SMART Security Solutions 2023 | Volume 29 | Issue 8 2023

Intelligent insights into a high-risk digitally transforming world Issue 8 2023 Wireless, battery powered Outdoor Security with artificial intelligence Distributed by Blacklight Group

The GTXi is a powerful, versatile, and highly compatible nextgeneration alarm communicator, designed with all the features needed for serious industry professionals. It is easy to operate and install, with multiple panel connection options, communication technologies, and network channels available in a single unit, for any installation. And with just one serial interface, there's no need for installers to lug around multiple interfaces and cables. This innovative gateway even offers the convenient addition of app control to existing and new installations. Integrating seamlessly with the POD app, users can monitor and control their alarm system from their smartphone or internet browser. Plus, home automation capabilities can be added, and all functions can be monitored and controlled from a single app. And for added peace of mind, critical communication services are hosted on RDC's secure and trusted ecosystem and managed with their first-to-market GTXConnect administration and unit programming portal. ! Technician friendly, fast installation and setup. ! Narrow Band IoT ready option available. ! Easily add app control to existing and new installations. ! Up to 10 base stations for multi branch corporations. ! Dual SIM 2G & LTE plus Wi-Fi. ! Global SIM option for international expansion. Innovative power features for load shedding conditions ! Unit stops transmitting at low battery voltage and goes into deep hibernation with ultra-low standby current to avoid battery damage. ! Lithium battery selection for correct battery reporting. ! Intelligent power signal management. ONLY RDC can do it +27 11 452 1471/2 [email protected] www.radiodata.co.za The alarm communicator made for the PROs alarm panel control app Wi-Fi admin & hardware programming portal Pairs with

www.securitysa.com Issue 8 2023 1 VOLUME 29 | ISSUE 8 | 2023 The human factor side of video management systems Get the basics right to win more business Security trends 2024 Local innovation Sector focus: Healthcare Sector focus: Agriculture The VMS is often seen as a technical solution rather than an operational one, says Dr Craig Donald. SMART Security Solutions looks at some trends expected in the converged security space in 2024. According to Charles Freedman, cowboys will not last long in a space where customers trust you with their safety. Despite the never-ending lousy news from South Africa, local companies still prove they can compete on any stage in any country. Despite political and criminal shenanigans, the healthcare industry depends on technology to protect and save lives effectively and efficiently. Farming is no longer about feeding the nation; today, it’s a high-risk endeavour, with the threat of brutal attacks by criminals a daily reality. Editor’s Note.....................................................................2 News & Events................................................................4 Products & Solutions ...............................................29 Information Security................................................30 Power Management ...............................................32 Wireless, battery-operated, AI surveillance Reconeyez is a company that provides autonomous wireless visual verification systems with built-in artificial intelligence. The systems are used in various industries, including defence, law enforcement, border security, critical infrastructure, private security, and commercial environments. It is easy and quick to install. Intelligent insights into a high-risk digitally transforming world Issue 8 2023 Wireless, battery powered Outdoor Security with artificial intelligence Distributed by Blacklight Group REGULARS FEATURES OUR COVER 08 10 12 16 20 26 11

2 Issue 8 2023 www.securitysa.com Andrew LETTERS TO THE EDITOR Letters to the Editor should be addressed to Andrew Seldon at [email protected]. Sending material to this publication will be considered automatic permission to use in full or in part in our Letters column. Be sure to include your name, e-mail address, city and postal code. We reserve the right to edit all letters. Disclaimer While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details areprinted as provided by the advertiser. Technews Publishing(Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material. All rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Technews Publishing (Pty) Ltd, Reg No. 2005/034598/07 Editor Andrew Seldon: [email protected] Contributors Dr Craig Donald Charles Freedman Advertising sales Tracy Wolter: [email protected] Heidi Hargreaves: [email protected] Subscription Services For address changes, orders, renewal status or missing issues, e-mail: [email protected] Design and layout: Technews Production Department Published by Technews Publishing (Pty) Ltd Wild Fig Business Park, Block B, Unit 21, 1494 Cranberry Street, Honeydew Tel: +27 11 543 5800 ISSN 1562-952X Subscribe online: www.technews.co.za ISSUE 8 2023 FROM THE EDITOR’S DESK Welcome to the final monthly issue of SMART Security Solutions. This is the last issue of the year and the last monthly issue we will print. We are witnessing digitisation across all industries, and as digital platforms continue to gain popularity, we have decided to stop monthly print publications in 2024. This decision is part of our rebranding exercise, which began with the retirement of Hi-Tech Security Solutions and our transition to SMART Security Solutions. We aim to innovate by embracing digital media and offering content on more platforms. That’s not to say SMART Security Solutions is disappearing or that we won’t print anything. We will be publishing six handbooks in 2024. In the ‘in-between’ months, we will be hosting conferences, still focused on the converging security market. We will also hold more online events, which we will promote in our email news briefs. Our email news briefs will continue and will be sent out every Tuesday to keep the industry updated on what’s happening (if you don’t receive our news briefs, feel free to send an email to [email protected] and ask to be added to the SMART Security Solutions news brief list). If you are on this list, you will automatically receive the brand new ‘Editor’s Choice’ news brief, in which I will publish exclusive content. The Ed’s Choice news brief will be published once per month (roughly) on a Thursday. To provide readers with an idea of what we will be doing next year, I have listed the handbooks to be published and the conferences we will be hosting below. As noted, A sad but exciting goodbye updates will be sent out in advance in the news briefs and will be put on the events page (www.securitysa.com/calendar.aspx). Our handbooks for the year will be: • January: SMART Access & Identity 2024. • March: SMART Mining Security 2024. • May: SMART Surveillance 2024. • July: SMART Estate Security 2024. • September: SMART Alarms, Intruder Detection and Perimeter 2024. • November: SMART Fire and Safety 2024. Conferences to look forward to, along with the proposed dates, include: • February: SMART Estate Security Conference Cape Town (22 February 2024). Find out more at www.resc.co.za. • April: SMART Surveillance Conference (10 April 2024). • June: SMART Mining Security Conference (25 June 2024). • August: SMART Security Convergence Conference (22 August 2024). • October: SMART Estate Security Conference Johannesburg (24 October 2024). You can find the complete media kit on www.securitysa.com/ex/SMART-2024-media-kit.pdf, and I will be updating readers in the weekly news briefs closer to the time. It is a sad goodbye to the monthly issues; I still remember my first two interviews for Hi-Tech Security Solutions (many years ago) as the new editor. One was with the late Terry Scallan and the very current Errol Peace; the second was with Roy Alves, then with Axis Communications. It’s been a long road, but change is inevitable, and we are excited to get stuck into the new SMART Security Solutions era. We hope everyone joins in the adventure with us. The SMART Security Solutions team wishes all our readers and advertisers a relaxing festive season and a peaceful and prosperous 2024. If you have any comments, criticisms or suggestions, please feel free to let me know at [email protected].

4 Issue 8 2023 www.securitysa.com NEWS & EVENTS Regal Distributors held its first official Regal Golf Day on 18 October at the Glendower Golf Course in Johannesburg. SMART Security Solutions was there on a hot summer’s day to meet many players and sponsors around the course. SMART Security Solutions spoke to Regal’s Head of Product Management, Michael Collier, to learn more about the event and why it was organised. “We decided to hold our first official Regal Golf Day to bring both customers and brands together, for the benefit of networking, fresh air, sunshine, and some good golf. We coupled this with giving our brand partners the opportunity to showcase any new products or technologies at the respective tee boxes on the day,” he said. He also noted that the company felt it was important to have a day out and strengthen relationships with customers and brand partners, while showing appreciation to customers after a challenging year. The day was a resounding success, with the course full of players and the clubhouse constantly busy with people coming and going. Regal even flew customers in from KwaZulu-Natal and the Western Cape to make this a national event. “The day turned out to be a larger success than we anticipated,” added Collier, “with over 140 customers and 18 brand partners on the day. The amount of positive feedback from all who joined us has led us to, without question, start planning for another event in 2024.” With the event, he explained that some of Regal’s new brand partners, such as Hanwha Vision and Genetec, were on board as Platinum sponsors. They were supported by ongoing support from longstanding, established brand partners, with Regal ending up having 18 brands out on the course – one at each tee. The complete list of sponsors is: Hanwha Vision, Genetec, Seagate, Centurion Systems, ZKTeco, Nice, Optex, Risco, Paxton, Hikvision, EZVIZ, Ajax, Nemtek, ITooner, Lytehouse, Fluss, BMW, Securi-Prod, Sola-Prod, Powa-Prod and JustWorx. Regal celebrates successful golf day Prizes galore Many prizes were awarded on the day, sponsored by Regal and its brand partners. In addition, a key Regal customer sponsored a week’s holiday as a prize, won through a lucky draw held on the day. The event also raised R30 000 as a donation to the SPCA to support a good cause while having fun. Among the prizes handed out, the winning fourballs were: • First Place: Roelf Snyman, Anton Bothma, Scott Graham and Marnus van der Merwe. • Second Place: Brendon Boshoff, Yasveer Udit, Chris Ventekas and Dave Strachan. • Third Place: Johan Deysel, Renaldo Muregess, Jacques Botha and Abubaker Kholvadia. • Fourth Place: Dylan Alberts, Jacques Taylor, Francois Bekker and Christo Kruger. • Fifth Place: Kyle Hunkin, Frans De Klerk, Louis Van Rensburg and Derek Myburgh. The networking opportunities were the day’s highlight for Collier and the Regal team. “The networking was incredible, and as much as the golf was fun, it is this networking that was the real value in the day; from seeing old familiar faces to meeting new faces, and the opportunity to have positive discussions with brands was without a doubt the primary goal and well achieved.” Looking ahead Of course, having almost reached the end of a tough year, planning for 2024 is well underway. Collier says Regal has “a big year planned for 2024, which starts with several internal improvements focusing on further delivering value to our customers.” “This is aligned with our core values of ‘Going out of our way to help our customers succeed’. In addition, we have an exciting year of footprint expansion, a revamp of our training courses through the Regal Training Academy and some exciting new offerings and improvements in the Regal Online world.” “More importantly, the market should expect us to introduce some exciting new product and technology offerings that could see the landscape of the electronic security industry change positively as we look to empower our customers’ businesses and product offerings to create value and new opportunities. The Regal Golf Day 2024 is already on the agenda too.” For more information, contact Regal Distributors SA, +27 11 553 3300, [email protected], www.regalsecurity.co.za

NEWS & EVENTS Gallagher Security has announced the latest release of its security site management software, Command Centre v9. Command Centre is designed to integrate seamlessly with a wide variety of systems and hardware, creating a single operating platform that manages total site security. With new features and enhancements, Command Centre v9 will enable users to manage their business more efficiently and flexibly. The latest release includes enhanced integrations with wireless access control solutions, Aperio, SALTO and IDEMIA biometric access control devices, KONE elevator systems, and improvements to the Bulk Configuration Tool. The Aperio BLE enhancement enables Mobile Connect to be used at both wired Gallagher readers and compatible wireless Aperio readers, Gallagher Security releases Command Centre v9 With a quick scan of this QR code and a few taps on your phone, installers, integrators, technicians or even end-users can chat directly with the team at their preferred Regal branch via WhatsApp. The Regal WhatsApp channel allows you to: • Get instant pricing and check stock availability, saving you time and money. • Know when Regal is open so that you can get what you need, when you need it. • Find out exactly where our branches are located and how best to get to there. • Call your branch for the human touch. • Link customers directly to Regal’s website for instant quotes. Connect with Regal on 081 475 5079 or scan the code and join the conversation today. Regal launches direct-to-branch WhatsApp communication Always in control with Since 1975, Flow Systems has manufactured and installed prestige and industrial access control physical barriers for time and attendance and access control. The original manufacturer of South Africa’s access control turnstile for the security industry, Flow Systems manufactures, supplies and installs: • Turnstiles • Speed gates • Revolving doors • Vehicle boom gate barriers • Access control booths • Bollards FLOW SYSTEMS MANUFACTURERS (PTY) LTD 24 Fransen Street, Chamdor, Johannesburg, South Africa | +27 11 762 2453 | [email protected] | www.flowsystems.co.za Year Warranty 10 providing added convenience to customers as only one credential is required across their site. “This Command Centre release illustrates Gallagher’s continued commitment to integration opportunities that can save our customers time, ensure data integrity, and enhance the user experience,” says Meredith Palmer, Chief Product Officer at Gallagher Security. Command Centre v9 enables Open Supervised Device Protocol (OSDP) for all supported IDEMIA biometric readers, enhancing user experience with rich feedback on the text displays. Best practice cybersecurity is enforced with all supported IDEMIA readers having OSDP secure channel enabled by default. For more information contact Gallagher Security, +27 11 974 4740, [email protected], www.gallaghersa.co.za

6 Issue 8 2023 www.securitysa.com NEW & EVENTS Hikvision has released an update for its security management platform, Hik-Connect. The updated platform is also known as Hik-Connect for Teams, as the new version not only meets the specific needs of individual users, but also caters to various medium-sized businesses (SMBs) and multi-site management scenarios from offices to chain stores and communities. “Previously, Hik-Connect accounts only allowed one login that companies would have to share if they wanted multi-user access,” said Ryan Wu, the Product Director at Hikvision, “With SMBs’ growing need for collaborative workspace, we baked new team features into Hik-Connect. A primary admin user can now create a multi-user account containing predefined user roles and add the whole team to the account, improving business efficiency and maximising team output.” Operational efficiency with centralised management Hik-Connect for Teams supports video security, intercom management, access control and attendance solutions. Business owners and managers can benefit from visualised management, allowing them to easily keep track of all connected devices in the system, access real-time video feeds, and receive event notifications on the go. The platform enables businesses to customise access levels for team members based on specific roles and responsibilities. This optimisation of workflow ensures seamless collaboration between team members. Hik-Connect for Teams allows companies to start small with the devices they currently use and add more devices and capacities as the business grows. This way, they do not have to invest in new systems Hik-Connect for Teams released Keeping tabs on what is happening within the building/facilities management arena can be frustrating for management teams. A quick way for stakeholders to find out what current trends, challenges, and solutions are available can be found at the Facilities Management Expo. Co-located with Securex South Africa, A-OSH EXPO, and Firexpo, Facilities Management Expo 2024 will take place at Gallagher Convention Centre in Midrand, from 28 to 30 May 2024. “Facilities Management Expo is increasingly being seen as the ultimate platform for providers of technology and services to the facilities management sector. The diverse variety of solutions available at the expo takes the drudge out of finding suitable answers to pressing questions facilities and building managers may have. Furthermore, the interactive nature of the event means that visitors can see the solutions in action before they make a purchasing decision. Networking opportunities with peers in the industry provides further impetus for visitors to attend the expo,” says Mark Anderson, Portfolio Director at Specialised Exhibitions – a division of Montgomery Group. FM Expo highlights industry trends and challenges prematurely, allowing companies to maximise the benefits of the latest technologies without high upfront costs. Being fast and easy to deploy, configure, and use, Hik-Connect for Teams eliminates the hassle of initial setup and IT management costs. Furthermore, the peer-to-peer (P2P) system eliminates the need for expensive centralised servers and continuous monitoring. For more information, contact Hikvision South Africa, +27 87 701 8113, [email protected], www.hikvision.com Learning about FM trends and solutions Another drawcard for facilities/building/risk managers is the Facilities Management Seminar Theatre. The 2023 event hosted 20 seminar sessions, and the Broll Vantage Awards. “Exhibitors at Facilities Management benefit greatly from the co-location with Securex South Africa, A-OSH EXPO, and Firexpo, as people naturally wander from one section of these expos to another expo. We have also found that people attending the Securex Seminar Theatre, the Saiosh Seminar Theatre, and the Working at Height and Safety Seminar Theatre are attracted to the Facilities Management Expo section, thereby further increasing footfall,” says Anderson. Organisations wishing to exhibit at Facilities Management Expo 2024 can contact the Facilities Management Expo team at [email protected] or [email protected] to book a space or capitalise on a sponsorship opportunity.

conferences & events SMART Security Solutions has scheduled five in-person conferences for 2024, along with several virtual events, to address various industry pressure points. The information shared during these events will assist buyers and decision-makers in asking relevant questions and making informed decisions for designing and managing effective real-world solutions. The aim is to provide a comprehensive platform that enables attendees to learn about the latest industry trends and advances while also fostering an environment for networking and collaboration. www.securitysa.com/calendar.aspx Educating security users on the best practices and processes essential for implementing optimal, integrated security solutions. For more information go to www.securitysa.com | [email protected] Inform, Integrate, Simplify FebruaryAprilJuneAugustOctober

8 Issue 8 2023 www.securitysa.com OPINION The human factor side of video management systems By Dr Craig Donald. All too often, a video management system (VMS) is seen as a technical solution rather than an operational solution. A video management system (VMS) is central to, and the most vital element to any control room operation using CCTV as part of its service delivery. All too often, it is seen as a technical solution rather than as an operational solution. The scope of the VMS, the range of capabilities, handling of recording and retrieval, the sophistication of its handling of events, and reporting capabilities are all important things that come with the system. However, strategically, the human factors issues in how it is implemented, the ease of use, and the suitability to enhance operator functions are fundamental and critical issues in how successfully it works. I have said in the past that the way cameras are viewed and displayed as part of a strategic approach to surveillance is the basis for effective detection of incidents and situational awareness. This display of cameras through the VMS interface will be influenced and constrained by the physical components of the control room, including control room design, placement and available space on monitors – you can only display according to the available viewing space available to you. Ideally, the hardware and software components of the control room system should be aligned and complimentary to your surveillance strategy from the beginning. This includes dealing with potential camera time ‘drift’, where different cameras’ date/time stamps deviate from the accurate time. This should be addressed through network design and configuration at a server level, avoiding time stamps that differ from each other and the original incident time. The equipment should allow the VMS to configure and display its optimal capacity and contribute to control room service delivery. Seeing what needs to be seen Viewing layouts are often set during the initial installations of the VMS. Often, this is done with too little appreciation of the viewing strategies to which these layouts will be put. One of the key capabilities of a VMS is to allow flexible configuration and saving of camera layouts, as well as changing things on the fly if an incident situation warrants it. In some cases, changes to the VMS configuration

www.securitysa.com Issue 8 2023 9 OPINION Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected] can only be done by technicians. I have emphasised repeatedly that different cameras are more important at different times; displays should feature this and have the capacity to be easily changed. Incident conditions such as tracking suspects, monitoring large group dynamics, or reviewing incidents in particular, may also call for different groupings of cameras. It should be possible for any modern VMS to allow an authorised operator to configure a group of cameras to be displayed in a way that the movement or activities of a person can be easily tracked to the camera next to the initial one displayed, either on a live basis or during a review. Even high-end VMSs sometimes limit the ability to position cameras intuitively relative to each other in a grouping, resulting in the kind of situation where somebody in a camera view is moving right, and the movement in the next camera is shown in the top left corner or somewhere else obscure. Also, different operators may differ in what they are assigned to watch or have preferences about setting up their viewing layout. With some guidelines in place, they should be allowed to optimise camera layouts according to their specific duties, understanding or preferences, if these align with delivering results. Macros to change to designated layouts, saved layouts for specific purposes or particular personnel, and even automatic layout changes according to alarms, times of day or risk conditions are desirable within a VMS. Another severe limitation when setting up VMS systems is camera naming conventions. I have seen camera naming that looks more like complicated password codes, which makes selecting cameras difficult. Camera naming needs to be done according to common sense, relevance to the different areas being viewed on site, in order to easily switch to these cameras on a logical and flowing basis. Camera names also should be able to be edited, and not just by technicians. Some conventions should still be applied to this to ensure there is no chaos with uncontrolled numbering. Cameras usually maintain a numbered status, and camera numbering must also be considered according to area. Control rooms also need to consider that additional cameras are likely to be added to the system, as this often results in wild fluctuations in camera numbers associated with an area, as new cameras are included. Camera names are also displayed on the video feed, which has implications when shown to other people, including at legal proceedings and as court-presented evidence. If you say a camera is covering a particular area, and yet the camera name does not bear any similarity to the location of the incident being presented in court, it is not unexpected for people in these situations to query whether that camera is viewing the affected area. This may be due to the naming of the camera for very relevant reasons, but it still presents a mismatch and comes back to a common sense naming convention for your cameras. The camera list displays on VMS systems also often leave something to be desired, with long lists that need to be scrolled down to access cameras; with little organisation or grouping. Where you are working with 200, 500, or more cameras, this can get onerous and lengthy at best. Initial set-up should consider both naming conventions as well as how to incorporate these and groupings of cameras according to areas into sensible and easily used camera listing. Names should also be viewable – for example, in some instances, there is an identifier code followed by the camera name. This sometimes cuts off the full camera name from the screen list and sometimes means that the list window border has to be dragged to the side, obscuring camera viewing areas. Camera listing is an important part of the display and operator actions, and reconciling these is not always easy. Effective integration of analytics and AI Video analytics or AI capabilities are increasingly being delivered as part of VMS capabilities. The cost/benefit of the analytics contribution and its sophistication should be considered when deciding on a system. This includes ease of setting up on-camera analytics and support on this. Where the VMS or an integrated independent analytics product has built-in video analytics or AI capabilities, responses to alerts and alarm conditions should be seamless to the continued operation and not detract from core viewing duties. Many VMSs have required operator response logging for an alert, to confirm it has been viewed and addressed. This could interfere with normal monitoring, particularly in the case where analytics are generating large numbers of false alarms on the system, and the logging process is unnecessarily complicated. One of the most underrated but one of the most critical areas in terms of human interface is the review and search capability of the VMS when looking at past incidents. The ability to quickly access the footage in the required time period, to view it in various ways, from slowed motion to reverse viewing, and to save or capture video or frames is an essential part of reviewing and evidence collection. I have found many of these VMS review interfaces clumsy and not intuitive to use. Yet, they provide the basis for how the VMS recorded data will be used to follow up, review and present information for evidence purposes. Along with the other features, I would make this review interface a vital part of any decision to choose a VMS. VMS features may provide huge potential for CCTV usage and data management. However, the human factor side of these systems is often neglected when it comes to actual implementation. It calls for strong surveillance management team input into the installation and setting up process in line with the surveillance strategy. It also needs constant feedback and regular performance reviews to check that supervisors and operators can use feature sets to quickly and effectively achieve results. One size does not fit all in this sector, and the ability to have a flexible system that can be adjusted to needs and easily customised by users is an important consideration in the choice of any VMS.

10 Issue 8 2023 www.securitysa.com OPINION Imagine you are trying to fit a camera on flaky plaster and sandy bricks. Without a solid foundation, the quality of the gear or your skills as a technician don’t matter. That camera is coming down, fast. Growing a successful business works the same way. Without understanding sales fundamentals as your foundation, it does not matter how good you are at your trade. Your business is not going to grow. The barriers to entry in security are not high. More people are adding CCTV and fencing to their repertoire every year. Cowboys will not last long in a space where customers trust you with their safety, but people doing ‘ok’ work may become your competitors. Understanding and applying sales fundamentals to your expertise can make all the difference between winning the work and growing the business – or not. Be an expert Understanding the ins and outs of your trade, and showing off this knowledge to customers is key to building trust with them. If you are meeting a customer and they ask you about the materials and techniques you will be using, give them an in-depth explanation to put their mind at ease and also show them that you understand what you are doing and why you are doing it. Customers will pay more for your expertise and experience, not how fast or cheaply you can do the work. Speak their language As the saying goes, communication is key, but it is not just about explaining your services clearly, you also need to understand the problems Get the basics right to win more business By Charles Freedman, ServCraft. Cowboys will not last long in a space where customers trust you with their safety. and their implications for your customers. This means it is just as much about listening and understanding as it is about sharing your message. People do not buy CCTV cameras, they buy safety and security for their homes and businesses. When proposing to customers, make sure you can link back options to their true needs and not just share the technical details of the equipment you would like to install. Build strong relationships Relationships are built from committed efforts made over time. It is no different with your partner, friends or customers. If you treat the job as a transaction instead of an opportunity to build a relationship, the chances of winning another one are low. Be a service provider people want to work with. That means being honest, reliable and transparent. You can do this by sharing a clear estimate, sticking to deadlines, and communicating openly with your clients. You will likely get repeat business from your clients, and they will be more likely to recommend your services to others. Go the extra mile Have you ever had a memorable service experience? What made it stand out? Who did you tell? As customer expectations increase and competition heats up, being different in a good way makes a big difference. It might be something simple like a glossy digital proposal or using job management software to update your customer across every step of their journey with you. Make your clients feel valued and respected by being responsive, considerate, and focused on their needs. You will be surprised at how far that little bit extra can take you. Stay ahead of the curve No industry stands still, which means change is not just a luxury, it is essential. If you want to keep your customers, you need to keep your skills sharp, your techniques up-to-date, and your business evolving. This means staying current with industry trends, mastering new tools and techniques, pursuing certifications, and adapting to changes in the market. Whether it is the latest tech or software to run your business, make sure you are carving out time to explore and research what can give you the edge. It is not just about what you are selling – but how you are selling - that will set you apart from the competition and set you up for success. Mastering these sales fundamentals is not just about winning jobs; it is about creating lasting relationships and building a sustainable business. Happy customers come back to you for future projects and refer you to others. Charles Freedman is the CEO of ServCraft (www.servcraft.co.za), a South African-designed and built job management application for trade businesses. Charles Freedman.

www.securitysa.com Issue 8 2023 11 COVER STORY Reconeyez is a company that provides autonomous wireless visual verification systems with built-in artificial intelligence. The systems are used in various industries, including defence, law enforcement, border security, critical infrastructure, private security, and commercial environments. It is easy and quick to install. The system is designed for use in inaccessible areas where there is no or limited power and communications infrastructure. Running on batteries, each ‘Detector’ includes communication capabilities, creating a mesh network between the various devices, enabling users to receive alarm events without installing a dedicated network. Since it is a mesh network, communications will continue, even if one device is inoperable. Reconeyez devices communicate using secure and reliable 2,4 GHz low-power radios. The signals can reach up to 500 m with direct line-of-sight or about 100 m if obstructions exist between the devices or the bridge. Eight detectors (depending on the environment) can be managed and connected to a single bridge, a communication gateway that provides a 4G mobile data connection. The bridge has a battery life of around 150 days, which can be extended with an additional battery pack or a solar panel. The Bridge I/O is a multi-frequency radio transceiver that connects Reconeyez Detectors with the control room. It combines three modules: short-range radio, long-range radio and battery. With three inputs and five outputs, the Bridge I/O offers high automation and security, allowing users to integrate third-party systems and sensors with Detectors. Detection via PIR Reconeyez Detectors use passive infrared (PIR) sensors and signal analysis to track An autonomous motion-triggered high dynamic range camera system. thermal signatures across the monitored area (it sports a 35 m detection range). Once motion is detected, the Detector activates the appropriate camera for the available light conditions, captures an image and generates an alarm. A range of snapshots can be sent to a central control room to provide operators with insight into whatever caused the alarm. The AI Reconeyez uses is supported by machine learning algorithms, which means it learns as it works, continually improving its recognition capabilities to reduce false alarms. Each Detector also includes two different cameras to ensure the system can capture images in all light and weather conditions. A colour daytime camera captures clear HD images during the day, while a monochrome camera is automatically used during low light conditions, and an infrared flash illuminates the area in case of darkness. The day camera can capture 1920 × 1080 images, while the night camera produces images with a resolution of 1280×960. Operators can adjust the resolution of either camera via a cloud-based management platform. Up to 2000 images can be stored on the device’s internal memory. The system captures snapshots instead of full video streams to ensure optimal battery life. This means Reconeyez can continue autonomous operations without human intervention for up to 400 days (or 50 000 events). The operating time can be extended by adding an extra battery pack or attaching a solar panel. As it is designed for inaccessible, harsh areas, the hardware has been field-tested from -40°C to +60°C. It is also encased in a rugged IP67-rated enclosure, making it resistant to frequent moving, transporting, and environmental conditions. Additional products are available as an add-on to the system, including a battery-powered siren offering 400 days of standby time or 200 hours of constant alarm. A wireless keypad designed for arming and disarming the Reconeyez security system is also available, suited for construction sites and other environments where frequent arming and disarming is necessary. The keypad battery supports 400 days of standby time or 300 keypad operations. Cloud control The Reconeyez Cloud empowers users to manage all their devices remotely, from setting up, configuring, managing, and controlling individual devices, to whole sites. View, track and configure events as they occur or adjust device parameters based on intelligent analysis of previously recorded incidences. With Internet access, the cloud-based control centre is always available. A mobile app is also available to make sure authorised users remain in control wherever they are. Reconeyez (www.reconeyezsa.co.za, www.reconeyez.com) is distributed by Blacklight Group SA. For more information, contact Blacklight Group, [email protected], www.reconeyezsa.co.za A simple system for complex protection

12 Issue 8 2023 www.securitysa.com The rapid development of artificial intelligence (AI) applications and uses in 2024 will profoundly impact security operations and AI-driven analytics, which can enhance threat detection, anomaly identification and predictive maintenance. However, one must always keep in mind that the use of AI will also expand in the hands of the criminal element to exploit any weaknesses that can be detected within security systems. Modern physical security solutions heavily rely on networked technologies, which can be vulnerable points of entry for cyber threats. This has led to the blurred boundary between physical and IT security teams. In 2024, these two teams, which in many cases have worked separately on different agendas, will, more often, start to merge to ensure a more collaborative effort to protect the entire security ecosystem. The pandemic has, in a measure, contributed to the adoption of cloud-based and IoT (Internet of Things) technologies to facilitate remote working during the pandemic, and it has become necessary to consider physical security as inherently linked to digital security. Expect an increase in AI-enhanced applications supporting a wide range of security functions, allowing a streamlining of routine tasks, and ensuring security personnel can focus on critical issues. Innovations in biometric authentication using AI will improve accuracy and reliability, coupled with the expansion of the effective development of facial recognition, which will play a pivotal role in access control. Enhanced PID systems will detect and respond to unauthorised physical Zero Trust in 2024 Modern physical security solutions heavily rely on networked technologies. access, and we can expect advancements in sensors, alarms, and perimeter security. Integration with digital security tools will provide a more holistic defence. As stated previously, the continual expansion of networked technologies provides a level of vulnerability of physical security systems to cyber threats. This will lead to a greater adoption of a Zero Trust Framework within more local and international companies. The Zero Trust Framework is a modern security strategy based on the ‘never trust, always verify’ principle. Instead of assuming that everything behind the corporate firewall is inherently safe, zero trust challenges this notion. It treats every request as if it originates from an open network, regardless of its source or the resources it accesses. The fundamental principles of the Zero Trust model are: • Verify explicitly: Always authenticate and authorise based on all available data points, including user identity, location, device health, service or workload, data classification and anomalies. Implement least-privilege access by granting just-in-time and just-enough access (JIT/JEA) to minimise exposure. • Assume breach: Rather than assuming that the network is secure, Zero Trust assumes that a breach has already occurred. It focuses on minimising the blast radius and segmenting access. End-to-end encryption and analytics enhance visibility, threat detection, and overall defences. • Build a secure hybrid workforce: Embrace a Zero Trust approach to security, especially in today’s hybrid workplace. Enable secure productivity for users working from anywhere. • Safeguard critical assets: Implement unified data protection and governance practices to secure data, even beyond the network perimeter. Modernise your security posture by reducing vulnerabilities and automating policies. • Minimise the impact of bad actors: Explicitly verify all internal and external access requests to prevent unauthorised entry. Layered defence mechanisms are essential. • Stay ahead of regulatory requirements: Develop a comprehensive strategy to protect, manage, and govern data while complying with evolving privacy regulations. In summary, Zero Trust challenges traditional security assumptions and promotes a proactive, adaptive approach to protect people, devices, apps, and data in our interconnected world, which any developer of products will need to keep in mind in 2024 and beyond. The same applies to companies planning on upgrading or replacing their physical security systems and equipment, in terms of any particular vulnerability which may be present within their security systems, which can be exploited. For more information, contact Mantis Security, +27 11 487 1000, [email protected], www.mantissecurity.co.za By Craig Peel, Mantis Security. SECURITY TRENDS 2024

In the past year, a prominent private school staff member was accused of raping a seven-year-old child after being vetted and cleared twice in four years. This is a prime example of how criminal record checks are not the only checks you need to be doing to screen your staff properly. In this case, the accused was a staff member. Still, schools and many other organisations employ contracted staff members who are not subjected to the same level of vetting or screening as permanent staff members. Often, the actual place where they work, not the employer, has no idea of their contracted staff’s background. According to Deloitte Insights, “When it comes to human-related risks, organisations and their most senior leaders focus on a narrow set of workforce risks, the potential risks that human workers pose to the business.” These are mostly operational concerns and concerns regarding staff performance in general. “Yet all risks have a significant human element,” says Deloitte Insights. Human risks are risks that affect people’s lives as well as the organisations’ reputation and day-to-day operations. Senior management or the leadership of an organisation needs to concern themselves with the human risk significantly more. This is for both employees, potential employees and contracted staff, as anyone with access to your organisation’s inner workings could have criminal intent. Sadly, the most common form of vetting or screening is still a simple criminal record check (www.securitysa.com/*ifacts1). Criminal record checks do not paint the full picture of an individual, as the lack of a criminal record does not denote a lack of criminal intent. Due to our severely lacking judicial system, anyone committing a crime must be caught, convicted, and found guilty before they can have a criminal record. The likelihood of criminals or those with criminal intent actually incurring a criminal record is very low. This means that because many criminals are not caught, their criminal record checks will come back clear. A low conviction rate contributes to the problem, but the person has often not been caught, so how can you avoid hiring a criminal More than just a criminal record check Organisations and their senior leaders tend to focus on a limited set of workforce risks, specifically those posed by human workers to the business. SECURITY TRENDS 2024 or opportunist who has not been caught yet? How do you avoid being the company that unknowingly hired or contracted someone who is later found to be a criminal or alleged criminal? This is a great cause of concern as hiring a criminal could cause a scandal that negatively impacts your company and could cause untold damage to your professional reputation or general business. Integrity and behavioural assessments (www.securitysa.com/*ifacts2) will offer a clearer and more in-depth picture of the candidate in question. These assessments pick up the characteristics and personality traits of individuals on a much deeper level than a cursory interview would manage. People are on their best behaviour during job interviews; thus, more than a job interview is needed to ascertain the accurate measure of a candidate. Rigorous screening and vetting will pinpoint the deeper traits of a person, even if they were hoping to hide said traits. Integrity and behavioural assessments offer insight into what a person is capable of and their behavioural traits that may outline criminal intent, despite there being no criminal record to speak of. These are just some of the screening and vetting assessments that should be performed when considering a candidate, particularly for a position of risk. In addition, certain industries – hospitals, schools, care centres, etc.- require additional screening as these industries cater to vulnerable people who need to be properly protected. An effective and efficient employee screening system is essential for all companies to minimise their human risk. iFacts can help. We offer a bouquet of employee screening and vetting services and advice on the various assessments that should make up your screening and vetting process to ensure you can hire confidently. For more information, contact iFacts, +27 11 453 1627, [email protected], www.ifacts.co.za

14 Issue 8 2023 www.securitysa.com SECURITY TRENDS 2024 The serpent tempting Eve in the Garden of Eden serves as an allegory for the lurking danger of insider risks in the business world. Just as the serpent’s cunning led to transgression, individuals within organisations can exploit their privileged access to sensitive information, systems, and assets, potentially causing harm to their employers. In this article, we explore the multifaceted realm of insider risks, their manifestations in the modern business landscape, strategies to both expose and mitigate this critical threat and examine a historical case, the Enron scandal, as one of the most severe insider events in corporate business. Identifying insider risk: In today’s business landscape, insider risks can manifest in various forms, including data theft, fraud, sabotage, insider trading, espionage, whistleblowing, negligence, truck hijacking, goods robbery from warehouses, and more. These threats can undermine a company’s security, financial stability, and reputation, much like the serpent’s deceptive actions shook the foundations of human innocence. The Enron scandal: a pinnacle of insider misconduct. The Enron scandal was one of Unmasking insider risks By Andre Du Venage. Strategies to expose and mitigate the threat within. the most severe insider events in corporate business history. Enron, a once-respected energy company, filed for bankruptcy in 2001 after it was revealed that top executives had engaged in extensive financial fraud and accounting manipulation to hide the company’s true financial state. This devastating insider event resulted in massive financial losses for shareholders, employees, and stakeholders, and it led to significant regulatory changes in corporate governance and financial reporting. The Enron scandal remains a memorable lesson in the catastrophic consequences of insider misconduct. An example of industrial espionage in a corporate environment involving an insider is the case of Apple Inc. vs Nuvia Inc. In 2021, Apple filed a lawsuit against Nuvia, a chip startup founded by former Apple employees, alleging that three former Apple engineers, including Nuvia’s CEO, had stolen trade secrets related to Apple’s chip designs and used them to develop their products. This case highlights individuals with insider knowledge can attempt to take proprietary information from their former employers for personal or competitive gain, leading to legal disputes. Strategies for exposition 1. Employee background checks: Thoroughly vet job candidates through background checks to uncover any prior security breaches or criminal activities. Psychometric tests to identify team players, especially appointments for middle and senior management positions. 2. Access control: Implement strict access controls to limit employee access to sensitive data and systems based on their roles. Regularly review and adjust these permissions. 3. Monitoring and auditing: Continuously monitor and audit employee activities to detect unusual or suspicious behaviour that may indicate an insider threat. 4. Behaviour analytics: Utilise behaviour analytics software to identify deviations from an employee’s typical behaviour patterns, enabling early threat detection. 5. Whistleblower programmes: Establish anonymous whistleblower programmes to encourage employees to report suspicious activities without fear of retaliation. Strategies for safeguarding organisations 1. Education and training: Conduct regular training and awareness programmes to educate employees about insider risks, security policies, and the consequences of unethical behaviour. 2. Clear security policies: Develop and communicate clear and comprehensive security policies and procedures to all employees, emphasising rules and consequences for policy violations. 3. Zero Trust architecture: Adopt a Zero-Trust security model, which assumes that no one, including insiders, should be trusted implicitly. Require continuous verification of access and behaviour. 4. Segregation of duties: Avoid overconcentration of control by ensuring no single employee has too much influence over critical processes or systems. 5. Incident response plan: Develop a robust incident response plan that outlines the steps to be taken in case of an insider threat incident, incorporating legal, HR, and IT components. 6. Psychometric testing: Consider implementing psychometric testing for employees, especially middle and senior management positions, to assess their suitability as team players and identify potential issues early. 7. Data loss prevention (DLP) tools: Implement DLP tools that can monitor and block the unauthorised transfer of sensitive data outside the organisation. Just as the serpent’s treachery led to expulsion from paradise and the Enron scandal remains a glaring example of the severe consequences of insider misconduct, businesses can build a resilient defence against the serpent that lurks within by employing a combination of strategies to expose and mitigate these threats. With diligence, proactive measures, and an organisational culture of trust and transparency, companies can protect their integrity, safeguard their assets, and thrive in the modern business landscape. Andre Du Venage is the MD of Secure Logistics and a Business Risk Consultant. Andre Du Venage.

RkJQdWJsaXNoZXIy MjEzMjU=