SECURITY
than reactive, decision-making. By combining a wide variety of building and infrastructure systems, and creating a logical sequence, it is possible to limit the escalation of damage.
Alarm rules will also assist operatives in managing response times, actions and feedback. Exported video can be combined from multiple cameras into one cohesive flow of evidence for analysis and importantly, a full audit of all activity can be generated automatically to provide a full incident report.
The centralisation of activities can also reduce cost and improve user efficiency as the command platform synchronises inputs from multiple disciplines, enabling operators to quickly master each situation, and to mitigate human error, decision making is more automated and systematic.
The software delivers a decision management workflow that assigns priorities, determines activities and allows them to allocate the appropriate actions and resources. This high level of transparency, complete with detailed reporting and audit trails, provides vital information to senior management to enable a better understanding of their site operations, leading to future improvements and cost efficiencies.
Integrating legacy systems Existing systems and technologies often need to be integrated into a new control system. This will necessitate the creation of ‘soft’ interfaces, making it easier to integrate and reconfigure to adapt to change in the future, and operate from one single platform. To address key operational, protection, safety, future planning and compliance issues, organisations need to develop technology migration strategies that enable upgrades and improvements, whilst sustaining original system elements. Critical to success is the migration path which ensures high system availability throughout the change-out programme and is designed to incorporate interoperability between the existing and new technology
portfolios. This enables both security and video system availability and low disruption during system change-out.
Cyber security To counter the cyber threat, companies must establish risk-based rules that ensure adequate protection, with clearly defined and mandatory requirements. Baseline standards include:
Identity and access management: connected devices must have secure identities and safeguarding measures must allow only authorised users and devices.
Encryption: connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate.
Continuous protection: companies must offer updates, upgrades, and patches for their products, systems and services via a secure update mechanism.
Conclusion High-level security solutions save lives, protect organisations and reputations and ensure business continuity across the UK’s vital services. Command and control assists by adopting a systematic approach; one that includes the development of a clear technological roadmap to drive a coherent and long-term investment strategy that includes safety and security at its core.
The improved assessment, management and transparency of safety and security disciplines and the protection of vital assets are provided through improved automated decision-making, more efficient workflow procedures and greater convergence of technologies. In line with the need for both the public and private sectors to lower costs, these software platforms enable superior operational performance, improved shared services, greater efficiencies and cost reductions, enhanced energy management, and a safer and more sustainable organisation. In short, they improve the protection of people, communities and assets.
www.siemens.com
www.tomorrowsfm.com
TOMORROW’S FM | 31
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68