FEATURE
immediately prompted to take the correct action and the software will automatically set in motion a sequence of pre-agreed activities to ensure the right procedures are adhered to, as well as distributing essential information across multiple agencies. This integration of many disciplines provides centralised situational awareness, improved information and intelligence, effective response to critical events and the proper co-ordination of resources.
Incidents can emanate from multiple sources such as system analytics or intruder devices, and an automated workflow or rules engine will prioritise the importance of these and alert operators in a number of ways. Alarm rules will also assist operatives in managing response times, actions and feedback. Exported video can be combined from multiple cameras into one cohesive flow of evidence for analysis and importantly, a full audit of all activity is automatically generated to provide a full incident report.
Minimising risk in the area of cyber security comprises both comprehensive security mechanisms and integrating security activities into the whole lifecycle. This means taking security considerations into account during development and engineering as well as service and operations activities. Comprehensive security mechanisms should combine physical and network security, and system and software integrity. Cyber security issues have been the subject of standardisation for some time, and Siemens plays an active role in all major organisations; among others, Siemens supports the work of ISA-99, IEC 62443, DHS, BSI, WIB NAMUR and CLSI AUTO11-A2 to make sure that common cyber security standards are developed.
A high knowledge base is required to address the technical complexities of critical national infrastructure, as well as the necessary capabilities to operate effectively in a hazardous environment with full compliance to
rigorous processes and procedures. Fundamental to this environment are robust health and safety policies and practices. These should focus on critical areas of the business where safe behaviours by managers, employees, contractors and agency staff are essential to safeguard all.
For high-level fire protection, fire safety systems should eliminate the potential for unwanted alarms and offer 100% reliability, particularly in critical locations where immediate and accurate fire detection is vital to life safety and business continuity. Working in tandem with high level security and fire safety solutions are voice alarm systems that enable both automatic and live messaging to alert all personnel to critical incidents. These assist in the phased and orderly evacuation to safe muster points, even from multi-level, multi-occupancy buildings. Research has proven that in an emergency, people will react without confusion or panic if they receive a clear, intelligible message informing them of the nature of the incident.
Conclusion It is vital that life critical security and fire safety systems are fully supported by engineering teams who are trained to identify and interpret customer specifications, CDM requirements, relevant legislation and British Standards, and the impact on health, safety and the environment. High-level security and fire safety solutions save lives, and protect organisations and reputations; furthermore they ensure business continuity across the UK’s vital services.
Command and control assists by adopting a systematic approach; one that includes the development of a clear technological roadmap to drive a coherent, joined-up and long-term investment strategy that includes safety and security at its core. Taking a wider view of how people and businesses can better prepare for threats to the nation’s critical infrastructure is essential to avoid disruption, damage, loss of assets and severe economic loss.
www.siemens.com/buildingtechnologies www.tomorrowsfm.com TOMORROW’S FM | 37
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94 |
Page 95 |
Page 96 |
Page 97 |
Page 98 |
Page 99 |
Page 100