Decentralised operations is where it’s at

CCTV Handbook 2021 Editor's Choice

The old ‘traditional’ control room or monitoring centre is a thing of the past. While many still rely on the simple processes of old to secure their premises, assets and people, the remote monitoring solutions of today offer enormous potential to do more and as customers look at ways to justify their security spend, getting more out of your security control room is more important than ever.

In addition to this, the pandemic continues to affect businesses as they are impacted by economic and political turmoil globally. This has a direct impact on their risk requirements and therefore also on security providers at all levels. The old control rooms of the past can’t handle this change in risk profile and have to adapt.

Although many outsiders would look at control rooms as a static environment, the market has gone through various changes in recent years. Control rooms are evolving into operations centres. Operations centres serve a variety of applications including, but not limited to, risk management, surveillance, process management, network monitoring, personnel management and asset management.

Looking beyond the horizon, the Industrial Internet of Things (IIoT), SOCs (security operations centres) and NOCs (network operations centres) will broaden their focus beyond security to accommodate smart, interconnected technologies, such as sensors and analytics software, especially due to control rooms moving towards the inclusion of general risk management.


MJ Oosthuizen.

This means the software to run these control centres is increasingly sourced as a cloud-based service, enabling more effective collaborations between multiple network applications and allowing a control centre to be located in multiple locations (even the operator’s home in case of lockdowns). This shift makes it easier for NOCs and SOCs to undertake remote asset management and data monitoring. Securing these environments against cyber threats requires another set of expertise, but it is the combination of both ‘security universes’ that offers client flexibility and peace of mind.

Moreover, with the increasing spotlight on operator effectiveness, digital workspace solutions for control room operators must focus on reducing stress, while promoting ergonomic working and supporting healthy shift duty patterns, whilst utilising the enhanced tools to make prompt and better informed decisions ”

A decentralised future

Expanding on the decentralisation of control room operations, a factor not unique to this business in a world focused on digitisation, centralised business operations are becoming more decentralised. A typical structure would have been hierarchical, with a collection of local operational centres feeding into a cluster hub, which reports into a global control centre.

A new model is emerging with the innovation of software, facilitating improved collaboration and communication across multiple locations. This means that business-critical decisions can be made on a company-wide scale; a functional benefit suited to those operating out of multiple locations. This structural shift will continue as businesses recognise the benefits. For instance, decentralised operations can focus on localised asset management, resulting in faster data processing speeds.

Bringing automation into the overall picture, these automated processes are managed by escalation. They oversee and analyse data flows and alert operators if irregularities are identified by sounding an alarm. This reduces the need for continuous monitoring of data flows by personnel as the software is able to analyse vast amounts of data, identifying potential issues and recommending de-escalation protocols, which are then authorised by an operator.

To this end, it is important that the operator/officer on duty knows what to do when an alert is raised, both in terms of assessing the event and knowing what to do in different situations. An alert operator, having an in-depth understanding of the SOP (standard operating procedures) and the response to this type of alert is equally as important as the technology that created the event. A skilled and well-trained operator/officer simply cannot be replaced.

We focus on pro-active and informed responses and therefor offer services to our clients which are based on a detailed risk assessment per site, to ensure the risk is completely understood on all levels. These services are on offer to all clients, new and old and are used to complement the services and response to a situation.

A control room is not enough

While a control room can offer any number of solutions to its client base, customers today are no longer satisfied with their service providers simply raising an alarm or ‘watching over the premises’. A more holistic solution is required and clients want to know what service they are paying for pertaining to response, reaction and resolution. However, this requires more than a camera or two.

The effective use of technology in the provision or procurement of a service means the client needs to have the right technology properly installed and configured in the right places. Amazing technology on old TV programs like CSI made it look easy, but magic is restricted to Hollywood. Neither the operator nor the software can materialise a licence plate, for example, if the camera isn’t pointed at the right place and the image is not clear enough.

Accurate placement of your cameras on site is crucial to your security. If your response company can’t see an incident happening, they can’t manage or stop it. As with any security system, professional installation and maintenance is key as you already have professionals monitoring the system. Whether you choose video verification or monitoring, you want a seasoned security installation team to have your back and preferably, one that will be around for the foreseeable future.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.