securitylinkindia

NSF Certifies Oncam 360-Degree Evolution Camera

Oncam broke new ground as its award-winning Evolution Stainless Steel camera earned the coveted Standard 169 accreditation from NSF International. The innovative and robust 360-degree camera from Oncam is the first and only surveillance camera of its kind to receive the NSF mark in the ‘Special Purpose Food Equipment and Devices’ category. Oncam’s Evolution Stainless Steel camera series has gained recognition for its ability to cater to more extreme environments that require exceptional resistance to corrosion. The camera boasts an IP69K rating, the highest protection rating available against weather, water, and dust, as well as an IK10 rating against vandalism. It can be washed with high-pressure jets of more than 1,000psi at up to 80 degrees celsius, enabling it to withstand demanding environments. The system is ideal for surveillance applications in diverse arenas like food processing facilities, industrial and chemical plants, vehicle wash stations, and ports and marine applications, amongst others. In addition to resilience, its premium material and stylish design make the Oncam Evolution Stainless Steel camera a complementary addition to any architecture. The latest accreditation, as well as the multiple other awards and commendations the product has received, highlight how its premium material and build quality make it ideal for security applications in challenging and harsh environments. “The NSF mark is a testament to the design of the Evolution Stainless Steel camera series, and underlines Oncam’s commitment to quality, compliance and safety. Its robust build brings unrivalled possibilities to environments with stringent sanitation requirements and adds diversity to our existing line of 5MP and 12MP cameras,” said Abhishek Kumar, Regional Director, South Asia, Oncam, “The Evolution Stainless Steel cameras are designed to be visually appealing and to provide exceptional protection from the elements, while offering the same quality and technological innovation which Oncam is famous for to its customers.”

Read More

ULIS’ Thermal Activity Sensor for Smart Buildings Projects

ULIS Thermal Activity Sensor (TAS) for detecting true presence and people counting has been selected by Irlynx for integration in its advanced smart building device, People Sense™. Irlynx will field test ULIS’ thermal sensor in several pilot studies it is undertaking with GE Digital, NEXITY and SNCF, among other smart occupancy and people counting projects linked to optimizing open space areas and reducing building footprint. The global market for IR sensors in smart homes and buildings is expected to grow from $694 million in 2016 to $1068 million in 2022. Both ULIS and Irlynx manufacture thermal vision products to meet emerging needs in workspace management, energy management, security and safety. ULIS is the only manufacturer to produce, in mass volume, advanced occupancy sensors that give system integrators the flexibility to modify key parameters within the thermal sensor to match system requirements. “ULIS is pleased to enable deployment and testing of a people counting solution using its newly designed Thermal Activity Sensor,” said Hien Pham Gia, Sales and Marketing Director at ULIS, “Irlynx has provided ULIS with additional opportunities to obtain valuable end-user feedback based on real-life experiences. This will allow us to confirm the key benefits of our sensor, as well as further strengthen its value proposition for facility managers.” Irlynx developed the electronics as well as the algorithm for the TAS to perform thermal video data analysis and to activate the people counting function. Irlynx’s task was made easier since in using ULIS’ sensors the algorithm could access raw data directly from the sensor. This eliminated the need for Irlynx to carry out complex calibrations. “Irlynx was looking for a partner with great technology and a good understanding of our markets, where cost is key. ULIS demonstrated that it could adapt to its offer and address this challenge. Its technology allows us to deliver an unmatched value proposition to the smart building market, with a greater performance/ price ratio than any existing people counting solution,” said Guillaume Crozet, VP Sales and Marketing at Irlynx, “We also deliver advanced human activity data such as people’s position and trajectories, and desk occupancy, increasingly of great interest among our customers.” Advantages of ULIS’ space occupancy sensor One key advantage a thermal sensor offers facility managers is that it comes without facial recognition, an important feature to preserve the anonymity and privacy of subjects, for example, when monitoring a building. Furthermore, compared to other thermal technologies, ULIS’ TAS offers a wider field of view up to 120°, meaning that fewer devices are required to cover large surface areas. Customers have several options available for tuning ULIS’ TAS for specific application requirements. One option is to work directly on raw video data (true 14 bits parallel bus), which is easily interoperable with standard microcontrollers and low-cost FPGA. System integrators can also optimize the sensor’s power consumption and use it with a standard battery lasting three or more years.  

Read More

FICO PREDICTS AI and Blockchain to Meet in 2018

The growing use of blockchain technology in financial services will include a healthy dose of artificial intelligence, as new, automated analytic techniques look for patterns in the ‘relationship data’ about people, contracts and transactions. That merger of two hot tech trends is one of the predictions made by Dr. Scott Zoldi, Chief Analytics Officer at Silicon Valley analytic software firm FICO, and a recognized expert in the field of artificial intelligence. “Beyond its association with crypto-currencies, blockchain technology will soon record ‘time chains of events,’ as applied to contracts, interactions and occurrences,” Dr. Zoldi wrote on the FICO Blog, “Think about renting a car. In the future, you will be able walk up to a car to lease it, but you’ll do so with a micro-loan for which you are approved to lease the car for, say, an afternoon. This micro-loan will have insurance contracts attached to the blockchain, and a codified history of the car’s history of drivers, events, and maintenance. As you drive through the city and interact with toll roads and parking spaces, all of this information will be automatically recorded and monitored on the blockchain. When you leave the car and lock it, the lease is complete and auditable on the chain. These kinds of data event chains will create new opportunities for graph analytics and novel new AI algorithms to consume relationship data at scale.” Zoldi, who leads the team that builds FICO’s AI analytics for solutions such as fraud management and cybersecurity, also sees a rise in what he calls “defensive AI.” “Attackers use malicious AI and ML to circumvent the protective systems companies have in place,” he wrote, “This arms race, in which criminals arm themselves with adversarial machine learning, tops McAfee’s 2018 security forecast. In 2018 we will see new systems that will seed their outputs with ‘faint signatures’ to mislead, confuse or identify the attackers learning the AI system’s response.” As chatbots get smarter and use more AI, they will not only understand us better, they will also be better at manipulating us, Dr. Zoldi predicts. “By quickly understanding the tone, content and predicted highest-value conversational paths to meet various objectives, chatbots using AI can also learn the magic words to sway our attitude, actions and possibly elicit en masse reactions,” he wrote. Dr. Zoldi’s other predictions for AI in 2018 are: AI will have to explain itself. “The need for Explainable AI (XAI) is catalyzed by regulations like the European Union’s General Data Protection Regulation (GDPR), which requires explanations for decisions based on scores, including those produced by AI and ML systems.” AI will augment us. “Whether it’s drawing the information together for us to be superhuman at investigation, data recall, or improving how we learn new topics, AI will augment our ability to process new information. The question will be as to whether our human brains will atrophy, improve or simply evolve to the rate and frequency of data.” AI will get operationalized. “In 2018, companies will focus on operationalizing AI, particularly in the cloud, to more easily build, refine, deploy and enhance machine learning environments.”

Read More

Genetec Security Center 5.7

Genetec Inc. has recently introduced a new version of Security Center, an open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. Security Center 5.7 allows users to make insight-driven decisions based on security and analytics data. This latest version also adds privacy protection for individuals, efficiently distributes HID mobile access control credentials, and ensures business continuity with native access control fail-over. Protecting data, the network, and the organization Cyber resilience is about securing communications, authenticating users, and protecting businesses from employees unwittingly allowing vulnerable network-connected devices to threaten the business. To improve overall cybersecurity, Security Center now automatically identifies whether connected edge devices are running the most recent and secure device firmware. Once notified of known vulnerabilities and given firmware recommendations, administrators can take immediate action and eliminate known security gaps. ‘GDPR-ready’ privacy and video analytics More than a trend, protecting individual privacy is fast-becoming a necessity of security management. In some regions like Europe, it is already becoming codified in law. By embedding the KiwiVision™ Privacy Protector ™ module, Genetec enables organizations to automatically blur and mask sensitive video, and anonymize people to protect their privacy. Privacy protector was recently re-certified for its fourth consecutive term with the European Privacy Seal (EuroPriSe), and remains the only video solution to hold this certification.Privacy protector is also rated as ‘GDPR-ready,’ meeting the stringent compliance criteria of the General Data Protection Regulation (GDPR), which will go into effect May 25th, 2018 in the European Union. The KiwiVision Intrusion Detector™  module is also unified with SecurityCenter 5.7 to generate real-time alarms that automatically notify security staff when individuals or vehicles enter sensitive areas, secured perimeters, or restricted zones. Through an accompanying analytics-based intrusion report, operators can now engage in deeper investigations. Additionally, to assist users in scanning through hours of footage, a new Quick Search forensics tool identifies changes in recorded scenes in seconds, ignoring irrelevant footage to narrow down searches. Enterprise access control with native failover and HID mobile credential support The Security Center Synergis™ access control system now comes with built-in failover, so customers can take advantage of continuous monitoring of devices and events. This safeguards critical information and ensures business continuity, even when servers fail. The new HID Mobile Access Portal API integration allows organizations to efficiently deploy mobile credentials to their employees, contractors, and visitors. These credential holders receive an email to download the HID Mobile Access Portal application on their devices, which enables access via Bluetooth® or NFC wireless technology. Employees and visitors will now be able to use their smartphone, wearables, and tablets to gain approved access credentials to securely open doors and defined areas of the premises. Insight-driven reporting and decision support The new advanced Security Center reporting feature intuitively displays data in dynamic charts and graphs, helping organizations gain a deeper understanding of their data, identify trends, and spot undetected patterns. Visualization of physical security data can be employed to quickly isolate security gaps and suspicious activity, identify maintenance issues, find valuable opportunities to improve operations, and ultimately make smarter decisions.    

Read More

Top Four Smart Cities Predictions for 2018

Global smart city market growth will accelerate in 2018 according to a new report from business information provider IHS Markit. The report reveals that options are quickly expanding in the market, thanks to narrow band- Internet of Things (NB-IoT) and long term evolution category-M1 (LTE Cat-M1) deployments. In its Market Insight report, IHS Markit divides the IoT market into the following categories – connect, collect, compute and create. The following describes the top four trends within these categories, which will shape the smart city market in 2018 and beyond. Funding on the rise Lack of funding has been one of the main issues within the smart city market, however, new public and private initiatives are tackling this problem – fostering market growth for 2018 and beyond. Few initiatives were launched in 2017, but more are expected to come in the following years. Australia and other governments recently launched national challenges and funding in order to speed the growth of their smart city sectors. The industry is also providing funding. For example, in November 2017, Cisco announced a $1 billion financing program to help cities develop smart city solutions. Smart city platforms “The smart city platform is the brain enabling the creation of a smart city, shattering siloes and unlocking its real data-driven potential,” said Pablo Toma-si, Senior Analyst, Smart Cities and IoT, IHS Markit, “They are a key element for the long-term smart city vision, and companies of all types are focusing on them. Multiple competitors have found opportunity in the platform space, including network vendors, telecom operators, software vendors and application providers. Along with market expansion in 2018, competition among platform developers is ramping up.” Technologies on top of IoT New technologies are also expanding on top of the IoT. “Machine learning and artificial intelligence, edge computing, drones and blockchain are now part of smart cities,” Tomasi continued, “Their importance will grow in 2018 and they will doubtless play a defining role in the future.” Artificial intelligence (AI) and machine learning (ML) include video analytics and chatbots, like those deployed in Los Angeles this year to provide citizens with information and answers about city services. There is also increasing industry attention on edge computing, as Microsoft, Huawei and Dell focus on these types of solutions. Drones, used for maintenance and security, and blockchain, used to improve government services, will also accelerate in smart cities. Line between smart homes and smart regions Smart cities are now entering the smart home through mobile apps and digital assistants. To communicate with their citizens, Los Angeles and Las Vegas both launched Alexa skills in the last two years, and Las Vegas even created its own channel, bringing city content to owners of Apple TV and Roku. “These types of developments are not the end of the road, rather the starting point,” Tomasi concluded.  

Read More

Cisco Survey : Revealing Divide Between IoT Value and Trust

Cisco has released the findings of its first IoT Value/ Trust Paradox report, based on a survey of 3000 consumers, designed to provide businesses with actionable insights on how to increase consumer confidence in and adoption of Internet of Things (IoT) services. Cisco has released the findings of its first IoT Value/ Trust Paradox report, based on a survey of 3000 consumers, designed to provide businesses with actionable insights on how to increase consumer confidence in and adoption of Internet of Things (IoT) services. While the survey reveals that consumers are willing to accept risk and trade off value for trust, they do so reluctantly. Their desire for transparency and visibility into how their data is being used remains strong. Companies that can resolve the paradox for their customers have the opportunity to accelerate and sustain the growth of their IoT businesses. The data Awareness: More than twice as many consumers recognize personal IoT devices than public ones. When consumers were provided with a broad list of devices and asked to identify which were part of the Internet of Things, 63 percent on average correctly identified personal IoT devices (wearables, home security systems, and so on), while only 27 percent were aware of public IoT implementations (street lighting, energy meters, traffic systems and so on). Value: Across the IoT spectrum, the perceived value that IoT brings to consumers’ lives is quite high. 53 percent of respondents feel that IoT makes their lives more convenient, 47 percent say IoT makes them more efficient, and 34 percent say IoT increases their safety. Trust: While consumers are seeing increasing value in IoT services, they are very concerned about the security of their data and how it is being used. Only 9 percent of respondents say that they trust that their data collected and shared through IoT is secure. And only 14 percent feel that companies do a good job of informing them what data is being collected and how it is used. The IoT paradox: Consumers value IoT but don’t trust it. Despite this lack of trust, they are not willing to disconnect. 42 percent said that IoT is too integrated into their daily lives to disconnect from these devices and services, regardless of the perceived risk. “As more companies build their businesses around IoT services, they need to first understand the importance of educating customers on how they are using their data to deliver new, valuable services that will enhance their lives,” said Macario Namie, Head of IoT Strategy at Cisco, “Consumers are asking for more visibility into IoT data practices, mand to increase transparency around your IoT data governance and management, you first need to be able to determine who gets what data, where and when. Today’s IoT platforms solve this problem and can give you the ability to enhance consumer confidence and trust, which can lead to greater adoption of your IoT services.” The Cisco® IoT Value/ Trust Paradox report recommends businesses to use these insights and implement the following steps to address the gap between value and trust in IoT:  Establish a clear, concise data policy and share that with your users:  Companies must be able to provide transparency into how they are using and securing data and how this helps improve their customers’ experiences. Take granular control of your data: To increase transparency around IoT data governance and management, companies first need an IoT platform that can help determine who gets what data, where and when. Create accountability throughout your IoT value chain: Companies must evaluate all the providers in their IoT value chain and put IoT solutions in place to enforce minimum security standards and requirements so they can hold each provider accountable.  

Read More

UL Full Scale Live Fire Test with IITGN

 UL  a global safety science organization, in association with Centre for Safety Engineering (CSE) at Indian Institute of Technology Gandhinagar (IITGN) conducted a live fire test at the institute’s Palaj campus. This test is the fifth in line, after the first four tests conducted last year as part of Phase 1, revealed immediate issues and concerns that needed attention in order to improve fire safety of building envelopes. The test involved setting a three-storey building on fire to study the impact of dangers posed by modern construction methods and materials, thereby defining the need to modernise fire engineering. The building comprised of an insulating material along with an ACP-glass facade, and was conducted in the presence of several stakeholders including fire experts from India and the US, researchers, practicing engineers, policymakers, contractors and manufacturers. UL and IIT Gandhinagar had joined hands last year, with the understanding that fire safety as part of disaster management is the topmost priority, given the increasing use of facades of different types (glass, aluminium, composite etc.) in building construction. A spate of accidents in India and elsewhere underlined the need for rigorous standards and codes in this area. Suresh Sugavanam, UL’s Managing Director of South Asia said, “Over the last one year, our association with the Indian Institute of Technology, Gandhinagar and the commitment to study fire safety has opened the doors to several interesting and important findings. This partnership is helping us realise our safety mission while working towards developing India-specific fire safety standards. We are extremely pleased to release the research findings of the Phase I project, titled ‘A first of its kind report on glass façade testing project: Research on glass façade fire testing.’ This live fire test as part of the second phase will further help us in gaining insights in order to recommend relevant standards and solutions.” Prof Sudhir K Jain, Director, IITGN shared his insights on the fire tests and said, “The installation of glass, aluminium or composite facades was found to be the culprit of few major building fire accidents in the recent years in India and abroad. It is expected that such tests will provide scientific insights into the interaction between insulating materials, facade materials and building compartments in realistic fire scenarios and help improve their safety.” Earlier during the day, a discussion on building facades and fire safety was conducted were research findings of the Phase I of the IITGN-UL project were also presented and discussed, and the formal report of findings was released. Titled ‘A first of its kind report on glass façade testing project: Research on glass façade fire testing,’ the report was released at the hands of Prof Jain and Mr Suresh Sugavanam. Eminent speakers included D K Shami, Fire Advisor, Ministry of Home Affairs; Dr. Pravinray Gandhi, UL LLC; Mr. Sugavanam; and Prof. Gaurav Srivastava, Principal Investigator of the Project, IITGN. Additionally, the William Henry Merrill Fire Engineering Laboratory was also inaugurated by Prof. Jain and Mr. Sugavanam. The centre reinforces the strong commitment of IIT Gandhinagar and Underwriters Laboratories towards enhancing safety within and outside India.  

Read More

The Value of Intelligent Solutions For Hospitality Security

The hospitality industry is constantly evolving. Hotels focus on leveraging technology to enhance the user experience, which includes streamlining processes and adding additional amenities that draw repeat visits. At the same time, efforts to maintain the safety and security of individual hotels and hotel chains face a sea change. Although security began as a property protection function, it has broadened to include plans to mitigate several types of threats, ranging from fraud and malfeasance to terrorism to response to major events including natural and manmade disasters. It is clear from the growing demand for technology solutions within this segment that hospitality is very focused on ensuring a safe environment for those inside the facility. Hotels strive to deliver exceptional customer service while balancing the safety and security of guests, employees and visitors with a welcoming environment. Modern risks, including those related to cybersecurity, liability and compliance, have propelled the need for stringent yet creative security strategies to be integrated into a hotel’s overall business strategy. As hotels don’t report incidents, there is limited public data regarding the safety and security of these properties. However, it’s still clear that threats exist in hotels and resorts. A 2009 study that examined crimes reported by 64 Miami Beach hotels to the Miami Beach Police Department showed that theft is a chief problem, with nearly half of the 756 reported crimes being thefts. Growth ahead Threats like those mentioned above continue to be a significant driver in the deployment of video surveillance, video intelligence technologies and other security systems. The demonstrated value of video drives further interest in surveillance platforms, and this along with other factors propels the use of video surveillance as it continues to advance globally. According to a 2017 report from Research and Markets, the video surveillance market is projected to grow at a CAGR of 9.6 percent from 2017 to 2023, with hospitality, healthcare and education verticals forecasted to grow at an even higher rate. Technology plays a critical role in the effectiveness of a security function in all organizations, and the hospitality industry is no exception. In research conducted by Professor Alexandros Paraskevas, Chair in Hospitality Management at the University of West London, with assistance from the International Centre for Hotel and Resort Management, a large majority of hotels reported that video surveillance is by far the ‘core’ solution in use today. According to one participant, “95 percent of the discussion on security technology investment is about video surveillance.” Most executives consider video to be the leading investment, used as a deterrent or as an investigative tool. It is predominantly used in a reactive, not proactive manner. Even though technology is considered a force multiplier, many hotels struggle with allocating sufficient budget for security measures. Security investment within the hospitality sector is typically a ‘reluctant spend’ since it is not considered a revenue generator. That does not mean that the hospitality industry doesn’t prioritize security, it’s just a matter of setting the right mindset. Owners and managers who realize the importance of employee and guest safety, and the overall benefit of security are keener to discuss investment. This is why security leaders must be willing and able to educate senior leaders on the technology being proposed. As video surveillance becomes more prominent as a business operations tool in addition to a critical piece of a comprehensive security plan, valuable innovations such as panoramic and 360-degree cameras and video analytics, are important tools to reduce cost and increase coverage of large areas such as hotel lobbies and parking lots. But these products are only one piece of the puzzle – a comprehensive security solution can not only prevent and provide investigative/ forensic support, but also reduce insurance premiums and increase business. It is critical that video cameras and other security solutions are integrated to form a more comprehensive view of a hotel’s overall security posture. Simple, intelligent systems that bring information to the operator are optimal because they help hotels gain new levels of intelligence to help mitigate risks more effectively and proactively. The future is now Advancements in technologies propel new ways for security technology – most predominantly video – to be leveraged throughout an organization. Video data can be leveraged for additional uses that span several departments including business operations and marketing. The capital investment in video capture technology then becomes more widely distributed as more departments utilize the information, going from a required ‘grudge purchase’ to a ‘Swiss Army Knife’ of operational benefits. For example, the future of analytics provides heat-mapping functionality that hotels can use to identify busy areas for target marketing. Users can analyze traffic and people flow, and use that information to determine how to best use specific areas. With facial recognition software, hotels can better address the needs of VIPs by allowing hotel staff to be alert when a frequent guest arrives. How’s that for customer service? Hotels and resorts can use advanced technologies to better serve guests in an effort to deliver the kind of personalized service that customers will come to expect from their visit in the future. This will allow brands to build long-term relationships and ensure return visits, leading to increased revenue streams and a successful sustained business model. At the same time, hotels will be able to realize new levels of safety and security to keep their most important assets protected.                                    Author:-       Abhishek Kumar ( Regional Director, Southeast Asia, Oncam)

Read More

New NIST Forensic Tests

Data found on a suspect’s computer, cell phone or tablet can prove to be crucial evidence in a legal case. A new set of software tools developed at the National Institute of Standards and Technology (NIST) aims to make sure this digital evidence will hold up in the court. The software suite, referred to collectively as federated testing tools, is designed to help law enforcement and forensic practitioners with a critical early step in evidence collection – making a copy of the data from a seized electronic device. Because a suspect’s guilt or innocence can hang in the balance, both the prosecution and the defense must agree that the digital forensic process did not introduce any unseen errors into the data, and that the methods they are using work as expected. Extracting and copying data is a risky process because of the rapidly shifting digital landscape that the devices inhabit. Confronting the practitioners are all the differences in data and format that can exist between one device and the next – because of the sheer number of different manufacturers, and because of the frequent software updates pushed to various makes and models. “It’s hard to keep up,” said Barbara Guttman, one of the suite’s developers at NIST’s Computer Forensics Tool Testing project, “You don’t want to risk your copying software failing when you try to get data from some new computer that is critical to your case. So, we created these tools to help ensure that the copying software works effectively and transparently.” The federated testing tools allow authorities to run tests in advance on their digital forensic software to make sure ahead of time that it will not fail them when a suspect’s personal computer, media or device arrives in the forensic science lab. Guttman describes the suite as the three most critical tools for evidence acquisition and preservation, each addressing one aspect of the copying process. “One tool tests software for copying computer disks, while another tests mobile device data extraction software. These two test protocols were available previously, but the suite is now completed with a new third test for ‘write blockers,’ which are a sort of one-way valve for data-copying software. An effective write blocker allows data to flow only from the seized device to the copying computer, not the other way around. Later updates to the suite will address additional forensic functions,” said Guttman. The full suite is a freely available Linux file that anyone can download and burn to a blank CD. They can use the disk to boot their workstation and test their copying tools via a user-friendly interface. The NIST software also allows different forensics labs to exchange the results of their tests with each other, so that they can share the burden of exploring how well a copying method works on a specific platform and operating system. Running copying software through its paces generates a report that disparate organizations can share among themselves or with the world, allowing them to indicate whether they found anomalies during the testing or not. “Pooling these traceable results will mean less work for any given lab or organization,” Guttman said, “We don’t require they share the tests, but a rising tide should raise all boats.” Guttman cautioned that the tools will not ensure that a copying or digital forensic process is flawless, only that the results of the job are clearly visible to anyone. “Evidence doesn’t have to be complete to be admissible,” she said, “The key here is that copying does not introduce errors into the data that no one can see.” “Interest in federated testing will go beyond law enforcement agencies,” Guttman added, “Any organization that performs forensics such as civil law firms and corporate enforcement offices, will find a use for the test suite.”  

Read More

Maximising the Benefits of C3 (Command & Control Centre)

A command and control centre (CCC), by definition, centralises the monitoring, control and command of an organisation’s overall operations. It is most often associated with crisis or disaster management in the context of a city or state government body, police or even military agencies. It is also used by universities, transportation departments, utility companies, and any other organisations that need to manage distributed operations. Command centres have been a critical element for successful management of operations and/ or security management, and have been transforming with the advancements in the technological space. With the introduction of rapidly evolving new technologies, new organisational challenges and threats, command centre design and construction have become more complex and challenging than ever before. Today, CCCs need to be modular and should be equipped with correlation rules, process flows, rich algorithms, analytics, reporting, a geospatial platform, an Internet of things (IoT) platform, and other open platform systems. Since each organisation has its own specific needs and purposes for establishing such infrastructure, the command centre should be highly configurable, scalable and operator friendly. In the case of a city governance or safety body, a social media platform can cover voice, text, video, and mobile apps for citizens to interface with the CCC and thus take it to an entirely new level and provide better and efficient services to citizens. Challenges faced by organisations in the planning and operations of CCCs Perception of command centres today A CCC is a centre for information collection, analysis, decision making and management. Its primary purpose is to gather and process all the information required to plan and respond – quickly and effectively – to potential emergency incidents. The fig. 1 next page depicts the building blocks of a command and control solution, which primarily comprises field sensors as data collection points, database systems as information repositories, and communication systems as means for information dissemination, along with the key modules that empower information analysis and presentation of outcomes in a command centre application. The following are a few examples of factors driving the need for CCCs: Increasing technology dependence leading to the need for an integrated and efficient control and management platform. Efficient data handling needs for big data, data mining, analytics, IoT etc. Integrated view to address social, residential, commercial and national security needs. Need for reliable, flexible, sustainable, real-time and scalable systems to provide an integrated view of all sensors compatible with proprietary networks and legacy systems. Need for a collaborative work environment across teams working in silos at different locations. Disparate systems impacting operational efficiencies of businesses and driving up costs. Structured methodology for incident handling ensuring effective decision making and response. Transition from manual processes to system-defined automated or hybrid process. Evolution of command centres The concept of a command centre can be traced back to the 19th century and has continued to evolve since then. In conjunction with technological advancements, a new variety of threats have also arisen. However, each incident has fuelled innovations in counter response, resulting in further advancements in technologies. The fig. 2 next page represents the advancements in terms of threats and counter-response systems over the last three centuries. Establishment of a command centre Often, command centres are conceptualised at later stages of establishing the technology components and infrastructure, and in most of these cases, they end up as inadequate or unsuitable control rooms which are not able to achieve the organisational goals. The first and foremost step is to ensure that the functional goals and measurable key performance indicators are clearly defined at the pre-design stage itself. The selection of the right technologies and service level agreement (SLA) requirements is essential as it directly impacts the end results and the budget required for setting up such infrastructure. Once the functional requirements are documented, the requirements in terms of equipment specifications and other IT and non-IT requirements can be finalised. One of the key parameter for efficient operations of a command centre is defining an incident and its severity. This primarily helps in identification of associated stakeholders, operational process, sensors and systems for finalising the steps to be followed as part of the standard operating procedures (SOPs). Many a times we primarily emphasize upon the digital part only while forgetting about the importance of physical infrastructure design in the operations of a command centre. Being a monitoring and command centre which operates 24×7 for all 365 days of a year, the physical infrastructure for such a facility should be designed post considering the vital parameters such as ergonomics, seating layout in order of operational needs for better collaboration, secure and resilient operations. Once we are clear with the functional requirements and the physical infrastructural design, the next step shall be building capacities within the organisation for operating under such technologically advanced systems in line with the defined goals and KPIs for operations. A regular performance assessment and feedback process ensure that there is a continuous improvement in operating efficiency of the command centre by addressing the feedback for optimisation in relation to the people, process or systems. The last but not the least step is to devise a framework with periodic reporting of welldefined SLAs for measuring the KPIs through performance evaluation. Key challenges in today’s CCCs Presence of manual integrations A key indicator of a wrongly designed command centre is when manual integration of multiple information feeds is done by analysts to provide the operators the tools they need. This can lead to an inefficient utilisation of resources and time. Taking steps to train and improve the efficiency of operators, to derive information efficiently from the feeds puts them in a position to respond to events in a timelier manner, and potentially adds additional value to the organisation. Inconsistent information In many cases, there is a gap between the exchange of information between command centre operators and field personnel. This results in the loss of ‘crucial’ time and a loosely prepared response. Information overload Many command centres get information from various sources, but…

Read More