wesric portfolio

21
WESRIC “Intelligent Asset Protection & Security Risk Management Solutions”

Upload: gavin-marshall

Post on 09-Apr-2017

49 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wesric Portfolio

WESRIC

“Intelligent Asset Protection & Security Risk Management Solutions”

Page 2: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

WESRIC- Intelligent Asset Protection & Security Risk Management Solutions

7 Simba Street Sebenza Johannesburg 1619 Tel No: (011)452-5475 [email protected]

WESRIC AT A GLANCE Always dynamic , never static – our vision has become to be leaders in intelligent Asset Protection & Security Risk management

solutions .Customer service lies at the heart of everything we do .Through dedicated leadership and team work , we strive to continually deliver a hands –on ,professional offering the ensure measurable results . In order to remain true to this ethos, we constantly invest in our people and technology, ensuing exceptional and sustainable growth for our clients and stakeholders.

Our Client relationships are built on trust .We believe in nurturing long term partnerships with our clients , the result of which is

enduring provision , implementation ,maintenance and support of our solutions and their associated services .

VALUES

Our values underpin everything we do and in the manner in which we do it. They drive us, motivate us and guide us. •We pride ourselves on integrity • We are passionate about what we do • We are accountable – as individuals and as a team •

We respect our colleagues , our clients and our strategic partners •We believe in team work •Innovation distinguishes us •We never settle for less than excellent service .

WHAT WE DO

Knowledge is Power. That’s why the respective fields of security and risk management are becoming increasingly dependent on the development of sound intelligence, delivered through cutting edge information technology.

The clouts of integrated technology within these fields empower our customers to effectively manage, control and mitigate both

internal and external risk factors. The risk posed by operational aspects are constantly changing and requires a focused approach that not only can keep up with , but stay ahead of the dynamic nature of these risks .Within this arena WESRIC

develops innovative risk management solutions which transform collected risk , compliance and security related information into structured intelligence on all functional and managerial levels .

Through our products and services, we strive to enable our clients to adapt an intelligence driven management approach, built

on effective collection, dissemination and interpretation of information. This enables enhanced utilisation of existing infrastructure and resources and allows for the formulation and implementation of effective countermeasures and proactive risk

mitigation strategies.

PRODUCTS

With unique offering and therefore unique products and services, perpetual innovation is the driving force behind our success. Besides a number of broad spectrum products and services, we apply our expertise to create bespoke solutions to address

specific client’s needs .Furthermore, we take great pride in the fact that our experts remain entrenched in the process – from concept to design, implementation and after sales service .We strive be local market leaders with the capacity to develop and

introduce innovative risk solutions across industry sectors.

Page 3: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

“PILLARS OF STRENGTH “

INTEGRITY - ETHICS – HONESTY - TRANSPARENCY - TRUST

M A

N A

G M

E

N T

M

E A

S U

R E

M

E N

T

S O L U T I O N S

UNIQUE & EFFECTIVE RISK MANAGEMENT

E

M P

L O

Y

E E S

Strategic partners, not merely a service provider

o Reliability

o Effective and Efficient

o Relevant

o Unique

Accountability - processes and procedures.

Personal attention and commitment through:

o Proactive, engaged senior management

o Flexible management practices

Higher service standards

Reputation – Attracts top talent on all levels

Page 4: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

“PRODUCTS AND SERVICES”

1.Risk Personnel Solutions” - We believe in rewarding excellence in the workplace and

are committed to the principles of employment equity .We respect the freedom and dignity of all people regardless of Race,colour,religion,gender or political persuasion .We promote equal opportunity and fair treatment in employment through the elimination of any form of unfair discrimination or prejudice. •Asset Protection Officers -Grade A, B, C, D •W/H Personnel •Risk/Loss Control Managers (Junior and Senior) •CCTV Operators/Security Control Centre Management •System Managers and Analysts •VIP Protection

Introduction

1. The contractor carries on business, inter alia, as a procurer of persons to render services to or perform work for

businesses requiring assistance for either temporary periods or for fixed term contract periods.

Scope of agreement

2.1 The contractor shall provide to the client, according to the needs of the client, contract employees to work temporarily or for fixed term contract periods at the client’s premises stipulated by the client, under the direction, supervision and management of duly appointed officials of the Contractor.

2.2 The contractor will also employ, in accordance with section 197 of the LRA, as amended, any existing client personnel,

as instructed by the client, at existing terms and conditions, with full recognition of accrued service.

Request for services

3.1 The contractor shall be informed by the client’s manager for operations of the number of contract employees required by the client.

3.2 The client has the right, at its sole discretion, and at any time, to reject any contract employee provided by the

contractor who is deemed by the client in its sole discretion to be unsuitable or unsatisfactory, and to require the contractor to remove that contract employee from the premises of the client, as the case may be.

3.3 Any contract employee will be replaced within twelve (12) hours of being notified by the client, at the sole discretion of

the client.

Qualification

4.1 The contractor shall ensure that contract employees contracted to the client are fully competent in accordance with the clients requirements specified at the time of their engagement. ID clearances will be done by the contractor on all contract employees provided to the client. Credit clearances will be expedited on contract employees employed in positions of high trust.

4.2 Proof of the competence of contract employees in the form of relevant certificates, or other satisfactory

documentation, in the event that the principal requests such proof can be provided accordingly.

Page 5: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

Health and safety considerations

5.1 Contract employees are subject to the health and safety regulations applicable within the business of the contractor and/or client, whom the contractor is servicing at the time, and, if necessary, shall undergo additional health and safety induction by the contractor.

5.2 The contractor shall ensure that where appropriate, the contract employees are insured against injury at work and are

fully covered under the Compensation for Occupational Injuries and Diseases Act, 1993, and shall produce documentary evidence of such. The contractor shall furnish the principal with a “certificate of good standing” from the Compensation Commissioner, if required.

5.3 Contract employees shall adhere to the rules and regulations of the Occupational, Health and Safety Act, 1993, where

applicable. 5.4 Any reportable injury, incident or machinery failure, which involves contract employees, shall be reported by the

contractor to the Department of Labour as required. The Contractor shall make available all relevant information relating to any incident surrounding an injury to a contract employee.

Conduct of contract employees

6.1 All contract employees shall work under the direct supervision and instruction of duly appointed officials of the client and shall report at the premises of any client being serviced by the contractor at that time, to such official. Contract employees shall not leave the premises of the client whom the contractor is servicing at the time without the permission of the duly appointed official of the contractor.

6.2 Contract employees shall be subject to the general health, safety, security and operational rules binding the

contractor’s employees. 6.3 The contractor shall be responsible for the discipline and good conduct of contract employees. 6.4 Where a contract employee breaches the contractor’s disciplinary code and procedure, while on the premises of any

client being serviced by the contractor, the contractor undertakes to discipline such contract employee at the insistence of the client and, if so required by the client, to remove the contract employee from the clients premises, as the case may be.

Undertakings

7.1 The contractor undertakes to comply with all its statutory obligations, including in particular, its obligations as an employer in terms of:

7.1.1 any collective agreement concluded in a council, or with any union, that regulates terms and conditions of employment;

7.1.2 any binding arbitration award regulating terms and conditions of employment; 7.1.3 the Basic Conditions of Employment Act, 3 of 1983, and any amendment or successor thereto; and 7.1.4 a determination made in terms of the Wage Act, 5 of 1957. 7.2 The contractor undertakes to permit the client access at all reasonable times to the requisite documents (including

payroll information) relating to the employment and payment of those contract employees engaged by the contractor. Such access shall only be for the purposes of enabling the client to satisfy itself that the contractor is meeting its legal obligations to such contract employees.

7.3 The contractor will not remove any contractor’s employees from the client’s sites in order to place them on alternative

assignments without prior consent from the client. 7.4 The contractor will determine the relevant hours of work. 7.5 The contractor undertakes to timeously inform the client of any event which may impact adversely on the provision of

a quality service to the client in any manner whatsoever.

Page 6: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

2. “Management and Communication Solutions” - at the touch of a button.

“It’s time to shift the Paradigm” In the information era connectivity, manageability and traceability have become the competitive advantage .We have made it our mission to Pioneer Communication and Personnel Management Solutions in our Industry. At WESRIC, we provide complete solutions with the necessary devices to allow world class communication, management and tracking. Quality information will empower your team to manage time more accurately and work more efficiently wherever they are. Our real-time mobile solutions, works across multiple platforms and networks. RG 310’s "Push to Services" facilitates effective, clear and secure communication across different media and are tailored to fit specific organisations. Our High-tech mobile workflow and tracking systems are developed to optimise business efficiency and eliminate redundant processes. Information is gathered, analysed and delivered instantly.

It’s time to turn the page! providing next generation communication & Management Solutions.

COMMUNICATION SOLUTIONS 1. Push to Talk services - Push To Talk is a National two-way radio service for businesses that prefer the stability of mobile

phones instead of traditional two-way radio systems. Push to Talk utilizes national cell phone networks for communication. Similar to two-way radios, broadcasts can be made to everyone on the network, but with Push to Talk, users can now communicate one-on-one, one too many or in Broadcast Groups. Push-to-Talk allows instant voice communication to all mobile users on the network. This function allows staff to focus on the job at hand while being supported by highly stable, reliable and endless communication. Push-to-Talk is a simple, yet effective application which can be incorporated into almost any modern day mobile smartphone. It therefore reduces the need for additional mobile radios should users already have a compatible handset. Rugged devices can also be utilised as regular mobile phones. There is no need to carry both a mobile phone and radio devices.

FAQ on average

Wi-Fi i.e. Edge, GPRS, 2G, 3G, LTE and Wi-Fi

there are cell cell phone -

-One on One or group calls can be made

2. Push to IM -Push to IM (Instant Message), offers real time, unlimited instant messaging on any RG 310 mobile device or

smartphone. Unlike SMS text messaging, the Push to IM presence indicator lets users know which members are online and available, ensuring messages are delivered to the right person exactly when needed. RG 310’s “Push to” applications offer multiple communication applications in a single presence list. Members can be grouped into Push-to-Talk groups. The “contact list” indicates the availability status of the members and allows users to not only PTT available members, but also to send instant messages to the entire contact list, single users or multiple users at once. Your Push to IM application is an extension to your mobile device. This application can be incorporated into a control room installed on most modern PC Computers. Push to IM is a complimentary service included with RG 310’s Push-to-Talk application. RG 310's Push to IM service allows a workforce to transmit short, text-based messages between any users regardless of whether they are fixed (PC based) or mobile. Fully integrated with the Push to Talk service, this enhances the end user experience and mitigates the need to use separate, potentially more expensive alternatives. FAQ

message not like a SMS delayed

3. Push to Locate -RG 310’s Push-to-Locate is designed to locate and track all mobile staff movements for increased safety and

worker efficiency. The location service is well-suited to most sectors including Transportation, Security, Construction, Healthcare and Mining. Any user in any location across the country can activate the Push-to-Locate function instantly. Utilising any applicable RG 310 device, the Push-to-Locate function ensures that control rooms and supervisors are always aware of employees’ exact whereabouts. RG 310’s global coverage and advanced triangular positioning technology ensures that your

Page 7: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

mobile staff are monitored and administered in a highly effective and accurate way. Push to Locate, in addition to Push to Talk and Push to IM (Instant Message) will assist companies in making more informed decisions. Considering delivery or collection of products, services, emergency breakdowns or any logistical issues, the Push to Locate service performs perfectly for retrieval and reporting purposes.

The benefits of push to locate -.The main features include :

according to configuration FAQ - tracking systems

on the GSM sig

take Push to Locate w .

4. Push to Alert-RG 310’s Push to Alert functions as a mobile panic feature available on any RG 310 device. This service equips

all mobile staff with instant emergency notification to a control room, supervisor or manager, anywhere, anytime. This feature is free with our Push to Locate service. Push to Alert is a mobile Panic Button. The device features a dedicated panic button to improve the safety of lone workers. With a push of a button, the location of that device will be displayed and emergency notifications will automatically be sent to any predetermined recipients. For Example: Should a mobile staff member be in a situation and use this feature, the control room, office, supervisor or manager will be immediately notified of the emergency situation, allowing the correct procedures to be followed. Push-To-Alert combines a high level of sophistication with durability and simple functionality of our latest devices. With man down alerts, accurate location reporting, two-way messaging and Push-To-Talk communication, your most valuable assets will constantly receive the highest levels of protection. FAQ When the SOS is pushed and the Panic is received and opened by the Control room everything said around the unit will

is recorded

cancelled another device, only to the control room

5. Push to Patrol – Takes remote staff co-ordination to peak efficiency In addition to our traditional Push to suite of services the Rugged units adds newly developed applications to the Push to Family. With Push to patrol workers are able to: Scan tagged locations Scanned locations are usually present on client sites however they can also be replaced in-house, at depots, warehouses or other offices. Utilising the latest in near field communication technology, mobile staff can scan recognition tags which instantly report their location and display service necessary for that particular site. Supervisors are immediately informed when tags are scanned and completed services tasks will be automatically recorded for future reports. Report incidents Theft, vandalism or injury are just a few examples of incidents that occur when you least expect them. Luckily, our Rugged devices have the most effective and easy to use reporting capabilities on the market. Should any unforeseen incidents occur our devices take pictures, use free text Instant messages and incorporates sound captions to ensure a situation is fully clarified. The Rugged device immediately reports the situation and has it instantly recorded on your desktop management system (PC Guard Manager).

6. Time and attendances - If controlling the time and attendance of remote working staff could improve your organisations

efficiency; our services may be the perfect solution. Whether at the office, client sites or delivery points, remote working staff can now log shift reports using time and attendance tags which ensure staff efficiency and accountability. Username and passwords are used to log into devices and self- portrait photos are requested for each site location. Managers now have complete reassurance that the correct people are servicing the right sites. FAQ o set up to prompt the guard to start with the round

, the information will be send through to the system as soon as signal is restored. The time the tag was tagged will be reflected

system for verification purposes

7. Push to Workflow -Effective staff monitoring and safety is crucial in the modern day business climate, RG 310’s ground

breaking control software may be the most efficient tool on the market. When tracking remote staff locations, communication with users or pulling shift reports, the online management software has it all covered. The management system provides you with an instant web based view of all remote working staff. Should staff miss a scheduled location, supervisors will be immediately notified which could prove crucial in emergency situations. Any information needed about a particular site can be

Page 8: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

pre-programmed directly on the device. Online desktop software automates the entire reporting process in the most efficient and environmentally friendly way. By eliminating the need to compile paper timesheets, incident reports, supervisor, vehicle and customer reports results in managers having additional time to focus on business efficiency, improved performance and delivering a superior customer service. FAQ - so the application can be tailor-made to the client’s requirements

8. Push to VAC (Vehicle access control) -VAC (Visitor Access Control) is an access control system that replaces the need for

the traditional white visitors sign in book for vehicles entering and exiting a premises. Android application captures both vehicle and driver information and securely stores this data on a cloud server which is accessible at any time, day or night. FAQ RG 310 include PAC at no additional cost

9. Push to PAC (People access control) -PAC (People Access Control) is an access control systems that replaces the need for

the traditional white visitors sign in book for people entering and exiting a premises. An Android application captures pedestrian information and securely stores this data on a cloud server which is accessible at any time, day or night. FAQ

RG 310 or any Android device with a Camera bigger than 8 mega pixel can be used for this system

Please note: The VAC and PAC system has a site set up fee of R1199 per site. 9. Push to Mobi – Mobi control Pushing the benchmark of corporate mobile management, Push to Mobi is a mobile device

manager designed to restrict, manage and monitor mobile phone functionality. Your company can now enforce corporate mobile policy to ensure mobile functionality is positively directed toward employee and organisation performance. Push to Mobi offers

FAQ

can be solved remotely and upgrades can be done remotely which minimize the time the device is out of the field

10. Push to SIM – SIM Management -Push to SIM is a powerful web-based application that provides businesses with the

relevant tools and data analytics necessary to control and manage their SIM/APN environment. There is no software or plug-in to install, simply login from any web browser and manage your SIMs across all network operators. Managing mobile contracts is no small challenge; in an M2M ecosystem we talk of thousands not hundreds of SIMs (linked to devices), devices which are typically deployed in remote locations and which are prone to overage if not well managed or controlled. Corporate APNs provide many organisations with seamless secure connectivity to their corporate environments. Keeping track of key network configuration aspects, APN aggregate usage and allocations with a series of useful tools provides business the means to manage this substantial M2M environment. Push to SIM provides the functionality needed to administer all of these data intensive tasks. FAQ

11. PC Dispatcher Manager -Manage the safety of your team with our PC-Dispatcher Lone worker safety is quickly becoming

a focal point within 21st century organisations. Tens of thousands of lone workers are abused, attacked or victims of accidents in South Africa every year. Jobs where social contact with the general public is commonplace are presented as the highest threat. With the inclusion of Push-to-Locate and Push-to-Alert to RG 310’s suite of services, the PC Dispatch manager was modified to include state of the art tracking capabilities in addition to its already high tech communication system. Businesses can now expect the effective communication capabilities of RG 310’s PC Dispatch Manager with the highly effective tracking and monitoring system. Managers, supervisors and control rooms can now continuously locate and identify lone workers’ exact whereabouts. They can react to panic alerts, communicate when needed and assist in any way, should the need arise.

Benefits include: -to-one or to compiled groups endly interface

NOTE: PC Dispatch manager is to monitor and communicate the following services: - Push to Talk - Push to IM - Push to

Locate - Push to Alert

Page 9: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

12. PC Guard Manager- This is a web based platform from which you can monitor the PTP and PTW service from a PC (Control

room environment). The PCGM will be your monitoring dashboard and form part of the report infrastructure.

NOTE: PC Guard manager is to monitor the following services: - Push to Patrol - Push to Workflow - Push to VAC - Push to

PAC.

COST: Outright Purchase of Hardware: RG310/Charging Cradle: R5960.00 Monthly Subscriptions: Package 1: R880/Mth Package 2:R1200/Mth

Push to talk communication Push to talk communication Sim card (unlimited data for RG 310 apps only) Sim card (unlimited data for RG 310 apps only) Push to Mobi Lockdown software Push to Mobi Lockdown software Control room: PC Dispatch manager Push to Locate (live tracking) with Panic button Control room: PC Dispatch manager Package 3:R1550/Mth Package 4:R2130/Mth

Push to talk communication Push to talk communication Sim card (unlimited data for RG 310 apps only) Sim card (unlimited data for RG 310 apps only) Push to Mobi Lockdown software Push to Mobi Lockdown software Push to Locate (live tracking) with Panic button Push to Locate (live tracking) with Panic button Push to Patrol and Workflow Push to Patrol and Workflow Control room: PC Dispatch/Guard manager Vehicle access and person access Control room: PC Dispatch/Guard manager COST: Rental / Financing option: RG 310/Charging Cradle Monthly Subscriptions Package 1: R1225,00/Mth Package 2: R1564,00/Mth

RG 310 unit/RG 310 cradle RG 310 unit/RG 310 Cradle Push to talk communication Push to talk communication Push to Mobi lockdown software Push to Mobi lockdown software Simcard Push to locate (live tracking) and panic button Control room: PC Dispatch manager Simcard Control room: PC Dispatch manager Package 3: R1980/Mth Package 4: R2650/Mth

RG 310/RG 310 Cradle RG 310/RG 310 Cradle Push to talk communication Push to talk communication Push to Mobi lockdown software Push to Mobi lockdown software Push to locate (live tracking) and panic button Push to locate (live tracking) and panic button Push to Patrol and workflow Push to Patrol and workflow Simcard Vehicle access and Person access control Control room:PC Dispatch/Guard manager Simcard Control room: PC Dispatch/Guard manager NFC Tags – R28, 00 per unit TERMS AND CONDITIONS: Prices and specifications could be subject to change. All quotes subject to acceptance of 24 month contract. First monthly fee and once off device fees payable with order. Rental of RG 310 Top Up Sims will allow user to use PTT services. The Client may load airtime on to the Sims, at their own cost, at the service provider’s standard rates to make normal cell phone calls.RG 310 PTT Services using the RG 310 private APN will continue to connect even when no Airtime is loaded on the Top Up Sim.

Page 10: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

Page 11: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

3. “IoT (Internet of Things) Management Solutions”

Today’s management platforms need to do more than surveillance, more even than security. In an

Internet of Things (IoT) world, these platforms are going to be expected to monitor and manage

almost anything electronic that is able to send and receive a signal.

So, whether it’s a camera, an air conditioner, the company parking lot, a PA system or the moisture levels in the corporate gardens, management platforms are going to be required to interact with, customise and control these electronic systems, and more. The days of buying a VMS and creating a simple video management control room are over. Of course there are companies that will opt for a VMS-only approach for their immediate requirements, but they will soon find their operations split into silos where a unique product has to be installed for different functions, requiring unique skills and different service providers. But some would say this is acceptable if you get limited management capabilities for free, or at least for a lower cost. If you want to get the most out of your equipment and operations, however, you do need a full-service management platform able to integrate different aspects of your security and other operational functions into a single interface. Choosing the one suited to your company and its unique needs is not a simple task.

The case for open standards

Open standards and standards-based platforms get a lot of attention these days. The idea is that openness means integration will be simple, providing the end-user with a better solution and fewer coding hassles. However, there are products which are open, and those which are ‘open’. Some claim to be compliant to international standards, but only do so in a limited fashion. When you try to do a full integration there are suddenly problems and incompatibilities that require the services of skilled programmers.

The question is, how can users be sure the platform they choose really uses open standards and does not also include proprietary software or codecs that favour a specific vendor’s products? This is a case where you only realise your mistake after the bill is paid and you’re stuck with a particular brand – which is good for the vendor in the short term, but not for the user.

The reality is that a client can only depend on known and trusted manufacturers with reputations for honesty and transparency. “During the assessment process, the client should always be mindful of the complexity of the platform and the documented ease of implementation and use. As a rule of thumb, a good platform with open interfaces will also be very easy to install and configure, with no stated limitations on the brand or classification of devices that it can manage.

“The after-sales agreement should also reflect this malleability – you should not have to call a technician to come and connect your new camera to the platform. A little research will reveal all, and should safeguard the client from lock-in platforms.”

“This [open standards] is truly something most users neglect to investigate when looking into platforms. “Standards are there mainly to ensure interoperability, but to also provide you with the peace of mind that the investment in your infrastructure will be secured through the freedom of choice. Being locked into a single vendor platform binds you to their views of the future and it restricts your growth, therefore, I believe that end-to-end solutions are dead-end solutions.”

Making the platform decision

Of course, all this does not make it any less difficult to decide which management platform you should select for your specific needs. It would be great if there was a checklist from which one could select a few answers and then know what system to buy. Sadly, that doesn’t happen.There is no simple answer to the question of how to determine which platform is right for you. He advises users to analyse what they want to achieve, for example, whether the system is used for live monitoring or just recording, whether they need black-screen monitoring or real time (or a combination of both). From this, they can ascertain how they want their control room to operate.

Page 12: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

“One cannot expect an operator to sit and watch hundreds of cameras and make informed decisions on something he sees, it is just not practical, so a good understanding of the objectives is required,”

Its has been found that when people have a list of requirements, the list is sometimes created based on a desire to avoid past mistakes. “The list is not necessarily always complete or comprehensive, but one thing is for certain, they do not want to be caught unprepared again. “End customers rely on their partners/integrators to provide them with information because they sometimes are not up-to-date with the latest trends or technology.

“Full integration of all business support systems appeals to most companies. The ability to add on the fly, pay as you grow and protect your people and investments should be at the top of the list when it comes to deciding factors.”

One the other hand, clients don’t need the vendor or installer as sole source of opinion or guidance. Client awareness has now reached a point where knowledge of connectivity, collaboration and application is common, and the client can often make informed decisions with very little guidance from an outside source. “As a matter of fact, we often find ourselves challenged by the ingenuity of our clients’ new ideas, and their inventive use of basic IoT concepts.”

In the real world

“Synapse’s dynamic business rule framework was applied, and allowed the real-time maintaining of power and consumption levels inside client constructed parameters. The hardware was also installed into a solar energy array, and Synapse was used to balance the energy input/load output ration of the circuit, ensuring optimal use of the supplied energy. This was achieved without any customised coding or scripting.”

Synapse management platform is currently “counting cement bags at Lafarge cement in Zambia, using video analytics to warn store managers that their queues are getting too long in retail stores, using licence plate recognition to inform institutions that VIP vehicles are arriving at their premises so they can provide better service, and have integrated with weighing scales in gold mines to provide a video/transaction database.”

In the final analysis, there are many management platforms available today, from free systems with limited capabilities and integrations, to more costly ones that can do almost anything. The responsibility is on the buyers to understand what they require and then to look for something that meets their needs and is able to scale and adapt to their changing needs over the next few years. And it’s worth remembering, we are living in a digital age and simply watching your cameras on a screen is unlikely to deliver much value over the long term. Buying cheap is always a temptation, but living with cheap is often a nightmare.

What is Synapse?

Synapse is an Internet of Things platform with real-time collaboration abilities. Synapse can not only integrate and control a vast array of technologies, but also offer the ability to allow these technologies to co-operate (collaborate) in an autonomous, productive fashion. The addition of powerful business rule frameworks, and real-time analytical algorithms, have created a management platform that assimilates less complex devices into a coherent global solution that offers abilities that exceeds that of any of the constituent systems.

A simple ceiling fan, a basic thermostat and a little clever wiring creates a complex environmental management system capable of not only maintaining the optimal temperature in an environment, but, with the help of Synapse’s analytics and business rule features, also a climate control system capable of maintaining said environment optimally based on time of day, season or weather conditions.

The system’s polymorphic nature allows the creation of endless collaborations, and allows the use of Synapse in more traditional industries such as PSIM, building management and process control. This concept is further enhanced through the inclusion of powerful mobility interfaces (such as complete IoT control from any authorised mobile device), a complete asset management module spanning asset registers, maintenance and repair all the way to total cost of ownership control, a complete cost control backbone and powerful cloud-based management reporting mechanisms. Synapse is the definition of IoT taken to the next level.

Page 13: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

The basis for any management platform is integration, the ability to attach a variety of products to

the database and manage them from a single console without having to worry about how they are

communicating and what protocols each device may or may not understand.

When it comes to security management platforms, from video management through to PSIM (physical security information management) and the latest CSIM (converged security and information management) platforms, integration is key to them all. With the products you want to manage under control, vendors can add in value-added services in the form of software (and hardware in some cases) that will allow users to more intelligently manage and control their infrastructure.

The value in a platform is therefore dependent on what and how many third-party devices can be integrated, what the system allows you to do in terms of managing them, and the ease with which these devices can be added to a system. The ability to add additional products is key here as organisations don’t want to find they are stuck with limited options as they expand or as they adopt new technologies.

The availability of APIs (application programming interfaces) or SDKs (software development kits) that will allow users or their partners to add in additional, unsupported devices is also key. Sometimes the platform vendors will do the integration for clients if it is a broadly used product or technology they want added, at other times the user will have to sort it out by themselves, which requires a significant programming skill set.

Of course, the integration capabilities are really dependent on the openness of the platform and the devices you want to add. This is why making sure the technology you purchase adheres to a specific open standard is important, and why we are seeing a consistent drive to IP surveillance. Sadly, there are companies who claim open standards, only to surprise developers when they want to integrate into their technology. The consensus is that these companies have a limited lifespan if they don’t learn to play nicely with others.

As happens in every industry, the security market has seen management platforms growing up in silos. For example, many camera manufacturers will offer a management platform for cameras that does not play well with others and aren’t able to integrate other products, such as access control, while others offer solutions that integrate third-party applications and devices to a point, but don’t allow full integration – presumably to protect their intellectual property.

Unfortunately, the days of proprietary solutions are also coming to an end as more end users realise the benefits of being able to select best-of-breed solutions as and when they require. A current example of this is the move into IP-based access control and away from proprietary systems that lock users into one vendor’s products. It’s a great way to get annual revenue, but don’t ask for brand loyalty or commitment.

More importantly, as we move into an IoT (Internet of Things) era, the end-user is not going to be happy with different platforms managing different parts of their organisation. If an application can manage your cameras, why not your access and alarms too, and what about your passives? Then you can add in HVAC (heating, ventilation and air conditioning) systems and basically anything electronic you can think of – such as the timer for watering the garden. So what options are there for users today?

Synapse

More of an IoT platform than strictly a security platform. . More importantly, the end users should not have to struggle to get their management platform working, but it should be a case of pointing and clicking to get devices connected, integrated and working together.

To this end, Synapse has a host of protocols coded into it that will allow for the easy connection with products, from cameras to alarms and access control, through to perimeter protection solutions and even lights air conditioners and almost anything electronic.The manner in which this happens is by simply allowing Synapse to browse your network and find devices is can speak to – this may be over IP, RS-485 or another protocol or API. The user then simply clicks and draws a line between systems – such as between a controller and an alarm or passive – to link them. This will tell the AI (the artificial intelligence unit within Synapse) everything it needs to know about how the devices collaborate.

Page 14: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

The idea is to make the whole system plug-and-play, ensuring the management of your infrastructure is a simple task that doesn’t require an engineer or complex coding. Setting up your management platform in this manner is more of a DIY job than a task for specialised technicians. If a protocol is used that is not already catered for in the system, it can be added, but this will require some coding from Synapse engineers.

Synapse is designed to enable autonomous action by the software. When something happens, you don’t want to have to rely on an operator to close or open doors, switch on lights and other simple tasks. The system does it automatically, leaving the operator to handle more sophisticated jobs.

The Synapse interface can be a site map, with icons representing the various devices it is managing (of course, different situations and circumstances will require different interfaces). When an event occurs, an icon will flash and clicking on it will provide the operator with all the information they require. This is useful in situations where lights are left on, doors left open or air conditioners are left running after hours. The operator can simply switch them off or lock the doors with a mouse click and will be alerted if someone changes the state of the devices.

In the case of more serious events, standard operating procedures (SOPs) can be created, again with a few mouse clicks that will determine the full process that needs to happen when something goes wrong. By selecting an action icon, events can be scheduled in the order they must happen, and actions taken. Electronic devices can be set to automatically react when an event occurs, while operators will receive instructions on what they must do.

For example, if Synapse has a thermometer connected, it can automatically switch on the air conditioning when the temperature rises above a certain level. Then, when the temperature is at an acceptable level, Synapse will automatically switch the air conditioning off. Another example is when an alarm is raised, cameras can be set to point to the event and bring their views up on a screen. In case of a fire alarm, all the doors in the building can be set to unlock automatically, the lights will switch on and the elevators can be stopped. Audio warnings can also be broadcast while the fire department is called automatically. After the event, a similar SOP will ensure that the environment reverts to its original state – doors are locked etc., and the operators will give the all clear once all systems report in.

Synapse users basically draw pictures on their screen to set up collaboration and SOPs, while the system does the rest. This includes external communications, such as alerting an armed response unit in the field. Synapse automatically calculates which unit will get to the location fastest – by looking at the routes those in the vicinity will have to take, not just who is closest – and alerting them on their mobile devices or in-car tablets. If the company has enabled the technology, video feeds can also be sent to the cars. ( mobile app is available linked to Synapse.)

In the end

When it comes to selecting a management platform, buyers need to be aware of what they are buying. As cameras and other devices become commoditised, one needs to look at what will add value to your installation. You don’t buy a car because of the tyres, they are easily bought and added when required; you look at the engine and how it will meet your requirements over the life of the vehicle, and add the tyres you prefer as you need them.

Synapse is a developed complex software solution, but the goal is to ensure that the complexity is hidden from the user, making it as easy as possible to add and control third-party products. There are, of course, many other products on the market, meaning buyers need to do their homework before opting for a management platform to ensure they get a reliable product with a history of innovation and support for diverse products and technologies. Moreover, a solution that supports open standards is no longer negotiable. Monitoring is a pioneering way in which to monitor and control businesses premises via control room environment. The proposed solution is defined as an implementation of our ,PSIM Intermediate level software for specific security management and surveillance requirements, fully integrated with fence-,surveillance-, alarm-, access control-, visitor announcement systems, CCTV etc. Historically, the effectiveness of monitoring was limited by the quality of the person monitoring the installation or merely as a reactive recording tool for criminal activity that had taken place. Synapse supports multiple interface methodologies ranging from basic browser-based interfaces to mobile touch points. In addition, Synapse implements a highly adaptive and aggressive business rule engine, empowering the client with decision making and reactive systems perfectly moulded to the company's business processes and operational requirements.

Page 15: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

Costing – The monthly license fee becomes payable immediately after Synapse is installed on the Client’s Server

MAIN ITEM Monthly Rate: Comments:

Control Centre Monthly License fee for Synapse PSIM Intermediate and Mobile Solution

POR

Everywhere Synapse mobile platform deployed onto client-supplied smartphones and tablets

R 155.00/mth The rate is per connected device, irrespective of how many users are using that device.

Foundation aspect

Synapse’s commissioning is a rapid process, with an anticipated typical completion period of twenty (20) business days. The numbers and processes listed below are calculated for a deployment of one (1) business unit, and a project roll-out that does not offer significant challenges to time and resources. The training principle applied is of ‘train the trainer’ – we train members of your team, who then promulgate this training into your environment at your discretion. Finally, the assumption has been made that Synapse will be hosted in a central server space of some nature, and will be accessed in this space by all users and business units in a client-server fashion.

Costing towards site schematic: (Integration are bundled per system brand)

MAIN System: Rate: Comments:

Control Centre Installation of Control Centre PC and workstations.

R 3,800 once-off

Train the Trainer Training – Day shift training sessions only

R 3,800 once-off 1 days @ R3,800 per day

TOTAL: R 7,600 once off

Integration System: Rate: Comments:

Surveillance Integration R 14,500 once off Integration per manufacturer

TOTAL: R 14,500 once off

NOTE: Additional training sessions can be arranged when needed at a rate of R3900 per session Travel and Accommodation will depend on the distance travelled, the number of nights for overstays per applicable resource and if flights and rental cars are required – costs will be for the client’s expense. Hours spend on travel by WESRIC resources will be billable to the Client as part of the daily rate. Distances travelled by vehicle will be charged at a rate of R7.20 per km - Overnight cost will be charged at a minimum of R1050 per night Flights and rental cars – cost billable to the client.

Support and Maintenance aspect: Please note that proposal may be further augmented with a monthly service level agreement. This agreement will serve as basis for WESRIC Business Intelligence Solutions to support the client in technical and consultation issues, and will conform to standards accepted in the information technology market. The negotiation of the SLA will be dealt with as a separate agreement to any agreement arising out of this proposal. Our normal support rates are R950 per hour.

Page 16: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

4. “Technical Solutions” CCTV SURVEILLANCE SYSTEMS –CCTV systems allow for greater staff productivity, reduce shrinkage, protect profits, increases safety and reduce criminal activities. Both IP and analogue systems are available. All systems are mapped according to the client’s requirements and costed accordingly. New systems and maintenance and repairs of existing systems are provided.

Low End Video Image Analysis

Mid-Range Video Image Analysis & Motion Detection.

High End Video Image Analysis & Motion Detection

”REMOTE CCTV MONITORING - (GUARDIAN EYE)”• 24hr event driven remote monitoring service. • Get the most return from your current data link• Guardian Eye utilises after-hours “down-time”• Cut out guarding-related problems, such as the high cost and intimidation of personnel, collusion by guards and ineffective Patrolling. • Remotely control access gates, server rooms, building lighting, etc. •Keep your armed response contractors honest by monitoring service levels and response times•Give your armed response contractor constant visibility to your premises. Remote monitoring is a pioneering way in which CCTV installation is utilised to monitor and control businesses premises via a remote control room environment. Manned by professional industry accredited personnel, it provides immediate re-action to alarm incidents through public or directed IP communication to the actual site and by alerting armed response emergency services and the SAPS where applicable. In addition, full access control can be remotely conducted by our control room.

Page 17: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

Historically, the effectiveness of monitoring was limited by the quality of the on-site guard monitoring the installation or merely as a reactive recording tool for criminal activity that has taken place. Remote monitoring, in turn, has been hampered to date by Insufficient bandwidth required to properly transmit high resolution video imagery. The data solutions last mile access into a customer’s premises resolves this issue, as the mostly uncontended bandwidth required for voice, video or data transmission can also be utilised for this service – without incurring any additional costs to enable Guardian Eye. This is especially relevant for after-hours monitoring where the client’s Vox Telecom links are underutilised. Our offering can include a24-hour event driven service, for example, remote access control. The client has access to all on-site recordings and can view such via web access.

Includes –• Turnkey solution that offers project management, implementation, maintenance, remote monitoring and SLA services.• Proactive detection of camera and data connectivity outages.• Rapid alerting and communication with your guarding company and the SAPS.• Dedicated onsite storage of all footage in high definition.• Remote access to cameras from smart devices• 24/7/365 monitoring and maintenance of data links and camera outages.

ACCESS CONTROL SYSTEMS - Card and Fingerprint biometric readers for doors, gates, booms and turnstiles available for the monitoring and management of access .Standalone as well as integrated systems within payroll time and attendance. New systems and maintenance and repairs of existing systems are provided.

INTRUDER DETECTION AND PERIMETER SYSTEMS –Wired and Wireless options available, beams, motion sensors, panels and networks communicators. New systems and maintenance and repairs of existing systems are provided.

FENCING - Deter, Detect, Delay. A high voltage shock combined with a physical electric fence barrier will deter anyone from attempting to penetrate the perimeter fence. The detecting ability and power of an electric fence energizer will give an alarm when the perimeter of the property being protected has been infiltrated. By keeping the perimeter protected using an electric fence, the attempted break in of the protected area is delayed, giving additional time for a reaction team to respond.

Page 18: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

5. “Security Products “

•Metal Detection Systems - As part of our comprehensive checkpoint security solutions, a wide variety of metal detectors that help screeners differentiate between harmless objects and potential threats. Choose elliptic or panel, sensitivity level and throughput for the right system to search for concealed weapons, prevent theft or perform routine entry and exit screening. We’ve got the accurate, user-friendly metal detector to match the task.

•X-Ray Systems for Entry Control Points-Entry control point screening solutions for various facilities i.e. correctional facilities, courthouses, municipal buildings, hotels, and other critical infrastructure. Designed to screen small and medium-sized objects such as briefcases, backpacks, parcels and packages.

• Alcohol Testers •Tasers • Convex Mirrors • PA Systems • Under Vehicle Search Mirror •Bullet-

Proof Doors & Windows • Bullet-Resistant Vests • Detection Powder & UV Equipment •Fiberglass

Cabins • Finger Printing Pad & Ink• First-Aid Kits• ID Equipment• Panic Bolts •Parking Poles,

•Random Selectors• Reflective Garments• Riot Equipment• Road Cones & Spikes• Safes •Security

Registers •Security Seals • Security Tape• Sirens• Spotlights • Streamlights • Stunguns •Tamper-

Evident Seals •Watchtowers •Wheel Clamps & Locks Health & Safety Equipment

Page 19: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

•TURNSTILES

If you need an effective security solution, turnstiles are an essential addition to your access and control plan. Turnstile access control is often used in factories, warehouses, stadiums, amusement parks, universities, public transport stations, retail sites and casinos. A turnstile gate is ideal for crowd management – providing your location with safety, convenience and efficiency. Factory turnstiles are ideal for securing the premises and integrating with the company’s time and attendance system. A wide range of turnstiles for sale as well as turnstile rental options. Designed by professional engineers, our turnstile gates are trusted worldwide. We have been turnstile manufacturers since 1990, producing high quality products that offer true reliability. So you can rest assured that our turnstile security is a top quality entrance control solution. We strive to ensure that every project is completed on time, within budget and with zero failure, giving your establishment the security and manageability you need.

CHARISMA HELICOPTER SUPERMARKET WITH SCREEN TOURNAMENT SECURITY LEVEL SECURITY LEVEL SECURITY LEVEL

TITAN HALF HEIGHT TITAN THREE QUARTER HEIGHT TRIUMPH SECURITY LEVEL SECUIRTY LEVEL SECURITY LEVEL

Page 20: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

6. “Vetting & Clearance“ Identisafe is a one stop intelligence analysis service combined with user friendly software applications specifically developed to address corporate business intelligence requirements.

•Risk Assessments – The process of defining and analysing the dangers to businesses, staff and clients posed by potential natural and human–caused adverse events. Calculation of probabilities of various risk events and the likely extent of losses in a particular event, determining the extent of vulnerabilities and devising countermeasures should a risk event occur.

COST: R7500/ASSESSMENT.

• Due Diligence – Structured profiles and due diligence checks on individuals, companies and countries .The use of credible data and other resources to provide due diligence research for investigation and contract purposes. All key elements are incorporated. Executive Recruitment checks – In-depth background checks that support executive recruitment processes. The research is beyond the CV or the candidates profile giving confidence in decision making. Corporate Due Diligence – Non financial Due Diligence reports , in advance of new contracts , or as part of supplier audits .Ensuring that full understanding of the entity you are dealing with – such as ownership structure, reputation of organisation and its executives , its status, exposure , and any issues of corporate social responsibility .

COST: INDIVIDUAL DUE DILIGENCE : R1700/ASSESEMENT , INCLUDES (Address, Employer, Contact detail, ID Verification, Home Affairs Status, Deceased Status, Fraud Status, Listing check on Employer Fraud databases, Judgements, Admin orders,Sequestrations,Debt Review, Trace enquires, any other default alerts ,Listed properties ,Directorship)

COST : COMPANY DUE DLIGENCE : R3200,00 , INCLUDES ( Registration date and No of business , Status of business ,Previous name if applicable, Tax number, Vat number ,Business Type ,Region of Operations ,Registered Address, Postal address ,Contact Numbers, Auditor detail ,listed business Member .Detail on active Business Member’s (Directors) includes - Address, Employer, Contact detail, ID Verification, Home Affairs Status, Deceased Status, Fraud Status, Listing check on Employer Fraud databases, Listing check on Protective Register ,Judgements, Admin Orders,Sequestrations,Debt Review, Trace enquires, any other default alerts ,Listed properties ,Directorship ,Risk rating ,Risk of business failure) COUNTRY DUE DILIGENCE: POR, TRAVEL RISK ASSESSMENT: POR, COUNTRY RISK OVERVIEW: POR •Trend X Report – Weekly proactive infographic report on topics that intend to effect the business environment during the upcoming week. COST: R7500/MONTHLY.

• Vetting and Clearance – Pre- employment screening. Our system facilitates a process in which applicant’s information is vetted against relevant databases and information sources. Validation officers ensure correctness of information and correlate the appropriate reports .Based on the feedback and Employment risk factor is calculated, allowing educated decisions based on assured information.

COST: Criminal Record-via Bio Metric Scan – R95, 00 Driver’s License - R95, 00 PSIRA – R15, 00 Credit Check – R65, 00 Fraud Listing – SAFPS – R98, 00 Home Affairs (Dead or Alive) – R15, 00 National Matric Qualification – R180, 00 National Post Matric Qualification – R180, 00 Admin Fee – R35, 00 (Per Individual Check) Turnaround time on Vetting and Clearance is up to 72hrs. Supporting documents required for criminal checks are – Signed Indemnity by the individual, Copy of ID, any certificates, Driver’s License. Email us on [email protected] to schedule crim checks accordingly.

Page 21: Wesric Portfolio

WESRIC

“intelligent asset protection & security risk management solutions”

Note: All pricing of products and services are excluding that of VAT.

“IMPOSSIBLE IS ONLY AN OPINION”