoing lane to RFID access. Tenants could then buy RFID tags for R100 each or use the biometric lanes at no cost. More than 90% of tenants opted to purchase tags for the sake of convenience. ZKTeco: RFID technology has indeed improved the efficiency of vehicular access control in estates by streamlining the entry process, reducing the need for manual intervention, and enhancing security measures. Some benefits include: • Convenience: RFID technology allows for seamless and contactless access control. Residents or authorised individuals can enter gated communities without the need to physically interact with a security guard or use physical keys or cards. • Enhanced security: RFID tags are typically difficult to duplicate, making them more secure than traditional methods like physical keys or access codes, which can be lost or shared. • Audit trail: RFID systems can log entry and exit times, providing an audit trail for security purposes. This feature enhances monitoring and accountability. • Scalability: RFID systems can be easily expanded to accommodate more users, making them suitable for growing gated communities. • Integration: RFID can be integrated with other security systems, such as surveillance cameras and alarms, enhancing overall security. SMART Security Solutions: What challenges have gated communities faced in adopting RFID technology for vehicular access control, and how have they been addressed? Impro Technologies: The ultra-high frequency (UHF) RFID technology incorporated in most typical long-range readers is quite robust, and when used with customised secured credentials with unique identifier codes, security is enhanced. These unique codes prevent tags from being duplicated or read by other readers, as the site reader is programmed to look for this unique identifier first before accepting the tag code. Impro branded windshield tags make use of this secure technology to enhance access control security. Techsolutions: We have been providing RFID access for 15 years and the main challenge that we have had is the slow uptake of RFID applications in general, which includes RFID access. Not one of our clients that have implemented RFID-Access (Techsolutions’ vehicular access control system) has replaced it with anything else. There is no other technology that comes close to its price point, the convenience of cloud management and reliability. We sell the windscreen tags to estates for about R25 each. The estate then sells these tags to residents for prices ranging from R100 to R250 each. With an estate having 500 houses, the system is paid off in the first month, Continued on page 12

12 www.securitysa.com es a e securi y 2023 VEHICLE ACCESS CONTROL and they have a continuous income from tag sales as residents move in and out. To make it even more affordable, one RFID-Access reader supports bi-directional traffic, such as the case of a motorised gate. There are some vehicles that have special windscreens which prevent the windscreen tags from working well. These include the Aston Martin DB9 and some Mercedes Benz S-Class. There are fewer than 10 of these registered on our RFID-Access system. For these vehicles, we provide special tags. ZKTeco: There are numerous methods to overcome the challenges of RFID access for vehicles. These include: • Initial cost: Implementing RFID technology can be expensive. Gated communities have addressed this by considering it as a long-term investment in security. • Maintenance: RFID systems require periodic maintenance to ensure optimal performance. Communities can mitigate this by signing service contracts with reliable vendors. • Tag management: Managing RFID tags for residents and visitors can be a logistical challenge. Communities have resolved this by implementing efficient tag issuance and revocation procedures. • Integration: Ensuring smooth integration with existing security systems can be a challenge. Communities should work with experienced vendors that specialise in security system integration to ensure efficient and reliable solutions. To improve efficiency and security further, estates can consider implementing features like two-factor authentication (RFID plus a PIN or facial recognition terminal), remote access management, and security training for staff. SMART Security Solutions: At what range can these systems effectively recognise a vehicle (or its RFID tag)? Is RFID the best solution for vehicular access control, or could Bluetooth (or some other technology) provide a more flexible solution? Impro Technologies: The range is dependent on the selection and placement of the reader. One could make use of a 2 m reader that requires you to drive up to the reader and scan a tag or alternatively use a 5 m or 10 m reader that would detect the vehicle by means of an external tamper-proof sticker tag or an internally mounted windshield tag. Most UHF readers operate in a band that is unaffected by local UHF transmitters, and the readers can be finetuned to avoid reflections or interferences. It is, however, important to ensure proper placement of readers to ensure there is no overlap of detection between entrance and exit lanes. Bluetooth solutions are available. However, many of these solutions very often require some interaction with a phone or mobile device that may hinder or delay the thoroughfare of vehicles. Another concern about using Bluetooth is that when used in close proximity to entrance and exit readers, devices may trigger entrance and exit readers simultaneously as Bluetooth is omnidirectional. Techsolutions: Some of the concerns that estates express when they approach us regarding RFID-Access include: • RFID-Access will allow tailgating. We have not