Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Overload and Fuzzy Alarms

By Bill Zalud
December 15, 2003
Today’s security command and control (C&C) centers run the risk of overwhelming monitoring personnel with too much data. Information pours in from exterior perimeter protection; heating, ventilation and air conditioning; fire alarms; elevator status; vehicle tracking; communications; visitor management; mustering; and site-specific systems such as asset control and asset tracking. The potential for fuzzy alarms increases. A fuzzy alarm, such as a fence sensor that could be triggered by several non-threatening stimuli, requires dispatchers to decide whether to send security personnel to respond to the alarm. According to Bill McGinty of Johnson Controls Security Solutions of Milwaukee, Wis., some techniques help maximize dispatch and response personnel. These include: filtering, automating, combining, prioritizing and presentation.

Filtering

Filtering is a design technique that removes extraneous data from the dispatcher's C&C responsibilities. Many access control systems, for example, use filtering. While it is necessary to maintain a record of all card transactions for audit purposes, there is no need to display or print valid transactions in real-time. Only card activity presented is that with which a dispatcher must interact, such as an attempt to use a reported lost or stolen card. Review all systems in the C&C center to identify opportunities to filter information being presented that does not require an immediate response.

Automating

Where several systems can work in concert, automating the interaction of these systems can minimize response errors and allow faster processing of an event. A campus-wide emergency phone system combined with a modern graphical user interface display and global satellite positioning vehicle tracking is a good example. Once the emergency phone is activated, communication is established between the caller and the dispatcher. Immediately, a map showing the emergency phone's location as well as the location of all available response vehicles is automatically displayed. With no more than a point and click from the dispatcher, he or she is put in touch with the response personnel. At a higher level of automation, the phone activation and map could be sent directly to a display in the response vehicle.

Combining

Security video is an example of a system suitable for combining with other systems to help minimize fuzzy alarms and greatly enhance the audit trail of events. Cameras can combine with tailgating detection equipment to identify tailgate policy offenders. Also, access control can be combined with HVAC to activate lighting and temperature controls without dispatcher intervention.

Prioritizing

Alarms in which a dispatcher must become involved should be given priority status in relationship to all other alarms, thus relieving the dispatcher from diverting attention when unnecessary. For example, one electrical fire can generate a fire signal, power loss signals, alarm signals from doors that are automatically released and HVAC alarms as fans and dampers go into smoke control mode. By prioritizing these alarms, a dispatcher will have a clear direction as to the order in which these alarms should be addressed. Combine prioritizing with predefined, on demand, electronic dispatch instructions and point and click dialing, large amounts of time can be saved in an emergency, while minimizing the potential for error.

Presentation

When defining a function of a C&C center, presentation can have two meanings. The first is the physical design of the center, how displays and controls are positioned to enable the dispatcher to respond quickly and efficiently to events as they occur. This should be reevaluated each time a new system or function is added to the C&C center. Failure to evaluate the effect of adding a new controls and command capability can have a disastrous impact on a once functional center. The second meaning of presentation is the various means in which a dispatcher interacts with the system. The GUI must be customized to accurately reflect the various systems represented. Point and click on-screen commands with drop down menus allow a dispatcher to concentrate on the function aspects of the job, not searching for several subsystems to deal with a single event. Finally, as C&C centers continue to move towards a true "single seat" operations concept, integrators must become qualified on more and more systems so that they can design, install, and service these diverse yet highly related systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Welcome to ASIS Overload

    See More
  • Stop Nuisance Alarms!

    See More
  • SIAC says common sense and cooperation reduces false alarms

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • effective.jpg

    Effective Physical Security, 5th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
  • March 2, 2012

    AVHS

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing