Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity & Business Resilience

Managing Mass Communication in Tornado Alley

Tornado Alley is a colloquial term for the area of the United States where tornadoes are most frequent.

By Diane Ritchey
Tornado Alley

The new mass notification system at the CenterPoint Energy Tower had to be designed to provide mass notification for emergency and fire communications to all building occupants and personnel. CenterPoint Energy Towers photos courtesy of MIRCOM Group of Companies

Tornado Alley

The CenterPoint Energy Tower building in downtown Houston recently replaced an existing fire alarm system with a mass notification system to fit its growth plans.

Tornado Alley
Tornado Alley
Tornado Alley
Tornado Alley
May 1, 2014

Tornado Alley is a colloquial term for the area of the United States where tornadoes are most frequent. The term was first used in 1952 as the title of a research project to study severe weather in parts of Texas and Oklahoma. Although the boundaries of Tornado Alley are not clearly defined, its core is northern Texas, Oklahoma, Kansas and Nebraska.

In the heart of Tornado alley, building codes are often stricter than those for other parts of the U.S., requiring strengthened roofs and more secure connections between the building and its foundation. Other common precautionary measures include the construction of storm cellars and the installation of tornado sirens. Tornado awareness is also high.

That’s where mass notification systems come into play, as well, as is the case with MillerCoors’ Fort Worth, Texas, brewery, which is located in Tornado Alley and sees about 25 tornadoes each year. The brewery employs 105 employees spread across 150 acres, and it brews 9 million barrels a year. It houses an on-site refrigeration system with 150,000 pounds of ammonia to assist with the brewing process.

The combination of the two – its location and the fact that it handles dangerous chemicals – spearheaded a recent decision to set up a mass communication system.

Jack Moss, Environmental, Health, Safety and Security Manager at MillerCoors Fort Worth, said “We had a gap in our mass communication system; we didn’t feel confident in the system that we had could communicate across 150 acres to our 705 employees in the event of a tornado or a chemical spill.”

The new system in place, WAVES from Cooper Notification, is designed to protect, alert and inform employees of what to do in an emergency. Covering large geographic outdoor areas, like the one at the MillerCoors brewery, it broadcasts crystal-clear voice messages, tones and sirens. It also includes a range of visual devices, including strobe appliances and LED signage. At MillerCoors, the WAVES system sends three loud blasts across the campus. Based on the situation there’s a prerecorded message, so for example, three loud blasts to alert about severe weather or a chemical spill.

There’s no doubt that the brewery’s employees hear the system, Moss says. “The first time that we activated it, the city of Fort Worth talked to us about code compliance for noise. But we owe so much to the public because we house so many chemicals. Our old PA system would sound in zones, and you couldn’t hear it and reach 100 percent of the employees. Last fall we tested the system, and we had 100-percent participation. Our employees took shelter in 14 minutes on the first shift, eight minutes on the second shift and in nine minutes on the third shift.”

In another example of notifying a large amount of people, the CenterPoint Energy Tower building in downtown Houston recently replaced an existing fire alarm system with a mass notification system to fit its growth plans.

The CenterPoint Energy Tower is a 47-story mixed-use skyscraper that is considered to be a Houston landmark. It has a six-story extension with a large opening for visual interest. The building also features a basement with underground tunnels leading to other high-rise buildings, a full cafeteria-style dining room, a shopping area, a loading dock and three floors of underground parking garage space.

As part of a recent and overall restructuring of the CenterPoint Tower, it was time for a fire alarm and communications upgrade as well. The CenterPoint Tower required a retrofit of a new fire alarm network and mass notification system to complement the major restructuring and restoration of the infrastructure of the building. The solution had to be designed to provide mass notification for emergency and fire communications to all building occupants and personnel. The building’s original competitor system reached the end of its life due to chip failure.

The retrofit entailed a direct one-to-one replacement of the preexisting fire alarm equipment with FleX-Net Intelligent Fire/Mass Notification solution and CLIP protocol detectors/modules from Mircom branded solutions while utilizing pre-existing cabling.

Mircom branded solutions is a systems monitoring tool that gives visualization of on-premise emergencies. That visualization tool is important, as firefighters and first responders rely on a tactical display to assess dangers and threats in a facility that could be compromised by terrorists or weather emergencies.

The system installed at CenterPoint includes a touchscreen monitor custom fitted into a BB-5008 enclosure with a FleX-Net main panel. The system provides easy configuration and customization of alarm devices, including up to 500,000 addressable devices and event logging of up to 500,000 events.

 


7 Things to Consider When Choosing a Mass Notification System

 

SunGard Availability Services, which provides disaster recovery, cloud services, managed services, IT consulting and business continuity management services, offers seven considerations to use during an evaluation of emergency notification systems:

  1. Performance. Your organization may need to alert tens, hundreds or thousands of people affected by an event. Look at a notification system’s track record of actual performance during real events. Examine: how many messages are sent through the network per month and year? What is the system’s capacity potential across multiple notification touch-points simultaneously, such as voice, SMS and email messaging? Compare the results to assess the performance capabilities that you need.
  2. Reliability. A solution provider’s guarantee for network uptime is a critical consideration. Anything less than 99.99 percent may not provide the reliability you need. Reliability also needs to extend to message delivery. What’s the delivery performance service level agreement? Do they provide a guaranteed minimum throughput in a timeframe specified by the customer? Does the system capacity model allow for the ability to ‘‘burst’’ beyond your service level? Can the vendor delivery platform manage the capacity needed to meet your requirements?
  3. Business continuity management integration. In most organizations, people come and go – and staying synchronized with those changes is a difficult chore. An emergency notification system should integrate and synchronize with employee, team and call list information already created and stored in your business continuity management software. This approach not only eliminates the need to keep two data sources, but also helps ensure your organization is working from a unified continuity planning strategy.
  4. Security. From employee contact information to the messages communicated during a crisis, content held within an emergency and mass notification system is likely confidential. A system must have state-of-the-art security capabilities, such as a geographically redundant infrastructure that includes data encryption and reliable network security. Look for third-party certifications such as ISO/IEC 27001 to ensure your vendor has an established program in place to manage information security controls.
  5. Communication options. You will most likely need more than one communication path to reach all the people in your organization – particularly if you operate globally. You should ensure that your emergency and mass notification system has a range of message delivery options, including personal devices such as email, smartphones, pager (one-way or two-way), mobile phone/landline, SMS and fax, as well as mass alerting devices such as sirens, loud speakers and digital display boards.
  6. Interactive communication. Two-way communication is essential in a crisis, allowing you to communicate to your employees and they back to you. Employee responses can help you ensure their safety and make educated decisions – such as activating back-up personnel plans if employees are unavailable, which can limit downtime and revenue loss by speeding time to recovery.
  7. Global Capabilities. Many organizations operate internationally, and it is essential for these companies that emergency and mass notification capabilities span the globe. A notification system vendor should be able to manage carrier to carrier and country to country complexities. Considerations should include reach (the specific countries supported), voice/text management (global delivery complexities as it relates to voice and SMS communication) and languages (ability to record messages or have recorded prompts and TTS languages). Look for a notification system provider that has the global delivery experience and expertise managing multiple international standards and protocols. 
KEYWORDS: disaster preparation mass communication mass notification security risk management tornado preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • mass not feat

    How Mass Notification Protects Schools and Reduces Stress in K-12

    See More
  • Keeping your security business afloat

    Managing Business Continuity and Resiliency in 2015

    See More
  • Mass Notification Feature Image

    Mass Notification’s New Role

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing