Incident management goes universal

July 2010 Perimeter Security, Alarms & Intruder Detection

Tiaan Janse van Rensburg, from Technology Solution House says it is time to do away with the dog-eared incident books.

Anybody who has spent time in the facilities management, security or engineering disciplines would recognise the following items:

* Security incident register.

* Site visitors book.

* Control room visitors log book.

* Fault log book.

* Key register.

* Contractor register.

* Health and safety, power, HVAC, plumbing, lights registers.

* Maintenance register.

Noticed the frequency of the words 'book' and 'register' in the list? A multitude of paper-based systems exist in the security and facilities industries. Most incidents or occurrences within a control room or facility are currently logged in what is generally referred to as an occurrence book.

The above-mentioned is usually accompanied by the much dreaded phone call from a customer that instils fear in the heart of the most hardened control room manager and service provider: “I want an immediate consolidate report of all my sites”; or, “There was a break-in at site XYZ three months ago, tell me what action was taken on that specific occurrence and what similar occurrences happened during the last six months at all my sites …. I will hold”.

Due to the fact that occurrences are logged by hand and on paper makes it almost impossible to receive timely updates on any outstanding occurrences, extract reporting from the myriad of books or do trend analysis. Service providers find that a huge amount of time is spent extracting information from these manual repositories while the customer gains limited value from the reports due to the lapsed time between the actual occurrences and received monthly reports.

Current solutions

What are the solutions for both the building owner and security or facilities manager, responsible for at least two sites, looking to extract facility business information and better manage operational spending; or the progressive service provider who wishes to pre-empt the customer and provide better business information and value for money?

There are numerous solutions available in the market. Some are developed locally, but most are sourced internationally and supported locally. These solutions usually fall into three categories, namely IT incident management software based on the ITIL standard, facilities management (FM) solutions and risk management solutions. The latter includes security, risk management and electronic occurrence books. These applications are installed and used by only a fraction of the industry and are prevalent in the corporate environment or with advanced service providers to the corporate environment. Why is this?

Barriers to entry


Most of these applications are expensive. Installation and training costs run between tens and hundreds of thousands of rands. Operating costs normally consist of monthly maintenance cost or application rental, and in many instances place these solutions firmly out of reach of the majority of companies.


Many of these applications are specialist applications providing functionality for almost any foreseeable situation. The value of these applications is immense and indispensable in complex environments. But, if we call on the Italian economist Vilfredo Pareto and his 80/20 principle, it is obvious that only a fraction on any industry has a need for such complexity. The knock-on effect of such in-depth functionality is also evident in the above-mentioned cost and skills and training of the operators.

Skills level and training

To operate complex applications requires significant training (which is lost if the resource resigns) and has noteworthy cost implications. The skills level and aptitude of the operators also becomes an issue at this point and finding and keeping such resources poses a challenge.

Do not forget convergence

The word convergence has been overused and lost almost all its impact, but where there is smoke there usually is fire.

In the facilities management and security industries, convergence is a reality, not only in terms of IP-based devices, shared networks and servers, but also in the management and maintenance of these functional layers. For example, building management systems (BMS) are no longer locked in a basement somewhere but are fast becoming a business application running on a server supported by the IT team. Similarly, as security and facilities are now using the same networks and servers as IT, the management and maintenance of these devices are moving closer together and usually gravitating towards the IT manager who is now responsible for all IP devices: laptops, printers or CCTV cameras. This leads, albeit sometimes as an unintended consequence, to the standardisation of incident logging, management and reporting.

Unified management framework

A unified management framework of all converged support layers (network, database and server, application), functional areas and solutions (ICT, physical security, building management etc,) is an extensive subject and I will only briefly mention it here. As the functional solutions and devices all become IP-based and are run on the same networks and servers to decrease costs and increase efficiencies, it makes sense that the management of these operational areas also converge into a coherent unified management framework. Such a unified framework consists of a number of layers namely standardised operating policies and procedures, operational management, maintenance management and business reporting.Which brings us to a simple but effective part of such a unified framework, which is the standardised logging, management and reporting of facility-wide incidents

A different way

Most companies cannot afford separate systems for logging IT related incidents, facilities management incidents and security occurrences. So let us take a closer look at the 80% of companies which have more than one site. It is safe to say that they will have a network connecting their sites, a connection to the Internet, a small data centre, a number of employees using PCs, laptops and printers, some level of facilities management and a security component consisting of guards, CCTV, access control and CCTV monitoring. Some of these functions may be outsourced and some may be supported internally.

So what are required by these companies?

* An application that is universal enough and can be used to log all kinds of incidents while storing significant detail of each type of incident.

* An application flexible enough to adapt to almost any kind of business and industry.

* Core functionality which consist of best-practice incident logging processes.

* Multisite functionality.

* Instant consolidated reporting on all sites, categories of incidents etc.

* An application that is easy to install and requires limited training to be operated, in other words no specialist skills need to be employed.

* It should be so easy to use that almost no software support is required.

* It should assist in managing vendors and service providers at a glance.

* The facilities, IT or security manager must be able to see all incidents which are logged while each service provider must only be able to see the incidents allocated to them.

* So cost-effective that the business value per site far outweigh the costs.

Implementing such a universal incident logging application would not only have the obvious impact of timely business information by replacing numerous paper-based systems and reducing the number of occurrence books, it will also have a number of knock-on effects. It will improve vendor and service provider management and provide a platform for moving towards a unified management framework, which will further reduce costs.

For more information contact Technology Solution House, +27 (0)82 565 8081,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

ASSA ABLOY acquires Amecor in South Africa
Amecor Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
ASSA ABLOY has signed an agreement to acquire Amecor, a well-known South African manufacturer of security communication equipment in the South African security market and beyond.

Different fences for different farmers
Gallagher Perimeter Security, Alarms & Intruder Detection Agriculture (Industry)
Far beyond the simple delineation of boundaries, fencing serves as a dynamic solution to address various needs, from ensuring the security of farms and protecting livestock to defining property lines and enhancing aesthetic appeal.

Protect remote sites with volumetric thermal detectors
OPTEX Perimeter Security, Alarms & Intruder Detection
Remote sites have always been more vulnerable to opportunistic intrusion, but over the last two years in particular, sites such as solar farms or industrial parks have become more common targets for criminals.

Stafix focuses on local manufacturing
Perimeter Security, Alarms & Intruder Detection
Stafix Security Centres is a South African-owned company committed to providing customers with a choice of quality imported and locally manufactured products that meet the needs of the electronic security market.

Texecom launches latest SmartCom 4G Communicator
Perimeter Security, Alarms & Intruder Detection
Texecom announced the upgraded and enhanced version of its SmartCom 4G communicator. Signal sensitivity on all the main bands has also been improved, increasing the usable range from masts, in some instances, by up to four times.

Olarm advances smart security with Texecom integration
Olarm News & Events Perimeter Security, Alarms & Intruder Detection Products & Solutions
Following Olarm’s achievement as the OSPA 2023 winner of ‘Outstanding Security Integrator’, it has taken another significant step in its innovation journey with the announcement of its integration with Texecom Premier Elite.

Texecom increases support in the EMEA with key appointments
Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
Texecom announced two new appointments to its EMEA sales team: Thomas Vanden Wyngaerdt as Head of EMEA Sales and Tom Wright as EMEA Account Manager.

JVA electric fence systems
Perimeter Security, Alarms & Intruder Detection
JVA offers a wide range of perimeter-monitored fence solutions (including low and high voltage, amperage, taut wire, and vibration monitoring), as well as a variety of fence line accessories designed for the South African market.

A good security system starts outside
OPTEX Perimeter Security, Alarms & Intruder Detection
Outdoor intrusion detectors have been specifically designed to expand the security coverage beyond the confines of a building and to warn of anyone approaching as early as possible.

Simple panic system for estates
Perimeter Security, Alarms & Intruder Detection
RDC’s Panic Packs, combined with remote panic buttons, offer a simple and affordable panic solution that ensures residents can access immediate help in times of distress.