Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Overload and Fuzzy Alarms

By Bill Zalud
December 15, 2003
Today’s security command and control (C&C) centers run the risk of overwhelming monitoring personnel with too much data. Information pours in from exterior perimeter protection; heating, ventilation and air conditioning; fire alarms; elevator status; vehicle tracking; communications; visitor management; mustering; and site-specific systems such as asset control and asset tracking. The potential for fuzzy alarms increases. A fuzzy alarm, such as a fence sensor that could be triggered by several non-threatening stimuli, requires dispatchers to decide whether to send security personnel to respond to the alarm. According to Bill McGinty of Johnson Controls Security Solutions of Milwaukee, Wis., some techniques help maximize dispatch and response personnel. These include: filtering, automating, combining, prioritizing and presentation.

Filtering

Filtering is a design technique that removes extraneous data from the dispatcher's C&C responsibilities. Many access control systems, for example, use filtering. While it is necessary to maintain a record of all card transactions for audit purposes, there is no need to display or print valid transactions in real-time. Only card activity presented is that with which a dispatcher must interact, such as an attempt to use a reported lost or stolen card. Review all systems in the C&C center to identify opportunities to filter information being presented that does not require an immediate response.

Automating

Where several systems can work in concert, automating the interaction of these systems can minimize response errors and allow faster processing of an event. A campus-wide emergency phone system combined with a modern graphical user interface display and global satellite positioning vehicle tracking is a good example. Once the emergency phone is activated, communication is established between the caller and the dispatcher. Immediately, a map showing the emergency phone's location as well as the location of all available response vehicles is automatically displayed. With no more than a point and click from the dispatcher, he or she is put in touch with the response personnel. At a higher level of automation, the phone activation and map could be sent directly to a display in the response vehicle.

Combining

Security video is an example of a system suitable for combining with other systems to help minimize fuzzy alarms and greatly enhance the audit trail of events. Cameras can combine with tailgating detection equipment to identify tailgate policy offenders. Also, access control can be combined with HVAC to activate lighting and temperature controls without dispatcher intervention.

Prioritizing

Alarms in which a dispatcher must become involved should be given priority status in relationship to all other alarms, thus relieving the dispatcher from diverting attention when unnecessary. For example, one electrical fire can generate a fire signal, power loss signals, alarm signals from doors that are automatically released and HVAC alarms as fans and dampers go into smoke control mode. By prioritizing these alarms, a dispatcher will have a clear direction as to the order in which these alarms should be addressed. Combine prioritizing with predefined, on demand, electronic dispatch instructions and point and click dialing, large amounts of time can be saved in an emergency, while minimizing the potential for error.

Presentation

When defining a function of a C&C center, presentation can have two meanings. The first is the physical design of the center, how displays and controls are positioned to enable the dispatcher to respond quickly and efficiently to events as they occur. This should be reevaluated each time a new system or function is added to the C&C center. Failure to evaluate the effect of adding a new controls and command capability can have a disastrous impact on a once functional center. The second meaning of presentation is the various means in which a dispatcher interacts with the system. The GUI must be customized to accurately reflect the various systems represented. Point and click on-screen commands with drop down menus allow a dispatcher to concentrate on the function aspects of the job, not searching for several subsystems to deal with a single event. Finally, as C&C centers continue to move towards a true "single seat" operations concept, integrators must become qualified on more and more systems so that they can design, install, and service these diverse yet highly related systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Welcome to ASIS Overload

    See More
  • Stop Nuisance Alarms!

    See More
  • SIAC says common sense and cooperation reduces false alarms

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • effective.jpg

    Effective Physical Security, 5th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
  • March 2, 2012

    AVHS

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing