+ All Categories
Home > Documents > Security Africa Magazine Feb 15

Security Africa Magazine Feb 15

Date post: 08-Apr-2016
Category:
Upload: security-africa-magazine
View: 223 times
Download: 0 times
Share this document with a friend
Description:
Security Africa Magazine Issue 5 Feb 15
Popular Tags:
42
SECURITY AFRICA 11 South Africa: New City East of Jo’burg 26 Paxton Review Intersec 2015 20 Pirate Alley: Another Deadly Attack Issue 5: Security Africa Magazine January/February 2015 Securex South Africa 2015 Johannesburg
Transcript
Page 1: Security Africa Magazine Feb 15

SECURITY AFRICA

11 South Africa: New City East of Jo’burg

26 Paxton Review Intersec 2015

20 Pirate Alley: Another Deadly Attack

Issue 5: Security Africa Magazine January/February 2015

Securex South Africa 2015Johannesburg

Page 2: Security Africa Magazine Feb 15

Paxton, Providing A Secure Future for Your Business

Last year, Paxton, the global brand of electronic access control and door entry equipment, trained over 5,000 security installers globally

“Informative, simple and well structured.”

100% of security installers who attended the Paxton Certified Installer Workshop would recommend it to a colleague

• Win more business quoting and installing Paxton’s simple access control

• Offer your customers the latest, most reliable and high quality solutions

• Be confident specifying

• Move forward with industry leading customer support

• Five year swap-out warranty on all products

What Can You Expect When You are a Certified Paxton Installer?

Ross Craig, Intelligent Security System

Sign up to a workshop near you: http://paxton.info/2331

www.paxtonaccess.co.za

Guarantee Garantie Garantía Garanti Takuu תוירחא 保证

εγγύησ

η G

war

ancj

a W

arran

ty Garanzia

PaxtonZASecurityAfrica_fullpgAdFeb.indd 1 02/02/2015 17:19:57

Page 3: Security Africa Magazine Feb 15

SA January/February 2015 3

CONTENTS

Contents05

11

1216

20

22

26

29

32

34

37

39

Securex South Africa: Securex provides visitors with an unrivalled opportunity to view, leading South African and international manufacturers and suppliers

Work begins on South Africa’s ‘New York’: Construction of a new city in Modderfontein , eastern Johannesburg, has begun with the aim of providing an area of residences and work for at least 100,000 people.

Morsewatchmans: Fernado Pires on Access Control and integrating Key Control into a Networked Security System

Milestone Systems: IP video will reach global tipping point in retail sector, with increased investment in open standards and IP-based video management systems

Nigeria’s Pirate Alley: A pirate attack that killed a super-tanker crewman off the coast of Nigeria on 2nd February has highlighted a growing threat off oil-rich West Africa

Axis Communications: With the Internet of Things (IT) continuing to be a hot topic throughout 2014 Roy Alves looks at changing trends.

Paxton Feature: Paxton steps into the limelight Intersec Review 2015. The Paxton Group is a global access control designer and manufacturer with a strong focus on installer training and education

Gemalto expands its presence in Africa: Gemalto world leader in digital security, announces the opening of an office in Abidjan, Côte d’Ivoire

Cote d’Ivoire Bridge opens over Pearl of Lagoons: A third bridge crossing the lagoon in Cote d’Ivoire’s commercial capital, Abidjan, has been opened to the public.

Kim Humborstad, CEO of Zwipe on Biometric Cards: More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems.

South Africa to grant exploration licences for Karoo gas fields: Karoo shale gas fields could meet about half of South Africa’s electricity needs for the next 20 years.

Nigerian Oil saved by expanding China market: China has stepped forward to fill the gap by pledging to buy more oil from Nigeria.

Water Based Suppression Systems Janus Fire: Water based suppression systems utilize the inexpensive and readily available medium of water to discharge onto flames through a normally fixed piping system

28

Page 4: Security Africa Magazine Feb 15

SA January/February 20154

IntroductionIn this, our first edition of 2015, we are pleased to bring our readers updates on security developments in the African continent, along with a mix of important Investment and political news. This issue includes reports on Access Control, Water Based Suppression systems and Marine Security, as well as an early preview of our media partner, the Securex South Africa exhibition in Johannesburg this May.

Our editorial features include a report on the development of a new city in Modderfontein in eastern Johannesburg, initiated with Chinese funding, which looks set to contribute to the flourishing business hub of South Africa. Also in South Africa the shale gas reserves under the vast Karoo region could lead to a solution to the country’s electricity supply problems for 53 million people.

In Cote d’Ivoire, a West African country that has been ravaged by civil war for over a decade, the opening of a new bridge in the financial capital Abidjan, funded by the African Development Bank, promises a more optimistic period.

Security on the seas is also of paramount importance to African development. Whereas the threat in East Africa has diminished in recent years, largely because of the floating armaments ships which deter pirates, there is a growing concern about attacks to oil tankers in the Gulf of Guinea.

News from the African continent in the last six months has been dominated by the Ebola outbreak. As a final note to our readers I am glad to be able to communicate some positive news on this score. The World Health Organisation reports that in the week ending 25th January 2015 there were just 99 cases of Ebola in West Africa – 65 in Sierra Leone, 30 in Guinea, and only 4 in Liberia. We can also celebrate the border control vigilance of Nigeria, which led to the country experiencing only 8 cases of the disease.

These welcome statistics seem to indicate that measures to control Ebola are beginning to take effect, despite media speculation that the disease might spiral out of control. With this optimistic news in mind, along with the other business developments in this issue, it seems appropriate to look forward to a prosperous and, of course a secure 2015, for Africa and for all of our readers.

Judith AdeleEditor

Advertising SalesBen [email protected]

Editorial & PRJudith [email protected]

Design & AnalyticsAlex [email protected]

AccountsSue [email protected]

Page 5: Security Africa Magazine Feb 15

SA January/February 2015 5

Securex provides visitors with an unrivalled opportunity to view, discuss and source products and services from leading South African and international

manufacturers and suppliers. Securex has a long history in the sector as the leading exhibition for security and fire professionals to interact with the best-in-breed suppliers.

Securex and the co-located exhibition A-OSH Expo 2015, which will be held at Gallagher Convention Centre in Johannesburg from 12 to 14 May, continue to bring education to the fore through a number of targeted seminars and conferences. These educational sessions focus on building a professional future for risk mitigation within organisations and addressing current security and fire issues.

“We have revised the Securex brand in line with our Africa-centricity and a number of new features have been added to our popular existing features, to bring further value to visitors,” says Joshua Low, Securex Event Director at show organiser Specialised Exhibitions Montgomery.

The Securex Free-to-attend Seminar Theatre will provide visitors with access to up to the minute information on best practice, as well as pertinent industry-related and legislative issues.

“Our free educational programme is always very popular with visitors. Topics at the seminar include ‘Africa: Tapping into growth opportunities, challenges and strategies’; ‘Funding for security SME’s’ ‘Adherence to fire standards’ and ‘Cyber security: A pertinent business risk’.

The SAIDSA Installer Workshop is being launched at Securex 2015 to address the gap in what is deemed a very important sector of the industry. This interactive educational platform, which will be run by SAIDSA, will provide installers with

>

Visit Securex 2015

FEATURE

Page 6: Security Africa Magazine Feb 15

SA January/February 20156

the latest technology trends and best practice from specialists in the field. Topping off the programme, an installer competition will be run on 14 May. A New Products Showcase will be erected in a prominent area at Securex 2015. This will allow visitors to preview the latest technology in a number of security and fire modalities.A new service – known as the Global Meetings Programme – will see visitors to both exhibitions matched up with companies that are best able to devise solutions to their apparent threats and risks. This will substantially reduce the time it takes to find a suitable supplier, allowing visitors to maximise their time at Securex 2015 by setting up meetings with exhibitors prior to even arriving at Securex 2015.

In addition to the extensive array of traditional security technology such as surveillance and access control, visitors to Securex 2015 can also look forward to more in-depth coverage of other security modalities such as cybersecurity and guarding services. Attention to the growing field of fire detection, monitoring and prevention will increase and the Fire Protection Association of South Africa (FPASA) will run a Fire Hazard Identification Challenge throughout the three days of the exhibition.

On ShowBetter Life Concepts is launching the locally made Universal Armguard which can be used on either arm. The product is very light and durable and houses a torch or pepper spray. It has an inner pad for comfort and is strapped to the arm. The Universal Armguard and a torch can be used on the same arm while the other arm is free to perform other tasks. The Universal Armguard can be used to protect against dog, knife and machete attacks. It can also be used to cover the face if one is pepper sprayed and can be used as a sling for the arm if it is injured.

British Standards Institution (BSI) is an approved certification and testing body that will assist visitors in gaining a better understanding of the Kitemark certification for fire products, PPE, emergency lighting, and CE marking. The Kitemark is a registered and globally recognised product certification mark owned and operated by BSI. It is one of the most accepted symbols of quality and safety and offers true value to consumers, businesses and procurement practices. Benefits include risk reduction, increased customer satisfaction and access to new customers around the world.

FEATURE

Page 7: Security Africa Magazine Feb 15

SA January/February 2015 7

Architects and property developers are becoming more aware of the aesthetic and security benefits that accompany C-Thru Fencing. As a security barrier and from a functionality point of view, C-Thru Fencing offers an all-in-one solution.

Cochrane International continues to provide segment-leading physical perimeter security barriers including the ClearVu Invisible Wall – the world’s only architecturally inspired high-security fencing system. The company will also showcase its Marine Floating Barrier, the world’s only rough water, high-security barrier and the Rapid Deployment Barrier that delivers unmatched crowd and riot control.

Easi-card is a manufacturer/printer of plastic cards. The company custom makes printed PVC photo ID cards, security/access cards, membership and loyalty cards with or without RFID, magstripe and signature panels. Easi-card also stocks all the ID card printer equipment and accessories for data cards, enabling customers to undertake all their card printing onsite with instant issuance.

Fox Electronics will be showcasing the VHF FX255 D3 monitoring system that supports full CID multi-data alarm monitoring. The T9 transmitter with selectable RF power output has eight input triggers including CID and serial port, and provides multiple alarm panel connectivity to all popular alarm systems. Other products on display will include GSM, alarm panel, battery charger modules and battery testers.

Maxiflex Door Systems will be displaying the Teckentrup fire-proof steel roller door. The first class materials and excellent workmanship of the doors guarantees quality, reliability and long service life. Teckentrup fire doors are tested in accordance with DIN 4102. Also on show are the company’s fire-resistant steel doors, Teckentrup burglar resistant security doors with multi-function protection, Teckentrup heat insulated multi-purpose doors, Teckentrup steel internal doors and Teckentrup roller shutter system ‘easy’.

MiRO will display its wireless IP convergence portfolio with wireless solutions from SIAE, RADWIN, Ubiquiti, MikroTik, Deliberant and more. The company will also exhibit the VIVOTEK range of cameras (from their Supreme cameras to their compact more cost effective C Series) and its Sunell range of thermal, analogue and IP cameras. The NUUO range of VMS and NVR solutions

and the Milestone open platform video management system will also be highlighted. The MiRO stand will be interactive, with live displays on how the cameras work. A new version of Netgear’s operating system for its ReadyNAS family of desktop and rack-mount Network Attached Storage (NAS) devices will be demonstrated on the Duxbury Networking stand. Other products include a new Power over Ethernet (PoE) switch –

Netgear’s operating system for its ReadyNAS family of desktop and rack-mount Network Attached Storage (NAS) devices will be demonstrated

FEATURE

Page 8: Security Africa Magazine Feb 15

SA January/February 20158

the Lantech IPGS-2204DSFP – which is targeted at high-performance, standalone solutions supporting converged network access deployments. Also on show are a wireless uplink gateway designed to facilitate multimedia content sharing; the new Cambium PTP 650 wireless broadband platform; the Tsunami 8200 Series point-to-point and point-to-multipoint carrier-class wireless networking platform; and an ACTi Internet Protocol (IP) based video surveillance systems.

ORing Industrial Networking Africa will release four of its latest PoE (Power over Ethernet) IEEE802.3(af/)at industrial Ethernet switches: IPS-1080A, IPS-1080-24V, IPS-1042FX-24V and IPS-1042FA. These products are specially designed for the high power demand equipment, such as PTZ cameras. The power input of IPS-1080-24V and IPS-1042FX-24V is with 24V power input, which is suitable for in-vehicle applications. This series offers up to 30W which is almost twice that of the existing IEEE 802.3af PoE standard equipment. IPS-1080A and IPS-1042FA series solve the problems of limited space with their compact form. This series also offers the IP30 rigid standard, excellent heat dissipation, and wide-ranged operating temperature of 40-70°C.

Phendula Technologies is launching the MICROSENS range, from a leading German manufacturer of fibre optic data transmission systems. The range of micro switches in particular, offer true FTTO by virtue of its compact design. With dimensions of 90x45x58

mm, a total of six Gigabit ports are available: five 10/100/1000Base-T ports with Power-over-Ethernet+ (PoE+) according to IEEE 802.3at, to connect terminal devices and a fibre optic uplink port.

Powell Tronics is following a similar theme to 2014, with a number of new high-technology products from its popular suppliers dominating the stand, including Impro’s scalable Access Portal range, Safran Morpho’s 3D Face and the MorphoTablet™ – the answer to portable biometrics. Other products include Golmar’s latest IP intercom solution, the ATOM biometric template distribution software with entry level T&A and Synerion’s Workforce Management (WFM) for enterprise solutions. In addition, bespoke software such as PT-GUEST, which uses market-established handheld scanners to scan and decrypt South African driver’s licences and then integrate the data captured with the ImproNet access control system, as well as the PT-VEND cashless vending solution (using pin code, prox cards and biometrics), will be on show. The company will provide live demonstrations and will be running a number of competitions with great prizes over the three days of the exhibition. ProDiS offers tailored, supported solutions based on industrial IP surveillance and hemispheric and decentralized technology. Offering supporting products to complete a turnkey solution, from: storage, optical, mobility, automation, analytics, networking equipment to full Integrated video

FEATURE

Page 9: Security Africa Magazine Feb 15

SA January/February 2015 9

management systems. ProDiS will be focusing on the internationally known brand MOBOTIX at Securex 2015. The German company MOBOTIX AG is known as the leading pioneer in network camera technology and its decentralised concept has made high-resolution video systems cost efficient.

PSS Distributors will feature the Vautex range of batteries. These batteries come with the option of a five- or 10-year life design, ranging from 12V-1.3Ah, 12V-2.3Ah, 12V-5Ah, 12V-7Ah up to 12V100Ah. Batteries are distributed for various applications of which security and telecommunications form a big part. There has been a large growth in backup power and the UPS industry. The PSS Distributors Securex 2015 stand will be filled with UPS’s, inverters, batteries, power supplies, solar panels, automatic voltage stabilisers and surge protection.RJ Connect is launching the Moxa VPort 56-2MP series, a rugged 1080P H.264 zoom IP camera designed for mission-critical video surveillance applications as well as the Moxa VPort P06HC-1MP-M12, a new series of rugged, EN 50155 compliant IP cameras that support superior 720P images with an advanced constant bit rate control function. The cameras have an anti-vibration Ethernet connector and a built-in microphone for implementing an intercom function, and sport an IP66-rated housing.

Salto Systems will be exhibiting its new range of keyless access control locking solutions including the XS4 Mini and the XS4 One escutcheon, which is standalone, wire-free and easy to install with the embedded SVN technology. Also on show will be the new XS4 wall reader and controller as well as the new XS4 GEO cylinder.

Securitytechnologystore.com is the answer to standalone security needs. The STStore’s focus is to

assist African market consumers/resellers with access to proven standalone products and consumables with a few clicks of a button. Register, buy and the product is delivered. Show specials and vouchers will be on offer for first time buyers. Trade enquiries are welcome.Shenzhen EEP Industry Co. will exhibit its range of Keeper 1- and 1.3-megapixel CMOS analogue cameras with full HD support and 960H output. In addition, its KC-AHD3104 DVR features 4CH 720P or 960H input, mobile phone support, as well as 1CH real-time or 3CH non real-time playback. Suprema will be launching an array of new products at Securex 2015. Some include the new BioStation T2 sensor with live finger detection and FBI credentials, Secure IO2 expansion module and Product X, a new terminal loaded with heaps of features and setting a new standard in biometric device architecture. BioStar II will be launched, this major release revolutionises access control with full Cloud architecture and a superlative web interface. As always Suprema will boast an array of new value-added integrations including, the new Impro Portal, Saflec Access Control system, Paxton Access and Milestone VMS.

TeleEye will showcase the new TeleEye MP Series of HD network cameras and the new TeleEye GX680 series of real-time, HD digital video recorders for faster transmission, hacker resistance and the securing of ONVIF cameras. The 4-, 9- and 16-channel GX680 DVRs are BS8418 compliant and allow for remote monitoring through PC and mobile devices.

FLIR thermal imaging products from the commercial security, law enforcement and automation ranges will be showcased, including FLIR’s new short-range thermal cameras. The REDWALL range, which includes outdoor PIR sensors, infra-red beams and laser scan detectors, will also be on view.

BioStar II will be launched, this major release revolutionises access control

FEATURE

Page 10: Security Africa Magazine Feb 15

7567 - SECUREX 2015 VISPROM A4 AD_PATHS.indd 1 2015/02/10 9:44 AM

Page 11: Security Africa Magazine Feb 15

SA January/February 2015 11

Construction of a new city in Modderfontein, eastern Johannesburg, has begun with the aim of providing an area of residences and work for at least 100,000 people. A start began

in January 2015e on 300 residential units and road infrastructure. The development is a 15- to 20-year project that would see between 30 000 and 50 000 housing units of different types and sizes being built.

The 28 Billion Rand (7.8 Billion Dollars) project is financed by China who plan a financial hub with offices, houses, an educational centre, a hospital and medical centre, and a sport stadium.

Shanghai firm Zendai aims to develop the 1,600 hectares of land into the “New York of Africa”. Dai Zhikang, the company’s founder and chairman, announced the plans at the end of 2013 and said that, “It will become the future capital of the whole of Africa.” Zendai is a Hong Kong-listed investment company. It develops and manages property projects in 12 cities in northern China, Shanghai city and Hainan province.

Zendai bought the 1,600-hectare property from South Africa’s chemicals and explosives company AECI in November 2013 for R1.06-billion. The sale was part of AECI’s plans to dispose of surplus land holdings, and the transaction represents one of the largest single foreign direct investments in South Africa.

Zendai South Africa chief operating officer Du Wenhui said. “The project will be market driven, and depending on what our clients or developers want, the sky is the limit.” The new city has not been named as yet but it will become a hub for Chinese firms investing in sub-Saharan Africa.

Critics of the development say that it is over ambitious, and has a lengthy 20 year time frame. The Modderfontein site is located between the central business district of Sandton and or Tambo International Airport, Africa’s biggest airport.

Shanghai Zendai’s plan is seen by some as overoptimistic as office vacancies in northern Johannesburg are “pretty high” and demand for residential properties is relatively stagnant. John Loos, property economist, at First National Bank, remains sceptical, “We need to think about our urban planning and not go and create an oversupply of commercial property,” he said.

The consensus is that Johannesburg will over the next decade cement its position as an African regional hub and continue to attract demand for office space and housing. Gauteng, which contains Johannesburg, is South Africa’s fastest-growing province, and the development will also include the completion of the Modderfontein station. SA

Work begins on South Africa’s `New York’

Judith Adele

CONSTRUCTION

Page 12: Security Africa Magazine Feb 15

SA January/February 201512

As part of the requirement for the safety and security of people, assets and facilities, the management of keys is a fundamental tactic in controlling access. In fact, key

management is a prerequisite for any access control strategy because of unavoidable vulnerabilities when humans are involved. Lost or missing keys, unauthorized duplicate sets of keys, manual log books that are inaccurate and often illegible or not knowing who might have keys when they should not, all have the potential to undermine even the most sophisticated and well-intentioned security initiatives.

State of the art key management systems can resolve these issues and optimize access control solutions through system integration. Today, the most advanced key management solutions can be integrated with the networked security system. Open protocols enable connectivity to access control and other systems provided by a range of integration partners for multiple levels of security and control.

Integration of multiple locations, with common usage of databases and programming; real time information; local and remote access; computerized reporting; specialized alert notifications and ease of use take key management and access control to the next level.

Real Time Information: When network connected, advanced key management systems can provide real-time information to authorized personnel for monitoring

Morse Watchmans: Integrating Key Control

key usage activity. Systems are designed so that every time a key cabinet is accessed to either remove or return a key, the activity is automatically recorded. The time, date and identity of the individual accessing the cabinet are all automatically logged and the data is available with a few key strokes using data management software. Additional information including when a key is scheduled to be returned or the location of a stored key (i.e. which key cabinet in the system) is also available; knowledge which could be critical in an emergency.

For example, if company vehicles must be moved out of an area because of potential flooding or fire, doing so quickly and efficiently can depend on how quickly each of the vehicle keys can be located. Immediate confirmation of where the keys are or identification of who has possession of them can make the difference in saving or losing an organization’s assets.

Management can maintain optimum control of building keys at any time of the day or night or when away

SECURITY NEWS

Page 13: Security Africa Magazine Feb 15

SA January/February 2015 13

With a networked system, selected management can be alerted via email if a high security key has been accessed or not returned on time

Remote Access: Today’s work force no longer sits primarily in a cubicle at a desk. More often than not the office is wherever the individual happens to be. Mobile apps allow users to extend their productivity beyond a physical location or regular work environment.

By integrating mobile devices with key control and asset management systems, security personnel or other authorized users can see a wide range of live information and can interact remotely with the key control system. Management can maintain optimum control of building keys at any time of the day or night or when away from the primary place of business. For example, while off site at a seminar or convention, a manager can remotely release a key to a contractor called in to temporarily replace an employee who has called in sick. Or, they can schedule a report to be generated on their return to the office that shows all activity during their absence.

Critical real time information such as keys in use, overdue keys, alarms and system status that is easily accessed on a smartphone or mobile device ultimately provides for a safer, more secure environment.

Security: In an information-laden environment it is easy to miss relevant or important signals. Network-integrated key management systems can deliver the right information at the right time to the right people on their choice of devices.

Critical information about key control that is communicated across multiple systems enables additional security actions to be taken. With a turnstile-type access control system networked to the key control system, a user who has taken a specific key can be denied egress from the facility until the key is returned.

With a networked system, selected management can be alerted via email if a high security key has been accessed or not returned on time. In integrated network-enabled key management systems, authorization codes can be changed remotely to help prevent access being granted to a recently terminated employee. This latter action can be accomplished from a global list and all settings are automatically synchronized across the system.

For added security and efficiency, the integrated key management system can be seamlessly adminstered by the card access system. Through the card

access system, the key management system can be configured for access, storage and tracking.

Comprehensive Reports: In addition to monitoring the activity live, networked systems enable data to be collected from the various key cabinets and summary reports generated. Key usage data provides a wide range of business intelligence and programmed reports are the easiest and most effective method of assembling and viewing the information.

Authorized personnel can generate practical management reports which trace key movements by time, date and user code as well as audit reports that track keys in use and overdue keys; inconsistent key usage; and so on. And for easier reading, the reports can be generated in portrait or landscape mode with color interspaced lines.

Built-in schedulers can be programmed to automatically download all data to a secure PC as required by the user, including online as transactions occur; periodically; daily at a specified time; weekly with specified day and time; or monthly with specified day and time. As well, email delivery of customized or standard reports can be scheduled for any frequency or specific time, or they can be accessed using a smart phone app. With this capability, management can better sort and analyze information to maintain maximum control of access and security issues.

In the event of an incident, management can query the system for specific details such as listing all transactions between certain times and when doing a follow up investigation, request a report for the hour preceding the incident. Or, immediately

SECURITY NEWS

Page 14: Security Africa Magazine Feb 15

SA January/February 201514

following an incident, a report can be generated showing which keys are back in the system and which keys are still outstanding and who last accessed them. Together with the audit data from an access control system, a key control system’s reporting system provides a strong evidence trail.

Convenience: Regardless of the number of key cabinets in the system, their location or configuration type, the procedure for accessing the cabinet is always the same. Keys stored in the cabinet can be accessed only by authorized individuals with an approved user code, an access identification card or a pre-registered biometric fingerprint. If the criteria entered matches the information stored in the system database, the key cabinet will unlock and the necessary key can be removed or returned. The other keys will remain locked into place and the activity is automatically recorded.

Solutions for key security, key control and key management can be tailored to the various needs of the user, including the flexibility to have different levels of security (i.e. dual or triple authentication) in different areas of the premises. Cabinet doors may be solid steel or they may be see-through polycarbonate material. Choices for modules to fill the cabinets may include a selection of mechanical key storage modules, key card modules, lockers of various sizes or simply blank modules to be filled at a later time. The combination of modules is entirely

up to the user, offering the ability to customize and also change the system to meet specific needs.

Other system conveniences may include large touchscreens on the front panel with buttons and an easier to use interface with step by step instructions. Keys available for access can be called up on the touchscreen along with information about the location of a specified key, what keys have not been returned and when the key will become overdue. Messages can be created that will pop up when a particular key is requested; for example, a message reminder that sterile suits must be worn when one is entering a research lab.

Added features that help make a system easier and more efficient for everyone to use may include illuminated key slots to locate keys and random return capability (i.e. return to any key slot in the cabinet or in the system). As an added safety measure, alarms can be triggered for certain predetermined circumstances such as the use of force to gain access or remove a key, invalid user codes, a door left open for more than 10 seconds after use, power failure, a key missing or not returned on time or a key returned by the wrong user.

In today’s highly security conscious environment, the networking capability of advanced key control systems adds tremendous value to key management systems and allows best-of-breed solutions to be implemented without costly upgrades or overhauls.

SECURITY NEWS

Page 15: Security Africa Magazine Feb 15

Storacall TeleAcoustics

To download the new brochure showing the latest range of Telephone Hoods , Cabinets, Kiosks and Environmental Phones please visit:

www.teleacoustics.co.uk

Sound Solutions

Storacall Voice Systems Two-Way Radio CommunicationsRecording

With over forty years experience in the call recording industry and a client list that includes Government agencies, emergency services and the transport sector, Storacall are a natural choice for secure and reliable recording of radio tra�c. In addition Storacall has particular experience with call recording applications in the oil and Gas industry Working with market leaders in the radio industry, Storacall o�ers a range of scalable systems suitable for use in the most demanding of environments. Supporting from 4 to 400 channels of Analogue, Digital UHF, VHF or IP radio with integrations to Telephones Hotlines, Intercoms, Phone systems, PAGA systems, Dispatchers Tetra and RoIP. All models provide a cost e�ective encrypted and secure recording

Storacall TeleAcoustics Ltd is a supplier of specialist telecom products to the government, utilities, financial, manufacturing, oil and gas industry in the UK and around the world.

The company manufacture and distribute acoustic telephone hoods, 'Hippo' telephone cabinets, industrial telephone kiosks, marine enclosures, pedestals, weatherproof telephones and tough internal telephones.

For further information, please contact The TeleAcoustics Sales Team: Tel: +44 (0)1242 578815 Email: [email protected]

See details of our range of call recording systems here www.storacall.co.uk or for a full information pack or to discuss a possible application please call +44 (0) 1932 710710 or e-mail [email protected]

Storacall Voice Systems Ltd | Swan House | Windmill Rd | Sunbury on Thames | Middlesex | TW16 7DT

Robust communications monitoring and recording for IP, digital and analog two-way radio interfaces

Page 16: Security Africa Magazine Feb 15

SA January/February 201516

One of the key reasons for recent evidence of an increased investment in open standards and IP-based video management systems by the retail sector in EMEA has been

the fact that technology providers are now able to demonstrate rapid Return on Investment (ROI).

Put simply, a new breed of video management software (VMS) offerings (including XProtect® product line by Milestone Systems) can integrate very effectively with retail Point of Sale (POS) systems to deliver high resolution video recordings on-screen, alongside known ‘high risk’ transactional events. This makes discovery and analysis of irrefutable evidence much easier than it used to be. Retailers need to bear in mind that three-quarters of all their retail shrinkage comes from shoplifting combined with employee theft. With this in mind, it’s clearly worth taking a closer look at the benefits of gaining access to easily searchable, time-stamped video evidence, alongside specific transactions and till receipts. We know that this capability reduces loss prevention as we have seen it in action across many high profile customers around the world. Milestone has helped one of our customers to reduce its shrinkage

from 0.81% to just 0.44% within the first 2 years after installing the system and in so doing, the number of employees caught in the act improved fivefold.

Global fashion retailers such as Paul Smith and Prada have invested in Milestone VMS in their stores around the world to help reduce shrinkage and provide a platform for tapping into additional operational efficiencies in the future. One large Danish chain, has reduced shrinkage across all its stores while also increasing staff job satisfaction and morale because they are now able to determine who is consistently loyal and honest at work.

Loss prevention benefits aside, when retailers consider the business intelligence that the latest video management systems deliver the business case becomes clearer still. Your investment in Milestone VMS and our analytics software eco-partners can now deliver extremely valuable business intelligence day-in/day-out, to improve the customers’ in-store experience and help retailers realise (as yet undreamt of) additional operational benefits long into the future. So if you have not already considered using your IP Video Surveillance system to deliver business benefits beyond loss prevention then it is high time to do so.

IP video to reach global tipping point

SECURITY NEWS

Page 17: Security Africa Magazine Feb 15

THE PERFECTMATCH

Combining its award-winning video management software with high-performance hardware, Milestone Systems now offers the Milestone Husky™ Series, available in three models – use one asa simple standalone or connect multiple models and choose from more than 50 options for a truly customizable and scalable solution. The series is compatible with thousands of cameras and supports Milestone services such as Customer Dashboard to enable your installer to monitor the health of your system and proactively resolve technical issues. Milestone Husky appliances make it easy to find a configuration to meet the needs of any surveillance solution!

Learn more: www.milestonehusky.com

Milestone Systems Southern AfricaEmail: [email protected]

Why stop at software?

Husky ad English_A4.indd 1 19-02-2015 11:17:13

Page 18: Security Africa Magazine Feb 15

THE DEFINITIVE EVENT FOR THE SECURITY MARKET IN THE WEST AFRICAN REGION

THE TOP 6 REASONS TO BOOK YOUR STAND AT SECUREX WEST AFRICA 2015

Generate high quality sales leads Build and maintain existing and new customer relationships

Build on your prospective database

Launch and demonstrate your company’s newest products and innovation

Meet your market face-to-face

Create new business opportunities through greater brand presence

www.securexwestafrica.com

FOR MORE INFORMATION OR TO BOOK A STAND PLEASE CONTACT THE RELEVANT PERSON FOR WHERE YOUR COMPANY IS BASED:

General Enquires Tori AbiolaManaging DirectorTel: +234 809 5050 568Email: [email protected]

Mark AndersonCommercial Sales Manager

Exhibition Enquiries

Tel: +27 82 891 4271Email: [email protected]

65% of standsold!

Page 19: Security Africa Magazine Feb 15

SHOW AFRICA 201510 - 11 March 2015Sandton Convention Centre, Johannesburg South Africa

Where Africa meets to discuss the challenges and future of cash management

Contact Kate on +27 (0) 11 516 4018 or email katherine.marriott@ terrapinn.com www.terrapinn.com/cashhandlingafrica

Page 20: Security Africa Magazine Feb 15

SA January/February 201520

Judi

th A

dele

A pirate attack that killed a super-tanker crewman off the coast of Nigeria on 2nd February has highlighted a growing threat off oil-rich West Africa, as vessels

carrying millions of barrels of crude navigate the Gulf of Guinea, now known as “pirate alley”.

The 2 million barrel Kalamos Very Large Crude Carrier (VLCC) was heading to Nigeria’s main oil terminal when it was attacked late on Monday, leaving the ship’s Greek deputy captain dead and three crew members taken hostage.

In January, a Nigerian seaman on an oil support ship, MV Jascon, was killed and last year a crew member was killed on tanker SP Brussels.

Security experts say the waters off Nigeria are now the deadliest on earth, surpassing Somalia on Africa’s east coast, which gained notoriety due to months-long hijackings, high-cost ransoms, and U.S.-led rescue missions such as the one that inspired Hollywood movie “Captain Phillips”.Cyrus Mody, assistant director of the piracy-tracking International Maritime Bureau said the waters off

Pirate Alley: Another Deadly Attack

Nigeria are now the deadliest in the world “by any length”, despite attention still focused on Somalia and the Gulf of Aden. “[The Gulf of Guinea] is not perceived as bad as it is,” Mody said.

Mody said incidents in the region were hugely underreported due to fear of further attacks, concerns over insurance or a belief that information on vessels is sensitive or proprietary.

Oil tankers make relatively easy targets for Nigerian-based pirates who usually want hostages to ransom, but will also sell stolen fuel. Security experts say the pirates have emerged from militant groups in Nigeria’s oil-producing Niger Delta, such as the Movement for the Emancipation of the Niger Delta (MEND).

These groups have long targeted oil infrastructure and foreign companies in the region, arguing the Niger Delta has been left impoverished despite production of almost 2 million barrels of oil per day in Nigeria.

The situation is further complicated by the government’s ban on foreign armed guards in its waters - a method that has been used to deter

Judith Adele

PIRACY

Page 21: Security Africa Magazine Feb 15

SA January/February 2015 21

Attacks in the high risk area have fallen precipitously in the last two years

pirates off Somalia and Yemen. Every month now, thousands of weapons pass through the Indian Ocean and hundreds of security teams rotate on and off ships in the Gulf of Oman.

The last hijacking and ransom of a merchant vessel by Somali pirates was in 2012. The international shipping industry spent around $1 billion on armed guards and equipment in the Indian Ocean according to `Oceans Beyond Piracy’, a non-profit group based in Colorado. Attacks in the high-risk area have fallen precipitously in the last two years.

Collaboration between the heads of security of oil and gas companies and suppliers to the industry

will help minimise security challenges in West Africa, according to Doug Byers of shipbuilding and maritime solutions company Nautic Africa.

The Corporate Security Forum (CSF) conference in London , October 2014, discussed the security challenges and ‘tools’ to deal with them.

“These tools include having high-speed and ballistic-protected vessels such as Nautic Africa’s Sentinel range, which provide a safe haven against small firearms and have the ability to outrun the pirates,” noted Byers.

The floating armouries used to deter piracy in East Africa, have raised concerns because of lack of regulations and the risk that terrorists could target vessels. In a 2012 report, the U.N. Security Council committee on Somalia and Eritrea said that the armoury business was “uncontrolled and almost entirely unregulated, posing additional legal and security challenges for all parties involved.”

It remains to be seen whether the Nigerian delta oil industry can provide viable solutions to the growing threat on the western African coast. SA

PIRACY

Page 22: Security Africa Magazine Feb 15

SA January/February 201522

With the Internet of Things (IT) continuing to be a hot topic throughout 2014 and across all industries -- whether it’s about smart cars or intelligent appliances such

as connected refrigerators -- more consumers and businesses are now aware of the advantages of being connected to the internet, and so should the security professionals and business owners who are trying to ensure the safety of their organisations.

As many professionals in the security industry predict, the new HD standard ‘4K Ultra HD’ is a natural next step in the industry’s ongoing strive towards more image details and larger coverage from a security camera.

“4K for surveillance purposes is expected to take its full effect in 2015 and beyond,” says Roy Alves, regional business development manager for Axis Communications. “Image quality is a core consideration and while everyone is talking about 4K, the real challenge is to optimise image quality for the surveillance task at hand, no matter how bad the light or what the ambient conditions are.

“Innovation in this area —technology that enhances image quality for advanced video applications — will be a key industry driver. However, the advancements in image quality have created bigger pressure on managing the resources to support them. For example, they can have a significant impact on network bandwidth and storage requirements, increasing the need for more effective compression methods.” This is when video surveillance-as-a-service

Game changing trends for video surveillance

(VSaaS) becomes useful for managing and archiving video footage captured by surveillance cameras onto cloud storage, says Alves.

Video surveillance systems can be a powerful tool in preventing or investigating crime when installed in locations such as shopping malls, parks, banks, airports, and other public transport. Some of the rapidly increasing demands for video surveillance systems has been driven by the growing safety and security concerns worldwide.

Cloud computing might have been a favorite buzzword in IT circles for several years, but the new era is very much upon us now. Whether in a public environment, where tenancy on servers is shared with other customers, or in a private environment, where your data and applications are the only ones on a system, cloud computing brings three advantages to your network -- redundancy, scalability and shifting costs from capital expenditure (CAPEX) to operating expenditure (OPEX). Depending on whether the cloud is hosted or run internally, there may be the added convenience of leaving upgrades, updates and patches -- routine maintenance -- in the hands of a third party.

Scalability doesn’t just factor in if more cameras are needed. It also enables access to more computing power and storage if, for example, higher resolution or faster frame rate is needed. If analytics on the

Video surveillance-as-a-service (VSaaS) and Cloud Computing

The three Vs of big data -- volume, velocity, and variety -- can provide vital information during a crisis by providing the right data

SECURITY NEWS

Page 23: Security Africa Magazine Feb 15

SA January/February 2015 23

video data collected is needed for customer traffic pattern analysis, for example, the processing capacity is there and is only paid for when needed.

Better functioning analytics running on the edge are also appropriate for critical infrastructure applications. The extra computing power could be used to store half a million license plates numbers and capture plates from cars driving past at 40 kilometers per hour, for instance.Another interesting aspect of VSaaS is that it offers users the possibility to add additional services to their video surveillance – such as guard force or remote monitoring services.

Analytics technology is also considered to finally take off within the surveillance industry from 2015 and beyond for getting valuable insights from the enormous amount of both structured and unstructured information collected (also known as big data). With network cameras’ capability to provide higher resolution video and to be connected from everywhere and around the clock, security departments are getting more information from more sources.

More analytics are needed to help organisations make sense of the tremendous amount of information including unstructured data such as images and videos. More intelligent applications are needed to help categorise and interpret the information, so it can be turned into actionable insight.

“The three Vs of big data -- volume, velocity, and variety -- can provide vital information during a crisis by providing the right data at the right time,” says Alves. “By starting with more factual data, such as surveillance data, physical access control data, and cyber activity information and then building useful associations, costs can be reduced by searching for the most relevant information.”

This is where the IP revolution changes the surveillance camera from a forensic tool aimed at solving problems after an incident has occurred to becoming a vital part of a proactive chain. Video images can be used in conjunction with analytic horsepower to discover customer traffic patterns in a retail outlet, dwell time at certain displays or isolate bottlenecks. Mash that up with other structured and unstructured data sources including transit schedules, lists of promotions, pricing data from your competitors, social media, and a skilled data scientist can tease out patterns and relationships that you never knew existed. And that is a significant competitive advantage.

Analytics, business intelligence (BI) and big data

SECURITY NEWS

Page 24: Security Africa Magazine Feb 15

SA January/February 201524

Video compression technologies are about reducing and removing redundant video data so that a digital video file can be effectively sent over a network and stored on computer disks. With efficient compression techniques, a significant reduction in file size can be achieved with little or no adverse effect on the visual quality. The video quality, however, can be affected if the file size is further lowered by raising the compression level for a given compression technique.

There are several video compression standards including Motion JPEG, MPEG-4 Part 2 (or simply referred to as MPEG-4) and H.264 -- being the latest and most efficient video compression standard and already the standard in video surveillance as well as many other industries, such as entertainment.At the same time, the ongoing improvement in cameras regarding image resolution and light sensitivity for example, also increase the data output from the cameras – putting higher demands on the efficiency of the video compression. Video surveillance manufacturers need to balance the upsurge in resolution with improvements also to H.264 compression algorithms – to make sure costs for network bandwidth and storage do not spiral out of control. A combined effort of

working on noise reduction methods and bit rate reduction should be in parallel with investigation new video coding to get the best results.

Beyond improvements in current H.264 compression, an interesting future technology is H.265, which is rapidly gaining interest in the broadcast industry. H.265 can reduce bandwidth and storage demands significantly (up to 50%) under the right circumstances and the technology can be expected to be introduced also in the security industry during the next few years. It is likely to be first deployed in high-end, high-resolution cameras, and it is expected that H.264 and H.265 will co-exist for quite a long time in the industry.

“At the end of the day, higher quality of images and videos such as 4K needs to be supported by the right technologies in the background for organisations to get the most out of the data, which can then be turned into useful insight not only for security purposes, but also for efficiency and gaining business advantages. This should be the key consideration for everyone who is looking for the next big thing in surveillance,” Alves concludes.

Video compression and bandwidth usage

At the end of the day, higher quality of images and videos such as 4K needs to be supported by the right technologies in the background

SECURITY NEWS

Page 25: Security Africa Magazine Feb 15

The future of the African security and fi re industry

A 21 year heritage meets a new era of fi re and securityTop 5 reasons to exhibit:

Reach over 6000 key decision makers | Build your brand | Educate and develop your channel to market| Showcase your products and services | Secure new business

Exhibitor Profi le:Access control • Biometrics • CCTV Surveillance • Communication equipment • Consulting • Control rooms • Cyber security • Critical infrastructure • Electronic security • Fire prevention & protection solutions • Guarding services • Intruder detection • IP Security • Perimeter fencing • Perimeter security • Physical security • Safety • Scanners • Vehicle and personal tracking devices• Cash in transit • Asset tracking • Vehicle security

#IFSECSA @IFSECSA

To book your stand please visit www.ifsecsa.com

Organised by:

Part of: Running alongside: Media partner:

Supporting media partners:

IFSEC2015_297x210+3mm_Exh.indd 1 24/10/2014 10:41

Page 26: Security Africa Magazine Feb 15

SA January/February 201526

With the world’s largest security, safety, and fire protection trade show over for another year, it’s time to take stock of Intersec 2015. Featuring 1,250 exhibitors from 54

countries, there was an impressive line-up of big names and exciting news of industry trends.

Having exhibited on partner stands in previous years, Paxton, the UK market leaders of electronic IP access control and door entry equipment, showcased its own stand located in the British Pavilion.

Hundreds of security professionals visited Paxton’s stand to learn about its innovative and intelligent product offerings, including its award-winning Net2 access control range. Visitors were introduced to the company’s free training and installer focussed workshops which launched in the UAE in 2014.

The Certified Paxton Installer Programme has trained over 4000 installers from 2000 companies globally since January 2014, highlighting the company’s

international presence and its commitment to engaging effectively with the market place.

Dan Drayton, Paxton Access Ltd Sales Manager says: “Intersec provided us with a great opportunity to meet with existing and prospective customers.

Visitors were eager to learn about Paxton’s product line-up, training and the support we offer. We value our customers’ feedback, it is key to developing products and solutions that are flexible and right for the market.

It was great to receive such a positive response from visitors, and shows that Paxton’s name is at the forefront of installer’s minds. It’s an exciting time for us and the market here is a great place to be.”

Paxton’s award winning access control is simple, scalable and suitable for projects of any size. Products will be available to purchase through the company’s dedicated network of UAE distribution partners, Mayflex, Anixter, Norbain and NIT.

Paxton Step into the Limelight at Intersec 2015

ACCESS CONTROL

Page 27: Security Africa Magazine Feb 15

SA January/February 2015 27

Paxton: Company OverviewThe Certified Paxton Installer Programme is a one day access control workshop that covers both the commercial and technical elements of selling and installing access control.

The course includes teaching installation techniques as well as fault finding and more general information of the administration and use of the system.

The workshop includes a short lecture followed by a practical hands-on sessions to allow installer to familiarise themselves with the product.

For more information please visit:

www.paxtonaccess.co.za

To sign up to the Certified Paxton Installer Programme please visit:

www.paxtonaccess.co.za/training-request-za.asp

The Paxton Group is a global access control designer and manufacturer with a strong focus on installer training and education. Launching in South Africa earlier this year, its unique product offering, coupled with its fresh approach to educating the security industry, underlines why Paxton is on its way to becoming a market leader.

The Certified Paxton Installer programme is comprehensive and simple, offering free workshops across the country. Training focuses primarily on the installer, giving them the opportunity to learn about Paxton products from the experts and familiarise themselves with all the benefits the products offer. This enables them to deliver security solutions that better meet the needs of end users and ensures they are confident with the product when recommending it to customers.

Steven Woodbridge, Training Manager at Paxton, said: “The training programme aims to equip installers with the knowledge and skills to install confidently and correctly first time. There is a double benefit with this as it means less time on site for the installer, increasing their profit, and greater customer satisfaction as the workplace is facing more minor disruption.”

Riaan Van Der Merwe, Sales Executive at Paxton, has 19-years’ industry experience, previously working for a South African-based installer. He believes that the practical approach to training differentiates Paxton from other companies in the security market.

He said: “Paxton’s offering is new to South Africa and the key to our success so far is because trainees are being engaged and getting hands-on with the product. “This is a smart and forward thinking strategy as it is creating demand for our products and the feedback from installers has been very good. This is encouraging given the fact we only launched into the market in March.”

The first phase of training seminars in South Africa have been well received with 100 per cent of installers saying they would recommend it to a colleague.Steven added: “Whether the installer is from an intruder alarm background or their core

Paxton Certified Installer Programme

business is networked products, our objective is to cater for all levels and backgrounds, whilst keeping the material we deliver consistent.

“Each session varies slightly depending upon the audience attending. However, the same important key information are delivered throughout the day.”

ACCESS CONTROL

Page 28: Security Africa Magazine Feb 15

SA January/February 201528

Gemalto world leader in digital security, announces the opening of an office in Abidjan, Côte d’Ivoire, to better meet the needs of its customers

on the ground throughout West Africa.

This move is part of the Group’s strategy of being a global player with a local presence, as demonstrated by its 85 offices in 44 countries worldwide. It also adds to Gemalto’s presence in Africa through its offices and partnerships, in particular in South Africa, Gabon, Ghana, Morocco, Burkina, Kenya and Nigeria.

The new information and communication technologies market in Côte d’Ivoire accounts for nearly 10% of the GDP of the country, which has a cell phone penetration rate of more than 90%. This new location will therefore aim to further foster the digital development of the local economic fabric. This genuine technology hub will leverage skill transfer and the pool of engineering excellence available in the country.

“Gemalto is playing a key role in the digital revolution taking place in Africa, and has already demonstrated its position as a major player in the field of telecommunications, banking services and governmental programs,” noted Eric Claudel, President of Africa & Middle East for Gemalto.

“This new expertise and engineering hub will allow the implementation of an inverted innovation process, repurposing existing solutions to meet the needs and specificities of the local market. It also aims at designing Côte d’Ivoire’s products of tomorrow, in line with its president’s priority to turn it into an emerging country by 2020.”

Gemalto is the world leader in digital security with 2013 annual revenues of €2.4 billion and

more than 12,000 employees operating out of 85 offices and 25 research and software development centers, located in 44 countries.

We are at the heart of the rapidly evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain and work – anytime, everywhere – in ways that are enjoyable and safe. Gemalto delivers on their expanding needs for personal mobile services, payment security, authenticated cloud access, identity and privacy protection, eHealthcare and eGovernment efficiency, convenient ticketing and dependable machine-to-machine (M2M) applications. We develop secure embedded software and secure products which we design and personalize. Our platforms and services manage these products, the confidential data they contain and the trusted end-user services made possible.

Our innovations enable our clients to offer trusted and convenient digital services to billions of individuals. Gemalto thrives with the growing number of people using its solutions to interact with the digital and wireless world.

For more information visit: www.gemalto.com, www.justaskgemalto.com, blog.gemalto.com, or follow @gemalto (http://twitter.com/gemalto)

Gemalto expands its presence in Africa

About Gemalto

SECURITY NEWS

Page 29: Security Africa Magazine Feb 15

SA January/February 2015 29

A third bridge crossing the lagoon in Cote d’Ivoire’s commercial capital, Abidjan, has been opened to the public. It is the first major infrastructure project completed in

the city since the 2003 post-election dispute

After more than ten years of internal conflict Cote d’Ivoire is forging ahead with plans to re-establish its important commercial city and main port. With 20.32 million people and a GDP of 32$ billon (USD) it is the largest economy of the UEMOA (West African Economic and Monetary Union).

Opened on December 16, 2014 the Henri Konan Bédié (HKB) Bridge is an enabler for urban mobility in the Ivorian economic capital. Donald Kaberuka, President of the African Development Bank (AfDB) Group, opened the bridge with a speech on behalf of all the funders involved in the project. The Ivorian Head of State, President Alassane Dramane Ouattara, and his predecessor, Henri Konan Bédié, after whom the new bridge has been named were also present.

The project cost 308 million euros, 20% of which (58 million euros) was provided by AfDB (African Development Bank) within a public-private partnership (PPP). Mr Kaberuka said that the bridge embodied the proven expertise of the Bank in the field of infrastructure, “Through interventions of this type here in Côte d’Ivoire, in Senegal, Nigeria and other African countries, AfDB has built up experience that now enables us to overcome these challenges.’“This bridge, like many others in Africa where the AfDB has been involved, also points to this emerging

Africa, in spite of difficulties and challenges in places,” Kaberuka said. Cote d’Ivoire has relatively good infrastructure compared to other UEMOA states (which includes Benin,Burkina Faso, Guines Bissau, Mali, Niger, Senegal and Togo) and has untapped ore reserves ready for extraction.

In November 2014, Amara Mining, announced it will invest $400 million over the next two years to build one of Africa’s largest gold mines at its Yaoure property in Cote d’Ivoire with production due to start in 2017. Freedom from Ebola (the country controversially closed borders to neighbouring Libera, Sierra Leone and Guinea to prevent spread in 2014), improving communication links such as the bridge and cheap electricity mean that Cote d’Ivoire can offer companies reasonable profits despite drop in world prices for the ore.

The Ebrie Lagoon cradling the city of Abidjan in Ivory Coast was once known as the “pearl” of lagoons. Framed by palm trees, the 130 km long lagoon graced the front pages of tourist brochures in its day, being Abidjan’s most important harbour. But since the 2002 – 2003 civil war, the “pearl” of lagoons has become highly polluted and is now known as the “poison of lagoons”.

Pollution caused by toxins and rubbish has severely affected the 2.8 million people living close by. They rely on the lagoon’s water for drinking, household use and other necessities. At a cost of US$61-million, all hopes are that when the clean-up is completed in 2017, Ebrie will once again grace the covers of tourist brochures.

