Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Optimizing the Operations Center

By Tony Lapolito
December 1, 2006
Operations centers are the focal point in times of crisis. Pictured here is the California Department of Transportation’s operations center.


Whether your job is to protect the local streets, your country or the company’s assets – the operations center is the central focal point in times of crisis. In the post-9/11 world, the stars have aligned to develop and harness new technologies to provide additional data for a more effective emergency response.

DATA OVERLOAD

As the operations center increases in complexity, the technology intended to make your job easier could make things more confusing at the most critical times, when seconds matter most.

When operations centers were conceived, the theory was that if there was a call from the location where an incident was happening, an officer could quickly deploy resources to that location. Call boxes, radios and hard-wired telephone lines provided a pretty effective network of communications for emergency response.

More recently the dynamic of a cell phone in every citizen’s hand, and other technology developments such as alarms, license plate readers, analytics like gun shot detectors and facial recognition, GPS equipment vehicles and two way video surveillance intended to provide a more effective response, have at the same time led to information overload.

VIDEO SURVEILLANCE

Billions of dollars are spent annually on video surveillance equipment. Video technology tied into an operations center creates a centralized bird’s eye view of incidents.

There are two issues surrounding video surveillance in an operations center environment: coverage and monitoring. Murphy’s Law tells you that what you are most interested in will happen in a location where you don’t have a camera. Studies demonstrate that an operator’s effectiveness diminishes very quickly while monitoring a video screen for more than 20 minutes.

THE OPERATIONS CENTER – CONVERGED

Everywhere in the world of security and surveillance, there is talk of convergence, e.g., collapsing video surveillance networks onto the IP network. Another important convergence is that of various systems into a single, cohesive intelligent system.

The new vision is a converged operations center that has many features. One of them is access to data from various systems including video cameras, sensors, access control, RFID, GPS and intrusion detection systems. Sophisticated event correlation and tracking across systems is always helpful. State of the art collaboration tools can help prevent or solve security issues. Highly advanced visualization techniques including a large video wall are another ingredient in converged operations. There may be plans to install some emerging technology to make your job easier, but the lack of standards across these systems to enable interoperability may be preventing you from doing so.

Only when you take the various disparate systems and integrate them into a single cohesive system used to manage the situation will you have an operations center operating at maximum efficiency.

SIDEBAR: Roadmap to Integration of a Converged Operations Center

Map out your operational goals
  • When evaluating how to make your vision a reality – you must first map out what you want to accomplish from a day-to-day operations standpoint.
  • Determine what existing systems are still relevant.
  • Once you have outlined your goals, each installed system should be evaluated to determine if it is still relevant to enable your vision.
  • Create a phased implementation plan.
  • Due to the complexity or budgets, it is not always practical to take the “big bang” approach to deploying a system. So once you know where you want to go you’ll want to figure out the appropriate steps along the way.
  • Have a plan that has the flexibility to be deployed in modules.

Vendor Selection
  • Determine what vendors have a shared vision and product roadmap that accommodates your long-term goals. Understanding the roadmap and the refresh plan is critical. Do not accept forklift upgrades – look for companies that provide a seamless migration moving forward.
  • Implement the first phase and measure results.
  • Once you have the roadmap and have implemented the first phase of the plan, it is extremely important to measure the results.
  • Refine plan and implement next phase.
  • Once you have measured the results of the first phase – it’s time to determine if your roadmap is still relevant.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author

Tony Lapolito is with VidSys, which develops operations center software for safety, security and transportation organizations. He can be reached at lapolitot@vidsys.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing