Security you can bank on

October 2013 Integrated Solutions, Financial (Industry)

Keeping money safe, whether physically or online has always been challenging. The draw for criminals is obvious and in the current economic crunch, accompanied by unprecedented unemployment levels, this is escalating as a critical need. Hi-Tech Security Solutions spoke to four industry representatives about what role technology is playing in deterring and preventing theft.

Gareth Dewey, national business development manager, technical, for Protea Coin, said a common trend that companies are leaning towards, regarding staff identification and authentication, is the use of biometric readers. “There are many options available, however, from a cost implication perspective, biometrics seem to have the best ROI.

“The driving force behind biometric readers is to prevent the possibility of buddy clocking and also securing the employees on the premises. Often CCTV cameras can be used to provide visual verification for identification and authentication purposes.”

Ernest Mallett, regional sales director, Sub-Saharan Africa for Tyco Security Products said the company’s focus is on HID iClass and iClass SE with SIO biometric readers in high-risk areas for authentication. “Some of the financial services sector companies have opted for a more secure approach by using TripleDes encrypted RS-485 readers with compatible cards. In both cases, our focus is to eliminate opportunities for card cloning and Wiegand sniffing. Done correctly it’s almost as good as biometric authentication at a lower price.”

Roy Alves, business development manager, MEA at Axis Communications said: “There is a drive to correlate access control with video. The latest iPhones have fingerprint access technology and it’s just a matter of time before all your financial transactions will require your fingerprint.”

Grahame Saunders, divisional manager of the public safety division at NEC Africa commented that in terms of logical access, biometrics is being used to safeguard data in banks and for online transactions. These systems have the ability to be used for both audit and forensic evidence purposes. Users may be requested to sign on not only at the start of a transaction, but also periodically when they commit to certain transactions such as changing data or transferring funds.

Is monitoring happening onsite or remotely?

“Both options are effective, depending on the circumstances. The important aspect to keep in mind is that sufficient information and research needs to be acquired, based on the requirements of the customer and the premises. Whether the customer has the capability, capacity and safety on site to have an on-site monitoring control room needs to be considered. Whether the site is a high-, medium- or low-risk site will also play a fundamental role from a monitoring perspective. Some clients prefer both options from a security and backup point of view,” said Dewey.

“I believe there is a move towards monitoring offsite as bandwidth becomes more readily available. Often though, banks will have their own control room as well as using a third-party offsite facility,” said Saunders.

Alves remains cautious about the bandwidth issue. “High-definition footage does not travel well on the bandwidths we have access to presently. I would suggest that any offsite monitoring should focus on events rather than constant monitoring. Video should be retained on site but be accessible to the control room. There is currently a trend towards mobile platforms but there is still quite a road to be travelled, as video quality is degraded.”

Getting it right

“I believe that a consultative approach is the most important technique that must be followed in order to determine that the correct offering is made. Companies who are looking at implementing surveillance technologies regardless of securing premises, assets or people, should clearly define the requirements or expectations they want to achieve and be willing to invest in the technology,” said Dewey.

“There is a big focus on video and intrusion integration as well. Banks want simplicity and ease of use with secure results,” said Mallett.

“One should get the IT department involved in the process as they are responsible for the smooth running of these systems in terms of networking and cabling. Often the IT department is nervous about security having access to sensitive banking data, so collaboration would be advantageous,” said Alves.

“We have seen a move towards smarter technology with video analytics providing event-driven feedback. Scenarios such as a person running rather than walking, crossing trip lines, movement in doorways, or dropping bags and leaving them unattended, can be programmed into a system and when the transgression occurs, the system alerts the control room,” said Saunders.

“Thermal cameras are often deployed at the perimeter, allowing precise detection of unauthorised people, through the production of a heat signature, before an event can occur. Boom control at entrances act as a holding pen for people entering the property and can be situated at various points between the main entrance at the perimeter and the entrance to the actual building. This allows a virtual lockdown in each sector which is effectively monitored using facial recognition technology and licence plate number recognition (LNPR). Once the person reaches the building they will enter via either revolving doors or man trap cubicles,” said Alves.

“Areas are restricted for various reasons and there are a number of requirements regarding most restricted areas, that is, inductions and certificates. The system should have the capability to manage these tasks,” Dewey continued.

Mallett said that perimeter to vault security can be split into three areas. “In commercial buildings, people would use access cards for entrance. This also applies to logical access whereby if the access control system has not checked you in for the day then the ERP system will not provide you with computer access. Online visitor management is one other aspect of this.

“Cash in transit is next, with biometric access and video as well as POS integration key in these areas. In retail banking, there is less technology in the access control for banking halls, but technology is used to track staff movements and to assist with T&A applications. Video is now migrating to IP solutions, integrated to the access control and alarm systems. Security in this sector is low-key as risk is limited,” Mallett added.

On guard

There is agreement that there will always be a place for physical guarding, whether as a security guard within the bank or as a cash-in-transit officer. “People visiting a bank feel more comfortable if a guard is present, even when there are high levels of security technology,” said Saunders.

“Technology can be deployed not only to supplement the guarding, but also to protect the guard. Cameras in CIT vehicles provide feedback on guard movements and any events. Audio detection in cameras will send an alarm to the control room in the event that glass breaking, gunshots or screams are detected. Often, prior to a crime being committed, criminals will interfere with the camera or its lens. Certain cameras will detect when this occurs and will immediately send a signal to the control room for intervention,” said Alves.

Hot technology

“Facial recognition technology is gaining ground and can be deployed across large architectures like in banks where fraud detection is important. This would allow the banks to identify known fraudsters irrespective of how many branches they frequent,” said Saunders.

“Video analytics is becoming an important requirement when specifying solutions. This includes full HD systems that allow for quality footage and also allow you to decrease your camera count on site. Having a technology solution that allows the user to define zones and triggers within the ATM world is becoming a huge requirement from a security point of view,” said Dewey.

Contacts

Axis Communications, +27 (0)11 548 6780, www.axis.com

NEC Africa, +27 (0)11 656 3416, www.nec.com

Protea Coin, +27 (0)12 665 8000, www.proteacoin.co.za

Tyco Security Products, +27 (0)82 566 5274, www.tycosecurityproducts.com



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Fighting fire with cameras
Axis Communications SA Fire & Safety
Thousands of fires are recorded by fire and rescue services every year. These can have wide ranging causes, but the effect is always devastating if not immediately halted.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Explosion-protected network horn speaker
Axis Communications SA Products & Solutions
Axis launched the world’s first explosion-protected thermometric camera specifically designed for Zone/Division 2, and its first Zone/Division 1 explosion-protected network horn speaker.

Read more...
Challenges in SMME financing and support
News & Events Financial (Industry)
In a step towards empowering small, medium, and micro enterprises (SMMEs), a recent forum was held in KwaZulu-Natal aimed at developing and growing SMMEs through public-private collaboration.

Read more...
SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Total cost of ownership (TCO) in network surveillance
Axis Communications SA Editor's Choice Surveillance
Failure to conduct thorough TCO analyses before purchasing and deploying can lead to significant consequences. This includes misjudging budgets, buying unnecessary products or parts, and generally underestimating or overestimating long-term security needs.

Read more...