Staying in control

April 2013 Surveillance

The number of security control rooms has increased over the past few years as organisations see the benefits of monitoring the movement of people and even processes. The big question though is whether your control room is delivering the goods. Hi-Tech Security Solutions spoke to a human factors specialist, a designer/manufacturer of control room furniture and consoles, and a security systems integrator to find out how to ensure optimised quality output in the control room.

The right person for the job

So what criteria should you consider when employing someone to work in your control room? Do you want someone with IT skills, an ex security guard or perhaps a ‘crook to catch a crook’?

Craig Donald, director at Leaderware and regular contributor to Hi-Tech Security Solutions, says that one should first define the purpose of the control room. “Is it a security monitoring control room or an emergency reaction control room? The type of person you would select as an operator varies depending on the intent of the operation. For an emergency control room you require a person who remains calm and collected under pressure, has good communications skills, is a good listener, is able to speak well and clearly, can define the key factors, can understand and analyse situations, can identify subtle nuances both on a monitor and verbally on the telephone, and has high levels of accuracy.

“On the other hand, your security monitoring operator should be vigilant, have concentration and observation skills, be analytical in terms of separating relevant and irrelevant items and events, identify things that do not fit in a situation, and be able to interpret body language,” he continues.

In either scenario, the more experience an operator has in the field, the better able they will be to relate and appropriately react to events. However, even if a potential candidate has experience as a security guard, unless he has the other attributes required, he will be unable to effectively cope with the stresses and demands of the job. Likewise, a ‘reformed’ criminal might understand how crimes are committed, but you still need to have some assurance of their integrity.

According to Donald, some of the skills that are often overlooked during the selection process are whether the person can write an effective and understandable report; their ability to accurately capture data; and the ability to calmly answer the phone in an emergency situation. In addition, observation skills and the ability to correctly analyse a video are deemed important and should be thoroughly checked and assessed. “It would be true to say that many of the skills required by a good control room operator are inherent rather than acquired skills.”

Kelly McLintock, group managing director at the UTM Group says that an operator should have a comprehensive understanding of security and risks. “Sadly, the risk equation is often missing from their skills set. The same cannot be said of a criminal, who very clearly identifies and understands risk.

“The ideal candidate would be computer literate, have a trained understanding of human behaviour, be able to think outside the box and have a lot of patience. A personality index will provide a good gauge of whether a person is suitable to work as a control room operator.

“Interestingly, we have found that women who have children are most often the best candidates as control room operators. This can probably be attributed to the fact that they have subconsciously trained themselves to literally have ‘eyes in the back of their heads’. This ability to employ their peripheral vision so effectively is a great advantage in a control room with multiple monitors. In addition, they show great attention to detail and are able to multi-task,” McLintock points out.

Quality in, quality out

Penny Bond, CEO of ProGroup Manufacturing, believes that the ergonomics of a control room play a critical role in the quality of the service supplied. “The control room should be designed for the comfort of the operator. However, the furniture, specifically the chair, should not be so comfortable that the operator feels inclined to doze off to sleep.

“The desk should be designed in such a way that controls are within easy reach and monitors are mounted for optimised viewing. Correct lighting is very important and should be neither too dim nor so bright that they cause reflection and glare on the monitors. The ambient temperature should be conducive to productivity and here a superior HVAC system is worth investing in.”

In addition to the control room itself, a recreation room should be provided for operators to take breaks during their shifts. Since they often do not leave the control room environment during their shift, due to access issues, this provides them with a welcome respite from the high levels of concentration required.

“Wear and tear is quite extreme within a control room, since operators are generally working in shifts around the clock, 365 days a year. As equally important as the initial design of the control room is the maintenance of its components, for maximised productivity of operators,” adds Bond.

McLintock agrees that correct layout is a key factor to quality output. “In addition, the technology they use should be chosen for ease of use and interpretation. Providing operators with superior tools for video analytics, searching and reporting is advantageous to all.

“With respect to the physical environment, we have found from experience that bomb-proof control rooms are too dark and require extensive lighting. There is a very delicate balance between providing a comfortable ambience and lulling your operators to sleep. We recommend that operators take a comfort break after 45 minutes to ensure that their concentration levels are kept consistently high,” he notes.

Quality is core

Policies and procedures play a crucial role in the control room. “If these are not adhered to, quality immediately suffers. One way of ensuring adherence is by providing adequate supervision. Coaching of employees should be supplied and feedback on their actions and performance should be provided to identify issues before they escalate,” says Donald.

“We outline three elements to success: process, policy and procedures. When any one of these factors is ignored or neglected, it impacts negatively on both the other elements. You need to close any loopholes rapidly to be effective,” adds McLintock.

“By establishing that the service provider understands the client’s requirements upfront, compliance issues can be avoided. The client should influence the contents of the service level agreement (SLA), rather than the service provider merely dictating the terms. This is a collaborative effort, with the ultimate aim of producing an outcome that is favourable to all stakeholders,” Donald concludes.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.