Third bridge opens in Cote d’Ivoire

Judith Adele

SA

CONSTRUCTION

Page 30: Security Africa Magazine Feb 15

Store, manage and control keys, cards and small assets more securely and efficiently with

KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with

detailed reports available. The system will even automatically email transactional information to any

user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys

easier than ever. With our modular design and full scalability, it’s easy to see how we keep making

key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 1.203.264.4949

6104MP-5_SecurityAfrica.pdf 1 10/29/14 2:51 PM

Page 31: Security Africa Magazine Feb 15

Store, manage and control keys, cards and small assets more securely and efficiently with

KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with

detailed reports available. The system will even automatically email transactional information to any

user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys

easier than ever. With our modular design and full scalability, it’s easy to see how we keep making

key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 1.203.264.4949

6104MP-5_SecurityAfrica.pdf 1 10/29/14 2:51 PM

For participation and enquiries please contact:

For more details, please visit www.securingasia.com

GLOBAL ENERGY & SECURITY SUMMIT

2015

After successfully hosting three Securing Asia summits, we are delighted to announce the dates for the next summit. Securing Asia & Africa 2015 will be held at the Harte & Garter in Windsor on the 13th & 14th July 2015. This elegant 19th Century building sits in an enviable position opposite the famous Windsor Castle.

In 2015 this unique platform will focus on energy and security of critical infrastructure which plays a signi�cant role in today’s world. It was acknowledged that critical infrastructure protection and energy security are one of the highest priority areas. In order to deal holistically with the challenges in critical infrastructure security the summit is going ahead with a special focus on energy and security of energy infrastructure.

Amongst others, the summit will focus on:• GEO-POLITICS OF ENERGY • ENERGY SECURITY

• CRITICAL ENERGY INFRASTRUCTURE • REGULATIONS

Who should attend?• Energy companies• Energy suppliers• Producers• Distributors• Regulators• Government officials• Security product/services

Rashank Sangra E: [email protected] T: +0203 5671 460

Tamana Faizi E: [email protected] T: +0203 5671 460

Why attend?• Understand & explore emerging markets in Energy• Showcase cutting edge technologies• Actively engage and interact with industry experts,

policymakers, government & private buyers and businesses

G2B Meetings NetworkingConference Exhibition

Page 32: Security Africa Magazine Feb 15

SA January/February 201532

A biometric card quickly reads the user’s fingerprint in less than a second.

More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know, that

for $200 or less, their proximity system can be violated.

After all, proximity systems do not offer a challenge response; they only use passive authentication. The card simply sends the exact same 32 bits each time. A proximity card is easy to mimic. Just record an AM broadcast and replay it. An AM transmitter costs only $30 to build.

It is straightforward to read a proximity card from close range with standard lab equipment. The card can also be easily read from several feet away. Inexpensive card sniffing devices can be bought online that will effortlessly pull the card number and replay it at critical access points.

Meanwhile, they have a slew of proximity readers installed and the CFO is not going to be happy to hear they need to tear out all your proximity card readers to secure their facilities. Add a PIN, someone advises. That means adding keypads to all the readers, which means

there needs to be some type of switch out plus, as everyone knows, PINs have security issues of their own.Adding Biometrics Will Help Secure the Facility - But, At What Cost?

Only biometrics provides the solution for authenticating “who” is at the door and stopping sniffing. In a perfect world, facilities would have a biometrics reader at every door that would need higher security. Of course, that would still mean ripping out the present proximity card readers and having to budget the money for new biometric readers plus the investment of making sure that the biometric integrates into the present access control system. However, what if the biometric was put directly

Biometric Cards Improving Security

BIOMETRICS

Page 33: Security Africa Magazine Feb 15

SA January/February 2015 33

No longer do security professionals need to worry about quickly replacing their proximity card readers

on the card? The proximity card credential with on-card fingerprint reading would provide all the assets of the proximity card and eliminate its most glaring deficiencies, not knowing who is holding it as well as eliminate the problems of sniffing.

A biometric card quickly reads the user’s fingerprint in less than a second. Eliminating the problems of solely deploying proximity cards, the wirelessly powered biometric card lets users authenticate themselves directly on the card through something they are, a fingerprint or thumbprint. Only then will the card system activate the lock. This is much more secure than simply using a standard proximity card, which verifies only something the user carries and can easily be duplicated.

The precept is simple. An on-card fingerprint scanner with 3D capacitive technology resides on the contactless card which has universal compatibility with all ISO 14443 readers (the standard contactless card reader) from the leading brands. The biometric card is DESFIRE EV1 and MIFARE Classic compatible, meaning it works with proximity card readers as well as smart card readers. Without having to change out an organization’s existing readers, the biometric card provides an easy,

low cost way for security manager to provide a biometric upgrade to access control systems using card readers.Importantly, the biometric card is more secure to use than other available ID and authentication solutions on the market today. The fingerprint data is captured by the on-card fingerprint scanner and is stored only inside the card. No exchange of data is conducted with external systems. This provides secure template management since the fingerprint never leaves the card.

It also eliminates user concerns with privacy issues. The card is unique to the user and only the authorized card holder can activate card communication with the reader. When a positive match occurs, the biometric card activates communication with the lock or reader in the same way as other ISO 14443 contactless smart cards.Problem Solved - Keep Using Your Proximity System

No longer do security professionals need to worry about quickly replacing their proximity card readers to secure their facilities. With a biometric proximity card (or biometric smart card) security managers and their integrators can use biometrics on high security openings, such as a hospital pharmacy, IT server room or special research lab, without having to switch out their proximity readers for biometric readers.”

Biometric cards can be issued to key staff and personnel providing the enhanced security benefits of 2-factor biometric authentication without any changes to their existing access control system software or proximity readers. Administrators simply add the biometric card into their system in the same way they incorporate their present proximity cards, all the while extending the life and return on investment of their installed proximity card systems. SA

BIOMETRICS

Page 34: Security Africa Magazine Feb 15

SA January/February 201534

The government estimates that a small part of the Karoo shale gas fields could meet about half of South Africa’s electricity needs for the next 20 years. U.S. estimates give South Africa

the world’s eighth-biggest shale reserves, with nearly two thirds the deposits estimated in the United States.

The southern Main Karoo Basin is considered to be the most prospective area for shale gas in South Africa, due to the presence of deeply buried, thermally mature black shales. To date, exploration right applications have been received from Shell International, Falcon Oil and Gas in partnership with Chevron, and Bundu Gas.A Shell-commissioned study by Cape Town-based consultancy Econometrix suggests extracting 50 tcf of gas would add $20 billion, or 0.5 percent of GDP, annually for 25 years to an economy that has always been a major energy importer. Shell says it is committed to investing $200 million in gas exploration in the area, which lies at the underdeveloped heart of Africa’s most advanced economy.

The study also suggests it would create 700,000 jobs, a major draw for a government

trying and failing to come up with answers to persistent 25 percent unemployment.

Jeremy Wakeford, chairperson of the Association for the Study of Peak Oil South Africa, said that the falling global energy prices have put oil companies under pressure to rethink investments but exploratory drilling in the Karoo is expected to go ahead.

“Timelines presented by the department of mineral resources to the National Council of Provinces in

South Africa to grant exploration licences for Karoo gas fields

Low rainfall levels and high evaporation make South Africa the 30th driest country in the world

John Fisher

OIL AND GAS

Page 35: Security Africa Magazine Feb 15

SA January/February 2015 35

October 2014 indicate that the regulations for shale gas exploration will be published in the Government Gazette in February 2015. Exploration licences would then be granted from July 2015 and exploration could commence immediately thereafter,” Wakeford added.Opponents point out that the majority of the unemployed in the area are also unskilled and are unlikely to receive any jobs needed for the technical drilling operations. Fracking could also threaten regional food security by destabilizing meat and crop production that occurs in the Karoo, which feeds some of the poorest people of South Africa.

Low rainfall levels and high evaporation make South Africa the 30th driest country in the world, which is especially concerning to many opponents of fracking given the semi-desert environment of the Karoo. Local villages are especially vulnerable to water shortages, often depending on a small number of wells for drinking, washing, and irrigatingNevertheless South Africa has a problem providing electricity to sustain its current domestic demand. 90% of electricity in South Africa is generated using coal, which many see as unsustainable, and even coal-

generated electricity is unable to reach over 10% of the population. They are also dependent on foreign imports for crude-oil needs with 70% imported.

In 2013, the EIA estimated that there were 1.37 trillion cu/m of shale gas reserves in South Africa. Shale gas would mainly be used to produce electricity and not fuel.

Some characterize fracking as a more sustainable energy solution, avoiding the costs of emitting greenhouse gases into the atmosphere, of which South Africa is considered one of the “worst offenders globally.” Proponents are eager to meet the South African promise to reduce harmful gas emissions by 34% by 2020. SA

Shale gas would mainly be used to produce electricity

OIL AND GAS

Page 36: Security Africa Magazine Feb 15
Page 37: Security Africa Magazine Feb 15

SA January/February 2015 37

Following the loss of America’s market for its crude oil last year, China has stepped forward to fill the gap by pledging to buy more oil from Nigeria.

World prices have been falling since June but the pace of the slide accelerated in November when the Organisation of the Petroleum Exporting Countries (OPEC) decided to maintain its production unchanged at 30 million barrels per day. Analysts say that richer OPEC members like the UAE have been ready to accept the price fall in the hope that it will force higher-cost shale producers out of the market.

Speaking in January this year, the country’s Deputy Chief of Mission in Nigeria, Mr. Zhang Bin, announced that the Chinese government is looking forward to importing more of Nigeria’s oil, reported the News Agency of Nigeria (NAN.

Zhang said China was interested in Nigeria’s oil and that when President Goodluck Jonathan visited China in 2013, the country discussed the possibility of importing more oil from Nigeria.“And I think we are working on this and we hope that the Nigerian side would allow us to import more.

“Actually what we are looking at is improved economic cooperation between the two countries, we are the third largest trade partner with Nigeria”, he said.

He also said the trade volume between Nigeria and China in 2014 exceeded $16 billion, but his country was looking at possibilities of

improving balancing of trade with Nigeria.

Zhang said the figure exceeded that of 2013, which he put at $13.5 billion. He said: “In 2013, the trade volume between Nigeria and China was $13.5 billion and then according to our statistics, from January to November 2014, the trade volume already amounted to $16.47 billion.

“So that means that in the first 11 months, the trade volume exceeded that of the year 2013, which indicates an increase of 35 per cent over the previous year. We do have this problem of trade imbalance and the Chinese side is going all out to solve it.”

“One of the solutions is that we encourage more Chinese enterprises and companies to import more from Nigeria, especially agriculture products and also some of the manufactured products.”

The envoy explained that a few years ago, China started importing cassava and some agriculture products like cocoa and palm oil from Nigeria.

Zhang said due to the joint efforts of both sides, imports into China from Nigeria had increased by a large margin last year. In the first 11 months, there was an increase of 93.7 per cent in China’s imports from Nigeria, claimed Mr Zhang, adding that the import percentage was almost doubled.

The Chinese official said his country encourages its companies in Nigeria to invest in telecommunications, agriculture, automobile assembling, food processing, energy, mines and solid minerals.

Zhang said China’s competitive telecommunication companies like Huawei and ZTE currently supply the Nigeria’s network operators with terminals and broadband. Zhang revealed that the business volume of just one Chinese telecommunication company in Nigeria for a year was huge, putting it at about $1 billion.

China and Nigeria are also working on other projects like the rehabilitation projects for the Nigerian Railway Corporation and the Zungeru hydropower project in Niger State. SA

Nigerian Oil saved by expanding China

Josh

For

dOIL AND GAS

Page 38: Security Africa Magazine Feb 15

Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222

Email: [email protected] Web: www.advancedco.com

Advanced is a British success story. We design and manufacture world-beating fi re alarm systems in the UK, exporting them to over 60 countries. Where quality and performance are priorities, you’ll fi nd Advanced, including in The Shard.

Our innovations continually challenge the industry. AlarmCalm, our complete false alarm management solution tackles one of the biggest issues in Fire today and gives Advanced customers more options, more confi dence and more peace of mind.

Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222

Email: [email protected] Web: www.advancedco.com

The Standard in Fire Systems

SSD742 Advanced Shard Advert A4+5mm Bleed-v4.indd 1 16/09/2014 15:17

Page 39: Security Africa Magazine Feb 15

SA January/February 2015 39

Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222

Email: [email protected] Web: www.advancedco.com

Advanced is a British success story. We design and manufacture world-beating fi re alarm systems in the UK, exporting them to over 60 countries. Where quality and performance are priorities, you’ll fi nd Advanced, including in The Shard.

Our innovations continually challenge the industry. AlarmCalm, our complete false alarm management solution tackles one of the biggest issues in Fire today and gives Advanced customers more options, more confi dence and more peace of mind.

Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222

Email: [email protected] Web: www.advancedco.com

The Standard in Fire Systems

SSD742 Advanced Shard Advert A4+5mm Bleed-v4.indd 1 16/09/2014 15:17

Water based suppression systems utilize the inexpensive and readily available medium of water to discharge onto flames through a normally fixed piping system.

There are 4 main types of Water based Protection Systems. The hazard / risk to be protected will determine the most suitable type of system you need.

Wet SystemsA wet pipe sprinkler system is fixed fire protection using piping filled with pressurized water supplied from a dependable source (either municipal or connected to a fire pump). Heat sensitive automatic sprinklers spaced and located in accordance with recognized installation standards are used to detect a fire. When a fire occurs, the heat sensing device (located on the sprinkler head itself) operates (fuses) allowing the flow of water.

Upon operation, the sprinklers distribute the water over a specific area to control or extinguish the fire. As the water flows through the system, a flow alarm is initiated to indicate the system is operating.

Only the individual sprinklers activated by heat immediately over or adjacent to the fire operate, minimizing water damage. Since the piping system is normally pressurized with water, the system piping temperature should be maintained above 32°F [0°C]. Please contact Janus Fire systems with any application questions.

Typical areas of fire protection:

> Turbine Underfloors> Cable Spreading Areas> Standard Indoor Areas/Enclosures

Preaction SystemsThese systems require independent detection systems to be used in conjuction with closed pipe sprnkler systems. The detection system may be hydraulic, pneumatic or electric, and may be actuated by smoke, heat, optical detectors, or be manual actuation. Detection systems typically operate before the sprinklers fuse and give an alarm.

Janus Fire: Water Based Suppression Systems

FIRE NEWS

Page 40: Security Africa Magazine Feb 15

SA January/February 201540

FIRE NEWS

Preaction systems are usually supervised with air pressure. The purpose of the supervision is to monitor the integrity of the system. If the sprinkler head is broken or fused, or the piping is network is broken, the pressure will be reduced in the piping and an alarm will sound. There will also be an alarm due to low air supply pressure.There are several types of Preaction Sprinkler Systems:

Non-InterlockAn automatic sprinkler control valve (typically a deluge valve) is activated, by either a sprinkler head opening or the detection system activating. Water is discharged into the piping and is discharged out of the now open sprinkler (if it has opened). Single-InterlockThe detection system activates the automatic sprinkler control valve (deluge valve), allowing water to flow into the piping system. However, if no sprinklers have activated the water remains in the piping without discharging. If sufficient heat is created by the fire, on or more sprinkler heads will activate. This wil allow the water to flow our of the sprinkler and begin to control or extinguish the fire. In addition to a sprinkler opening, a supervisory signal is provided to the control panel indicating a loss of air pressure. Double-InterlockWater is only discharged after two operations have occurred. Both a sprinkler head must open (loss of air pressure) AND a detection device must activate. When both of these things have occurred, then and only then with the automatic sprinkler control valve (deluge valve) open and begin discharging water into the piping system.

Typical areas of fire protection:

> Data Rooms> Control Rooms> Sensitive Equipment Areas> Areas Where Water Could Damage Equipment

Deluge SystemsDeluge systems are used where there are typically fast growing and/or high risk hazards. These types

of environments are best suited for the use of a deluge type sprinkler system or spray system. A deluge system consists of a fixed piping system, a automatic sprinkler control valve (deluge valve) and open-head sprinklers (sprinklers without a heat-sensing device like the aforementioned systems). When the detection system is activated, typically by heat detectors( (due to the type of environment), the automatic sprinkler control valve (deluge valve) will open and introduce pressurized water into the piping and all nozzles will discharge onto the hazard. There is a greater risk of water damage should an accidental discharge occur, as all the nozzles are open.

Typical areas of fire protection:

> Transformers> Equipment Pits> Flammable Storage> Rolling Mills> Oil Heaters> Coal Conveyers

Dry SystemsA Dry Pipe Sprinkler System, as are the other systems noted above, is a automatically operated sprinkler system. is a fire-protection system which utilizes water as an extinguishing agent. The system piping from the Dry Pipe Valve to the heat actuated sprinklers is filled with pressurized air or nitrogen. The system enables the system piping to remain dry until an automatic sprinkler is actuated.

A Dry Pipe System is primarily used to protect unheated structures or areas where the piping may be subjected to freezing. The system can be installed in any structure to automatically protect the structure contents and/or personnel from loss due to fire as with a wet pipe sprinkler system.

When a fire occurs, the heat produced will operate a sprinkler causing the air pressure in the piping system to escape. When the pressure trip-point is reached, the dry-pipe valve opens allowing water to flow through the system piping and through the actuated sprinkler. At the same time a water motor alarm or electric pressure switch to sound an electric alarm. The water will continue to flow and the alarm will continue to sound until the system is manually shut off. SA

Page 41: Security Africa Magazine Feb 15

C

M

Y

CM

MY

CY

CMY

K

Page 42: Security Africa Magazine Feb 15

Recommended