experienced any increase in tailgating after implementing RFID-Access. In fact, it is much more difficult to tailgate a moving vehicle than one that has stopped and then pulls away slowly. • RFID-Access will allow stolen vehicles to be driven out. We have added an option for residents to ‘check out’, which opens a window of 10 minutes, allowing them to exit. However, not one of our existing clients has indicated an interest in implementing that. In terms of other options, such as Bluetooth, this has been around for a few years. Firstly, the cost of a Bluetooth tag is a few hundred rand compared to R25 for an RFID tag. And then the battery of the Bluetooth tag will only last for 1-2 years. Another option is to use an app on a phone that will transmit a Bluetooth signal to a receiver. Many Bluetooth devices require pairing for security. This can be quite a challenge if there are many devices to be paired. Moreover, the Bluetooth range can be anything up to 100 m. I understand that some of the gate motor companies are now Continued from page 11

VEHICLE ACCESS CONTROL supporting Bluetooth, so this will likely trigger the move towards Bluetooth apps for the residential market and possibly some small estates with 50 or fewer residents, but just consider the scenario at an estate where five vehicles are approaching the gate, and the driver in the last vehicle in the queue presses his button first and triggers the boom to open; the first vehicle enters without having to press a button and without being logged. This will never happen with RFID-Access. ZKTeco: Looking at the range of RFID solutions ZKTeco offers: • The effective range of RFID systems can vary but is typically within a few metres to a dozen metres. The range depends on the specific technology used, such as low-frequency (LF), high-frequency (HF), or ultra-high-frequency (UHF) RFID. At ZKTeco we offer various UHF terminals (6 m and 12 m range), depending on the kind of project a client is working on. • While RFID is a viable solution, Bluetooth and other technologies like licence plate recognition systems can provide more flexible options, especially for longer-range access control. The choice depends on the specific needs and constraints of the estate. Bluetooth, for example, allows for mobile-based access control, which can be convenient for residents. SMART Security Solutions: What solutions does your company supply in terms of RFID access control for vehicles? Impro Technologies: Impro Technologies, together with Nedap, offer a range of UHF, microwave RFID and number plate readers paired with matching secure tags and credentials. Techsolutions: Techsolutions provides the RFID-Access (www.securitysa.com/*rfid1) system, which is cloud based. We manufacture the RFID reader locally and it comes with all the functions, such as Wi-Fi, integrated controller and relays to open booms and gates. It was designed for the African environment, so it keeps on working even if the network is interrupted. Our latest model comes with an Android app to make installation easy. It also integrates well with our SecureVisitor system (www.securitysa.com/*rfid2). Both ZKTeko and Nedap use RFID readers as an add-on to existing access controllers using a Wiegand interface. This Wiegand interface is not secure and one-directional. It is also not possible to adjust and optimise reader settings remotely via the Wiegand interface. In contrast, RFID-Access was designed from the ground up for vehicle tolling and vehicle access control applications. Each reader has its own integrated controller, which is cloud-connected and managed with remote monitoring, remote software updates and remote support. It uses sophisticated algorithms for measuring the tag distance per vehicle and enables full control over timing, pulse width and pulse intervals to support the many different models of boom and gate controllers on the market. The reason that Techsolutions initially got involved with RFID Access is that we were approached by SANRAL to assist with a solution to identify trucks at its overload control centres. At the time, SANRAL was using automated number plate recognition (ANPR) systems. However, the cameras struggled as many of the trucks come from mines with number plates that are covered with coal dust and stone chips and have faded. The best accuracy they could get was 70% which meant that 30% of the transactions had to be manually corrected. Each station handles about 10 000 vehicles per direction per month, so this required 6 000 manual corrections per month, which was not viable. The RFID solution which we implemented improved the accuracy to better than 99,9%. ZKTeco: ZKTeco offers a range of RFID access control solutions for vehicles tailored to the needs of the estate. Our offerings include: • RFID reader and tag systems suitable for various access control points. • Cloud-based access management software for easy administration (ZKBio CV Security). • Integration with existing security infrastructure. • Scalable solutions that can accommodate communities of all sizes. • Regular maintenance (this will depend on what the specific installer has communicated with the client) and support services (the installer and ZKTeco offer this) to ensure optimal system performance. For more information contact • Impro Technologies, +27 31 717 0700, [email protected], www.impro.net • Techsolutions, +27 12 403 0091, [email protected], www.techsolutions.co.za • ZKTeco (SA), +27 12 259 1047, [email protected], www.zkteco.co.za

14 www.securitysa.com es a e securi y 2023 INTEGRATED SOLUTIONS In an ever changing world, security has become a paramount concern for homeowners; residential estates are no exception and are therefore not exempt from the need for comprehensive security measures. The good news is that with the rapid advancement of technology and artificial intelligence, electronic security systems are not only extremely reliable in safeguarding properties, but a well-designed, implemented and maintained system will prevent crimes even before they can happen. Residential estates have traditionally relied on physical barriers such as walls, fences, and security guards to deter intruders. While these measures will always play a crucial role in residential estate security, they are not sufficient on their own. Criminals adapt and change their onslaught over time, and they have also become more sophisticated in their methods, so much so that traditional security measures cannot keep up with these evolving threats. Thus, electronic security systems have emerged over the last few years as an added layer of security that has literally changed the landscape on estates, offering homeowners and residents a higher and more trusted level of protection. These systems can incorporate a range of technologies designed to enhance security, provide real-time monitoring, and streamline access control. Ensuring peace of mind By Johan I. van Wyk, FANG Fences & Guards. Integration, implementation and maintenance are the foundation of a reliable security system. Additionally, perimeter walls and electrified fencing might be seen as the first layer of protection due to their physical deterrence value, but perimeter surveillance cameras, and specifically thermal cameras that work optimally in some of the worst weather conditions, paired with high-end video analytics software and two-way audio horns, are really the eyes and ears of any electronic security system. These can be used to identify threats before they even reach the physical barrier. This is accomplished by configuring and setting up virtual barriers using analytics-capable software. The received alarms are processed by the AI to further assist operators in drawing conclusions about the information that has been processed. To be effective, it is advisable to use a 24/7/365 professional offsite video monitoring company. Trained professionals operate in a control room that is not only clinical and free from day-to-day distractions like a busy guardhouse environment, but they are also equipped with artificial intelligence to effectively monitor and then communicate security alerts. Having these experts on hand ensures that any security incidents are addressed promptly and effectively. In the guardhouse In the guardhouse area of the estate, the focus shifts to access control, visitor management software and optical CCTV cameras. Access control systems are essential for managing who can enter the residential estate. In today’s postCOVID world touchless access control is the order of the day, mostly via palm authentication, RFID tamper-proof windscreen stickers, smartphonebased access and facial recognition terminals. This ensures that only authorised individuals can enter the premises, enhancing security and reducing the risk of unauthorised intrusions. Software-managed access control systems also enable the digital logging of entry and exit times per user, allowing for easy monitoring and accountability in case of an incident. With an integrated system that incorporates the visitor management system, optical CCTV cameras and access control, internal processes like rules and bylaws can be managed timeously with less human input required, and as a result, also more effectively than standalone systems. This is because all the layers in the implemented solution can be compared to the same time and date stamps, simplifying any investigation and allowing for concrete evidence in case legal action is required. Visitor management also becomes a breeze, with less interaction with guardhouse personnel, because the systems available today allow for preauthorisation of visitors by the residents, thereby limiting traffic build-up in visitor lanes, especially in peak traffic hours. Some benefits of electronic security systems Some of the benefits of electronic security for residential estates are: • Deterrence value: Electronic security systems serve as a powerful deterrent to potential criminals. • Rapid response: In the event of a security breach, monitored electronic systems provide the means to ensure rapid response. Alerts can be sent directly to security personnel, law enforcement, or residents. • Peace of mind: Residents of residential estates can enjoy peace of mind knowing that their homes are protected with state-of-the-art security systems. • Reduction in crime: Electronic security systems have proven that not only do they deter criminals, but they also help law enforcement agencies to solve crimes. High-quality surveillance footage can serve as valuable evidence in criminal investigations. • Enhanced property value: Residential estates with robust electronic security systems often have higher property values. In conclusion, in this generation where security threats are ever-present, residential estates must adapt and embrace electronic security solutions to protect their residents and properties. The integration of surveillance cameras, access control systems, intrusion detection, and other electronic security measures provides a multi-layered defence against intruders. Ultimately, the goal of electronic security for residential estates is to provide peace of mind to homeowners and residents. With these advanced systems in place, residents can rest assured that their homes are protected around the clock, allowing them to enjoy their lives without constant worry about security. Johan I. van Wyk.

INTEGRATED SOLUTIONS Living in a gated estate promises security and tranquillity that many homeowners find appealing. These exclusive communities have various security features, amenities, and a strong sense of community, however, incidents like burglaries and robberies can still occur. Gated estates often boast electric fences, camera surveillance, access-controlled entrances, and security personnel; collectively creating an aura of safety. Yet, the question remains: Is estate living truly safer than other residential options? The crucial aspect often missing in estate security is situational awareness. The big picture view Situational awareness stems from the need to integrate and centralise all security tools and systems into a single, cohesive dashboard. ZKTeco offers a solution that combines multiple security tools into a single dashboard. The management software (ZKBio CVSecurity) provides an intuitive interface that centralises all security alarms and events. This integrated approach is particularly beneficial for estates, offering several advantages. 1. Fast and effective response: By bringing various security components together, estate security teams can respond rapidly and efficiently to any security event. 2. Efficient estate management: Beyond security, ZKTeco’s platform allows for efficient estate operations management. The ability to handle these tasks from a single platform streamlines estate operations and enhances overall functionality. Managing non-residents and visitors ZKTeco’s integrated platform facilitates the admission and tracking of non-residents. The system can generate temporary access credentials for domestics, contractors, and visitors, allowing them to enter the estate while ensuring accountability and traceability. This eliminates the need for physical keys or access codes, reducing the risk of unauthorised access. Additionally, the platform can handle deliveries by notifying residents of incoming packages and tracking their status. This enhances security by reducing the potential for package theft. The platform extends beyond security and includes tenant management features. Estate managers can use the system to track tenant information, access history, and occupancy status. This integration streamlines lease management and ensures accurate records of tenant activities. In conclusion, adopting integrated solutions is critical to enhancing estate security. In estate living, true security comes from physical barriers and smart and proactive solutions that adapt to evolving threats. By centralising security and estate management, residents can enjoy a safer and more efficient living environment, while remaining compliant with privacy regulations. For more information, contact ZKTeco (SA), +27 12 259 1047, [email protected], www.zkteco.co.za A comprehensive approach to estate security Integrated solutions allow estates to improve their situational awareness.

16 www.securitysa.com safety of all residents and kids, and licence plate recognition (LPR) integrated into access control, allowing estate security to identify and control all users entering and leaving the estate. Most of the higher-end CCTV systems currently offer the function of speed monitoring; raising an alarm when people are speeding, and sending emails with photos, videos and other information. The gap is on the LPR side and the integration of LPR into access control systems. There are limited solutions in this regard, and the costs are currently very high for this integration. Some of the larger estates are willing to explore development in this area, but many grey areas must be addressed to achieve this requirement. We see a considerable shift to estate living and the lock-up-and-go lifestyle, leading to an increased demand for functional, integrated security solutions. In closing, the system integrator business model is definitely changing. As RR Electronic Security Solutions, we are focusing on our core offerings and skills to stay ahead of the curve. This requires us to plug the gap between where we are and where we want to be, exposing our teams to new situations/latest trends and developments in the industry. For more information, contact RR Electronic Security Solutions, +27 11 794 2825, [email protected], www.rress.co.za INTEGRATED SOLUTIONS An electronic security systems integrator is essentially an organisation that sources different components and combines these components with unique technology implementation methods to provide the client with a functional business operational process. It uses as much of the client’s existing infrastructure as possible to keep the costs as low as possible while not compromising on the system functionality. In current times, and with the economic struggle worldwide, the above business model is becoming quite challenging to provide complete and holistic solutions to a client within an acceptable budget. The most significant influencing factor is budget, with the understanding that system integration is only a small part of providing a complete solution. Considerations: 1. We must consider cybersecurity and the effects thereof in this new, fast moving world of technology. To ensure proper protocols and security, this would require maintenance/updates, which ultimately adds to the cost of the holistic solution. 2. We must consider the current infrastructure’s compatibility with the newer security technology manufactured. For example, a 32-bit operating system versus all the latest equipment solely working on a 64-bit system ultimately The changing systems integrator business model By Rivash Raghubir, RR Electronic Security Solutions. Cost versus performance, new technology versus old. inflates costs to upgrade old infrastructure. Alternatively, the client compromises, uses lower-end technology, and changes its operational procedures to meet partial requirements. 3. Cloud solutions are not being considered on high-risk sites due to information security risks and the cloud solutions attracting monthly costs. 4. Delayed component lead times are changing the technology and integration proposal. The clients cannot wait to implement a solution with a four months lead time (some lead time is up to 10 months), which pushes us to change our solution or lose the business with the client. Perspective on residential estates Estates and estate security have evolved tremendously over the last five years. People want surety in their security using functional technology, not just a boom and guard posted at the entrances or exits with high walls around the perimeter. Currently, most estates are looking for an integrated solution consisting of CCTV, access control, electric fencing, security lights, and perimeter beams. The cost factor plays a huge role in delivering a functional holistic security solution, which naturally limits the extent of the solution integrators can provide. Currently, the two biggest trends within estates are speed monitoring to maintain the

RkJQdWJsaXNoZXIy MjEzMjU=