Control room management and processes

Residential Estate Security Handbook 2016 - Vol 2 Residential Estate (Industry), Security Services & Risk Management

In providing security consulting and management services to a number of security estates throughout South Africa, ranging from small six-unit developments to large residential-themed estates, the need for a centralised control room facility is a key aspect in ensuring the safety and security of homeowners, residents, employees and visitors.

Brian Sharkey
Brian Sharkey

Creating space

A number of small to medium size developments have seen the need to improve security technology as better, more efficient and cost effective security systems became available. The crime situation and perceived value obviously has an impact on decision-making.

The single biggest hurdle to be overcome in existing estates as a result of any upgrade is creating space to house new equipment and the monitoring thereof. A number of clients have needed to undertake major building works as a result, in most cases by adding a new floor for a control room facility and equipment storage above the current gatehouse, or extending an existing building. A new facility would also require air-conditioning and secure access to the control room itself.

There are also a fair number of large, older, established estates that have over the years also expanded their control room facilities. Thankfully developers of newer larger estates recognise the need for sufficient space as these control rooms are often operated by more than one controller, and have control room managers not only to manage the estate security systems, but also the estate security service provider’s operations.

Management and processes

Just think for a moment of some of the many systems and associated equipment that could be situated in a control room of a security estate:

CCTV: PTZ and fixed cameras (access/egress controls and perimeter, and in some cases lifts).

Access control systems: Biometric monitoring and recording authorised entry/ exit of residents, owners, visitors, domestic employees, deliveries, contractors’ vehicles and labour.

Communications: Radio, telephone, emails, audio monitoring internal/external.

Perimeter: Electric fencing systems, zones, fibre, voltage monitoring.

Alarm monitoring: Management of alarms and responses to residential properties within the estate.

Fire systems: Clubhouse, kitchens, offices.

Tracking systems: Security officers, patrol and response officers, HOA vehicles.

Backup power supply: UPS, generators.

Equipment racks: UPS, power supplies, DVRs, NVRs.

Now consider how critical it is to have well trained control room operators and managers responsible not only for operational purposes, but also for regular testing and ensuring effectiveness of all the systems utilised.

Critical to the smooth operation of a control room is a detailed security operational policy, with clearly defined job descriptions for all personnel. For an operator to be effective he/she needs to take regular breaks away from the control room, there have been several articles written on the subject and the benefits obtained.

Control room console layout

Another key component when planning a control room layout is for CCTV monitors of high-priority camera views, and alarm monitoring by the operator, such as perimeter and residential homes alarm systems, which should be placed directly in front of the operator. Our observations are that the trend among larger estates is to place cameras’ monitors on a wall in front of the operators, but at some distance, only allowing the operator to drag a camera to a larger monitor on the console for clearer or closer inspection.

Camera monitors with alarm inputs, such as the perimeter cameras, should be in close proximity to the operator. Think about the software required in the operation of a camera system that should be set to receive an alarm input view, software should not be able to automatically ‘override’ this view should another alarm input be received almost simultaneously. Criminals will often trigger one area initially and almost simultaneously trigger another to test the response, and to ascertain if an override is in place.

Ergonomics and aesthetics

A control room operator needs to be 'comfortable' as well as effective, spending hours in a chair that is not suitable for the job can lead to discomfort and lack of concentration. Lighting obviously plays an important role in control room design. It is always ideal to have a small kitchen area/rest area nearby, so food is not brought into the control room environment.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
A winning combination for modern cybersecurity
Information Security Security Services & Risk Management
Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.

Read more...