Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Optimizing the Operations Center

By Tony Lapolito
December 1, 2006
Operations centers are the focal point in times of crisis. Pictured here is the California Department of Transportation’s operations center.


Whether your job is to protect the local streets, your country or the company’s assets – the operations center is the central focal point in times of crisis. In the post-9/11 world, the stars have aligned to develop and harness new technologies to provide additional data for a more effective emergency response.

DATA OVERLOAD

As the operations center increases in complexity, the technology intended to make your job easier could make things more confusing at the most critical times, when seconds matter most.

When operations centers were conceived, the theory was that if there was a call from the location where an incident was happening, an officer could quickly deploy resources to that location. Call boxes, radios and hard-wired telephone lines provided a pretty effective network of communications for emergency response.

More recently the dynamic of a cell phone in every citizen’s hand, and other technology developments such as alarms, license plate readers, analytics like gun shot detectors and facial recognition, GPS equipment vehicles and two way video surveillance intended to provide a more effective response, have at the same time led to information overload.

VIDEO SURVEILLANCE

Billions of dollars are spent annually on video surveillance equipment. Video technology tied into an operations center creates a centralized bird’s eye view of incidents.

There are two issues surrounding video surveillance in an operations center environment: coverage and monitoring. Murphy’s Law tells you that what you are most interested in will happen in a location where you don’t have a camera. Studies demonstrate that an operator’s effectiveness diminishes very quickly while monitoring a video screen for more than 20 minutes.

THE OPERATIONS CENTER – CONVERGED

Everywhere in the world of security and surveillance, there is talk of convergence, e.g., collapsing video surveillance networks onto the IP network. Another important convergence is that of various systems into a single, cohesive intelligent system.

The new vision is a converged operations center that has many features. One of them is access to data from various systems including video cameras, sensors, access control, RFID, GPS and intrusion detection systems. Sophisticated event correlation and tracking across systems is always helpful. State of the art collaboration tools can help prevent or solve security issues. Highly advanced visualization techniques including a large video wall are another ingredient in converged operations. There may be plans to install some emerging technology to make your job easier, but the lack of standards across these systems to enable interoperability may be preventing you from doing so.

Only when you take the various disparate systems and integrate them into a single cohesive system used to manage the situation will you have an operations center operating at maximum efficiency.

SIDEBAR: Roadmap to Integration of a Converged Operations Center

Map out your operational goals
  • When evaluating how to make your vision a reality – you must first map out what you want to accomplish from a day-to-day operations standpoint.
  • Determine what existing systems are still relevant.
  • Once you have outlined your goals, each installed system should be evaluated to determine if it is still relevant to enable your vision.
  • Create a phased implementation plan.
  • Due to the complexity or budgets, it is not always practical to take the “big bang” approach to deploying a system. So once you know where you want to go you’ll want to figure out the appropriate steps along the way.
  • Have a plan that has the flexibility to be deployed in modules.

Vendor Selection
  • Determine what vendors have a shared vision and product roadmap that accommodates your long-term goals. Understanding the roadmap and the refresh plan is critical. Do not accept forklift upgrades – look for companies that provide a seamless migration moving forward.
  • Implement the first phase and measure results.
  • Once you have the roadmap and have implemented the first phase of the plan, it is extremely important to measure the results.
  • Refine plan and implement next phase.
  • Once you have measured the results of the first phase – it’s time to determine if your roadmap is still relevant.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author

Tony Lapolito is with VidSys, which develops operations center software for safety, security and transportation organizations. He can be reached at lapolitot@vidsys.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The true cost of the security operations center

    The economics of the security operations center: What's the true cost?

    See More
  • Colorful text on black screen

    The modern security operations center: Shaping the future of SOCs

    See More
  • Focused man looking at laptop

    How to tackle burnout at the source in the security operations center

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

  • Optimizing Social Media from a B2B Perspective

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing