ROGER THE MODERN ALARM SERVER

Similar documents
»Alarming and Evacuation«

University. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

Public Services. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

MobiCall-Client PC Safety at work

Health Care. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

GMS GRAPHICAL MANAGEMENT SYSTEM

MobiCall Silent Alarm

"VOICE OF SECURITY: Trends In Intercom, Public Address, and Mass Notification Emergency Communications

Building Integration System. Your platform for customized security and safety management.

MobiCall. Unified Event Communication

MobiCall. Unified Event Communication

WIN-911: Advanced Alarm Notification Software

ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY

MobiCall. Unified Event Communication

Session VI Smart safety systems

PcVue Solutions. PcVue Solutions

DATA SHEET BENEFITS CURRENT CHALLENGES SSM INFOTECH S X-FORCE AMS - THE IDEAL SOLUTION

SUCCESS STORY EUROPA-PARK A WinGuard Reference Project

Compact Product Suite Compact HMI 6.0 Overview ABB

MobiCall. Unified Event Communication

Driving simplicity. Facility and security management in a single interface

Architectural and Engineering Specification for a Security Management System. StarNet 2

Home Automation. Product info. Marketed By: BlueSilica Technologies For further details write to

Success Story Claas. Ein WinGuard Reference Project

MobiCall. Unified Event Communication

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software

Perimeter Product Overview. Effective protection for your business

Content INTELLIGENT VEHICLE MONITORING SYSTEM CENTRAL MONITORING SOFTWARE MOBILE CENTRAL MONITORING SOFTWARE PLAY BACK SOFTWARE F-1

Patriot Systems Limited

PYROSOFT. Software for DIAS infrared cameras in industry and research & development. Standard and application specific software Overview & Features

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

Smart Wireless Sensor

Using ANM Mobile CHAPTER

Smart Wireless Sensor

Enterprise GIS Architecture Deployment Options

HikCentral Web Client. User Manual

Organize your security with PSIM + software

Organize your security with PSIM + software

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire

UD-VMS510i. Surveillance Management Center

FALCO Access Control. Product Training

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC

HikCentral Web Client. User Manual

Moving to the Cloud: The Potential of Hosted Central Station Services

Designing the Right Access Control System A Case Study. 12 th May 2010

Access CONTROL. MANAGEMENT Software

Wireless M2M Solutions

Am I safe working in this building?

Advisor Advanced Mobile Application User Manual

Pharmagraph. envigil-fms Environmental Monitoring System

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

Security made in Germany

Honeywell Total Connect Remote Services

Patriot Systems Limited

Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants

About IntraLogic. In Business since 2004 Over 55 Full time employees

SOLUTIONS FOR SENIOR CARE FACILITIES BUSINESS COMMUNICATION SERVERS

«Smart Home Technology» by Quadrobit: security energy comfort

WHAT HAPPENS NEXT FOR ADT SMART BUSINESS CUSTOMERS

DSS. Dahua VMS Platform

Intelligent alarm management

TPS Virtualization and Future Virtual Developments Paul Hodge, Honeywell

UltraSync Modular Hub

The Leaders in Security and Life Safety Communications

Notice... 1 Trademarks... 1 US Patent Numbers... 1 Technical Services Contact Information... 2 Document Conventions... 2 Warranty...

ABB Ability System 800xA Alarm Management

BlackBerry AtHoc Networked Crisis Communication Siemens Indoor Fire Panel Installation and Configuration Guide Release Version 7.

ThermoControl 0 C - 10 C - 20 C - 30 C

Cold chain monitoring technologies. Facility monitoring

Millenium Electronic Access Control Systems Networked Real-Time Access Control

Samsung SDS BMS Ver.2.0. Technical Specification

DeltaV Operate. Product Data Sheet DeltaV Operate December 2006 Page 1. Introduction. Benefits

Secure Your Way of Life. Now Compa ble With. Climax Home Portal Platform. Enable a Connected Future

Pro-Watch Facility Manager

Avigilon Control Center 5 System Integration Guide

Overview. Executive Summary. Solution Description CHAPTER

The Windcrest Remote Alarm for Passenger and Goods Lifts with Optional BS EN81-28 & BS EN81-70

USER S GUIDE. AXIS Cross Line Detection

Access Professional Edition. The flexible access control system that grows with your business.

Chapter 1 Introduction

The WAVE Plus Instant Notification System for Schools and Colleges

SMART. FLEXIBLE. RELIABLE.

Artificial Intelligence Enables a Network Revolution

Application Notes for Configuring NovaLink NovaAlert SIP with Avaya IP Office Issue 1.0

MobiCall. Unified Event Communication Platform

KEY FEATURES EASY ACCESS. Through web browser for both clients and administrators CLIENT MONITORING. Not dependent on access to site network

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports

Clare Dealer Playbook

Control Centre Technology

WHEN IT COMES TO LIFE SAFETY, THERE S NO MARGIN FOR ERROR.

Success Story Henkel. A WinGuard Reference Project

Operation Manual Fighter ProVision Software. Version: 0.0 Revision: 1

ARCHITECTURAL AND ENGINEERING SPECIFICATION

D-Link Central Management System

Inveron Hazard management system

Technologies Hazard management system. Inveron Hazard management system

Net2 Access Control. Paxton Access

Clino System 99. Intelligent Life Care Integrated Communication Systems for Care Provision

Gallagher Perimeter Product Overview

Process alarm. Deliver messag e. Alarm event. Feedbac k. Process feedback

Transcription:

ROGER THE MODERN ALARM SERVER 01

TABLE OF CONTENTS CONTENT PAGE 03 PAGE 04-05 PAGE 06-07 PAGE 08-09 PAGE 10 PAGE 11 PAGE 12-13 PAGE 14-15 PAGE 16-17 PAGE 18-21 PAGE 22-23 PAGE 24-25 PAGE 26-27 PAGE 28 FOREWORD ROGER SILENT ALARM OR FACTORY ALARM ROGER FEATURES AT A GLANCE ROGER USER STORY ROGER - AMOK- AND ASSAULT ALARM ROGER - FIRE ALARM OPERATION AND ROLLOUT ALARMING SERVER AS RENTAL PLATFORM METASEC INTEGRATED SOLUTIONS THE ROGER STORY EVENT SEQUENCES FOR ALARMS MONITOR THE EVACUATION - THE TACTICAL DASHBOARD METASEC NETWORKED CONCEPTS CONTACT IMPRINT Editor: metasec e.k. Stockumer Bruch 4 DE-58454 Witten Stockum Tel: +49 2302 / 98391080 Fax: +49 2302 / 98391089 info@metasec.de Copyright: All images and graphics are subject to the copyright of their respective photographers (unless otherwise indicated) Pictures of pages 03, 04, 05 Fotolia.com Pictures of pages 10, 11 Desko Further graphics, illustrations and pictograms metasec Design: metasec Dipl.-Des. Andreas Maldei 02

CLOCKWISE SYNCHRONOUS IN UNISON»The conducting is the orientation, coordination and design support for the performing musicians of a musical ensemble«- Excerpt Wikipedia The conductor assumes the direction of the orchestra and forms from the individual musicians, a homogeneous picture for the listener. Through the precise guidance of the time, intensity and duration of the respective playing time of the individual or groups, a unique experience is created. Alarming as the key word and the subsequent handling of a special situation, is essentially nothing but the play of an orchestra. WHO does WHEN WHAT and in which order? How must a co-operation be orchestrated so that a crisis, a disaster or any other situation can be managed be managed cleanly and structured? ROGER as a modern alarm server can help you or your organization with many tasks. On the following pages you will find functions as well as application examples. 03

ROGER - SILENT ALARM OR FACTORY ALARM ROGER SILENT ALARM OR FACTORY/ PLANT ALARM Automated notification, silent alarming, or access to persons or groups is a current topic. Our alarm server covers efficiently and flexibly various features, among others fast reaction after accidents on factory area or a subtle rescue alarm during escalation scenarios. The server can be used in different modi: silent alarming Plant alarming Operational centre alarming Automotive, events-based notification Our alarm server is programmed depending on its features and demands of the user. The so-called»event engine«reacts to manual or automatic releases and provokes instantly certain processes and notifications of registered persons. Interaction with the surrounding works either via self-substaining communication ways or via a sub installation of your existing»pbx«-solution. Release via phone, switch or PC client / user Emergency and team conference Acknowledgement and reporting Digital map Dynamic call chain with individual thresholds Control center alarming Fast reaction to average and hitch /malfunction / breakdown Alarming via live announcements, audio recordings Alarming via phone, self phone /cell phone, SMS, e-mail Dynamic modules Connection / linkage to BMA, EMA, or relay contacts Autonomous learning feature for recurring introduction 04

ROGER - SILENT ALARM OR FACTORY ALARM SILENT ALARMING AMOK- AND ASSAULT ALARM More and more often assaults on employees at open to the public offices are publicized. Process owners in communities are requested to find and implement solutions to protect their employees. Hence, a new market develops. The following advantages are interesting to end users: Setting off of the alarm via existent phones Secret button or software client Software as a sub-installation to every TK-solution is possible Repeated training for users concerning auto learning features. PLANT ALARMING ACCIDENT OR EMERGENCY MANAGEMENT In business, an effective and reliable alarm server is not only necessary in breakdown or software malfunction cases. Most common scenarios are: coordination of workforce in the daily process/business or automatic triggering of processes at the most common scenarios. Automatic or manual release in emergency Team conferences for briefing and coordination Connection/Bounding to BMA or EMA Introduction of mobile guards 05

ROGER - FEATURES AT A GLANCE ROGER - Features at a glance ROGER offers a variety of useful functions that help to coordinate the processes in the event of an alarm and to adapt them to the customer's needs. This starts with the triggering of an alarm and ends with the evaluation and the reporting. We have listed the most important functions. The following functions are currently offered and supported: Triggered by: Telephone button PC Client / Hotkey Hidden contact System functions: Any number of group and alerting parties Powerful event machines for call processing Acknowledges the alarms via DTMF, callback, app, web, SMS Call chains circular and star shaped High availability Redundancy Emergency conferences Recordings and logging Can be connected to telephone systems, intercom, mobile phone networks Connection to MS Active Directory 06

ROGER - FEATURES AT A GLANCE Alarms and notification options Speech recordings Live Announce SMS E-Mail Dynamic Building Blocks Video Panels and Infoterminals Social Media Combinations from the above Evaluation and reporting Consolidated reports on tactical dashboards The alarm server provides a full evaluation and analysis module Evaluations using the following parameters: When? Who? How long until the first receipt? Which way? In addition, a tactical panel for real-time visualization is offered You need a special adaptation or a special solution? Just contact us! 07

ROGER USER STORY ROGER USER STORY ALARMSERVERINSTALLATION FOR A COMPLETE FEDERAL STATE A common public sector environment is a Cisco Callmanager or Alcatel telephony system. Here we can also show some references. Decisions are usually made on the basis of the reasons and functions listed below: The main reasons for the decision: Virtualization (full integration in existing infrastructure) Microsoft Active Directory (AD) Integration for central management of the alarm circuits, participants and groups AD integration minimizes administration and maintenance costs Tenant capability - image of the organizational structures Integration of external pulse generators (hidden buttons, fire alarm systems, etc.) via IP to the central cluster Result: The result is an operator model which is offered per port to the authorities. Perspectives: Further development to the central middleware for audio and video transmission far beyond the pure alarming Connection to central management systems and control rooms e.g. GMA managers, central crises teams or external security providers 08

ROGER USER STORY TCP / IP ALARM SRV1 IP / IO VM WARE CLUSTER SIP Trunk Push messages... Call Manager Native SIP / SCCP...via XML Phone SAA ALARM SRV2 Adjustment: Accounts Groups Numbers Active Directory Exemplary construction of a central alarm server in the public sector. 09

ROGER - AMOK- AND ASSAULT ALARM Available for all employees at the Cisco Cluster Tripping over desk telephone Autolearn function for cyclic instruction Emergency and team meetings Fast reaction in case of attack and amok Acknowledgment and logging Dynamic call chains with individual thresholds Alarms on live announcements, voice mail, etc. Dynamic building blocks AMOK- AND ASSAULT ALARM There is more and more frequent attacks on employees in public offices. The responsible persons in the state authorities are asked to implement solutions to protect their employees EMERGENCY CALL Automatic notification, the subtle fetch of help or accessibility of individuals or groups in emergency scenarios are current issues. In an emergency, seconds can be decisive. The following product characteristics are currently defined: Triggering the alarm on the telephone Notification within the group Announce which room and which scenario Explore the situation Personal clarification or handing over to the emergency personnel De-escalation The following product characteristics are currently defined: Triggering the alarm on the telephone Notification within the group Announce which room and which scenario Explore the situation Personal clarification or handing over to the emergency personnel De-escalation 10

ROGER - FIRE ALARM Revaluation of existing sound reinforcement Available for all employees at the Cisco Cluster Alarms by voice mail via telephone system Dynamic call chains with individual thresholds Coupling to the Active Directory Acknowledgment and logging via reporting module Triggering via existing fire detection system FIRE ALARM VIA THE TELEPHONE SYSTEM A fast and secure alarming will decide life and death in case of emergency. The alarm server manages all alarm sources and connects them to the telephone system. In the case of an alarm, voice announcements are made via the telephone, which provide detailed information on the alarm as well as evacuation measures. The following product characteristics are currently defined: Alarming via voice mail Notification via desk phones Announce which room and which scenario Explore the situation Personal clarification or handing over to the emergency personnel 11

OPERATION AND ROLLOUT OPERATION AND ROLLOUT ROGER requires a server backend for the operation of the databases as well as the web services. The server system is based on a Linux and is largely independent of the system environment. The following variants are currently offered and supported: Hardware appliance for standalone operation Virtual appliance for operation within a VMware environment R (as) ² as externally hosted rental model The most common case for an alarming server is the speech alarming, which means the playing of predefined language packs. Therefore, a coupling to a higherlevel telephone system is required for communication with the outside world. RO- GER can also be connected directly to the telephone network via a VoIP connection. If ROGER is operated within its own virtual environment, it is necessary to ensure that the system is sufficiently dimensioned in terms of performance. On all systems, the software is preinstalled on the latest software version at the time of delivery. You can start with the facility immediately. CUSTOMER-SIDE IT HARDWARE CLOUD Installation on metasec - hardware Installation in the environment of the customer Hosting in the cloud 12

OPERATION AND ROLLOUT HARDWARE APPLIANCE The hardware systems are supplied in two variants - M and L. Both differ only in the equipment and the maximum retrievable performance. All functions can be displayed on both systems. The M system is sufficient for small to medium installations. However, if you plan a larger system, with many clients or branches with the corresponding high number of parallel operations, the L system is the better choice. A determination of the required power can be predicted well by a specification sheet. It is also possible to switch to a larger system or a virtual appliance at any time. Only one backup must be installed on the new system. VIRTUAL APPLIANCE Virtualization and cloud computing are the biggest trends in recent years in the IT industry. Consolidation of IT processes or the simplification of the infrastructure are the primary drivers of this trend. The virtual appliance is our response to these market needs. The system includes all the features offered by the hardware systems and can cover almost any power requirement. The performance limit is only determined by the underlying host hardware. Larger environments can be split into several instances to achieve even greater efficiency within the infrastructure. The server is available as a»ready to run«vmware Image or deployment template. You can also download a VMware Player image for demo - an unbelievable advantage in the sales process and customer experience. ROGER AS A SERVICE R(AS) 2 If the user does not wish to operate his own backend system, he can obtain the entire service via the online platform www.ras-quadrat.com. The platform provides all functions, right up to client and multisite capabilities. A big advantage is that the user always keeps up with the latest software. The billing is done here on a monthly basis and depends on the chosen package. For more information, please visitwww.ras-quadrat.com 13

ALARM SERVER AS A RENTAL PLATFORM ROGER AS A SERVICE - R(AS)² ALARM SERVER AS A RENTAL PLATFORM Total failure of infrastructure, BCM or K-case concepts - there are some situations which require the operation of an alarm server and the associated processes. However, it is not just process specifications that make a rental product attractive. The user gets rid of all administrative maintenance work as well as infrastructural investments at the same time. With the product R (as) ², we offer the complete functional diversity within the framework of a rental and hosting concept. You manage your alarm circuits and action plans via a central management interface. From any location in the world. Some of the basic functions that ROGER also offers you as SaaS are: Centralized data management in a secure external data center in Germany Access to alarming and processes even in case of total failure of the infrastructure No investment In own hardware and software updates, no maintenance costs Transparent cost control Adhoc implementation of alerting processes Structured processing and follow-up of events Can be integrated into other internal IT processes via API 14

ALARM SERVER AS A RENTAL PLATFORM Our rental and hosting platform allows a quick introduction into the process of visitor management. It not only saves expenses in the acquisition of licenses and hardware, but also allows the design of new business models and recurring sales. SaaS as a major topic in the IT industry is another buzzword for addressing new customer strata. 15

INTEGRATED SOLUTIONS COMMUNICATION SYSTEMS DEVEL ROGER INTELLIGENT ALARM AND COMMUNICATION SERVER MI INFORMATION HUB FO CRITICAL COMMUN External alarm tripping (for example Fire alarm system) Access to with still pictu Control desk alerting Triggered by switch Dynamic mark Dynamic call chain with individual thresholds Triggered by telephone Geographic coordination of action forces Fast reaction on accident / disorder Triggered by software Information terminals Team conferences Recognition of b (Pulse) of W EVACUATION / ALARMS FACTORY ALARM MOBILE SECURITY 16

INTEGRATED SOLUTIONS OPED WITH PEOPLE - FOR PEOPLE DAS R THE DISTRIBUTION OF ICATION PROCESSES JAMES VISITOR MANAGEMENT cameras re and video Notification via e-mail Digital signage Evacuation mode Printing visitor badges BI - information distribution from third-party systems Document scanners for ID cards and passports Multilanguage Support Providing information on mobile devices and Wearables Recurrent training Come/go checklist iometric data earables Visitor panel MOBILE DEVICES / WEARABLES VISITOR MANAGEMENT DATA / INFO TERMINALS 17

THE ROGER STORY THE ROGER STORY BRIEFLY EXPLAINED Whether in the event of an accident, in the event of a fire or in case of an attack - our alarm server ROGER can be used for all these scenarios and orchestates all procedures safely and reliably. In addition, the»integrated process«can be used to add a variety of other functions. Thus, ROGER, MIDAS and JAMES work hand in hand and ensure a seamless process, far beyond the mere alarming. You can see exactly how a scenario looks like or the sequence works, in the following»roger Story«. The whole story can also be found as an animation at www.metasec.de 18

THE ROGER STORY DEFINE ALARMING 1. DEFINE ALARM Who is being alerted? How is being alerted? Why is being alerted? 1 2 HOW SHOULD BE ALERTED? 2. CREATE AND MANAGE ALARMS Liveannouncements speech recordings E-mail SMS dynamic building blocks 3 4 TRIGGERED BY: 3. CASE OF ALARM phone Hidden contact External contacts (e.g., fire detection system) Central management solution / control room 5 6 19

THE ROGER STORY ALARMING IS RUNNING ACKNOWLEDGING THE ALARM Notification to Mr. Klein via live announcements Notification to Mrs. Müller Notification to Mr. Maier Acknowledgment Acknowledgment of the announcement by DTMF of the alarm by Mrs. Müller Acknowledgment of the alarm by Mr. Maier 6 7 MEASURE 1: EVACUATION MEASURE 2: VISITOR ALERTING Guidance system Emergency exit Check at collection point By linking to the visitor management system JAMES, the alerting of guests on the premises, as well as the host, can be included in the measure. 10 11 TACTICAL BOARD DOWNSTREAM REPORTING Consolidated reports on tactical dashboards 14 The alarm server provides a full evaluation and analysis module Evaluations using the following parameters: When? Who? How long until the first receipt? What way? In addition, a tactical panel for real-time visualization is offered 15 20

THE ROGER STORY ACTION 1: EVACUATION 4. PROCESSING OF ACTION PLANS (OPTIONAL) Clarification by floor supervisor Message to fireman Decontrol of the building 8 9 MEASURE 3: HAVARIE / PRODUCTION DISRUPTION 5. OTHER FEATURES Accident / alarming Emergency telephone conference with production manager and customer Initiate appropriate measures 12 13 The use of all illustrations in this presentation is only permitted with the express permission of metasec and only in the context of metasec product presentations. All graphics are subject to the copyright of metasec. 21

EVENT SEQUENCE FOR ALARMS EVENT SEQUENCE FOR ALARMS phone via e-mail and SMS DEFINE ALERTING hidden Contact via live announcements via voice mail CONFIRM THE ALARM TRIGGER ALARM NOTIFICATION AND ALARMING Who will How is being alarmed? alerted? Why is it alerted? external contacts (e.g., fire alarm system) via Whats App groups via Twitterfeeds central management solution / control centre via dynamic building blocks 22

EVENT SEQUENCE FOR ALARMS CONTROL SYSTEM FOR EVACUATION SIGNPOST TO EMERGENCY EXIT CHECK AT COLLECTION POINT emergency conferences EVACUATION feedback loops recording NOTIFICATION OF THE CONTROL CENTRE NOTIFICATION OF THE GUARDS PROCESSING OF THE SCENARIO COORDINATION AND DOCUMENTATION auto learning function BCM / Business Continuity Management measures and instructions EVACUATION OF VISITORS VISITOR ALERTING HOSTS INFO CHECK AT COLLECTION POINT Scan the QR Code and watch the animated»roger Story«. 23

MONITOR THE EVACUATION - THE TACTICAL DASHBOARD MONITOR THE EVACUATION - THE TACTICAL DASHBOARD The so-called tactical dashboard helps you to monitor the alarm or evacuation situation. Keep an overview of the evacuated people at any time and see who is still on the site. You can also use the dashboard to hold emergency meetings, plan and initiate actions, and track the progress of the evacuation. The tactical dashboard can of course be accessed via the evacuation terminals, but also conveniently via your PC or smartphone. The web-based application synchronizes continuously and processes the incoming data in real-time. This is also ensured in the case of several terminals, which the current status of the individual pillars will also pass on to the others. In this way, all the recorded persons can be reconciled between the different locations 24

MONITOR THE EVACUATION - THE TACTICAL DASHBOARD 25

MZF SER METASEC - NETWORKED CONCEPTS SMART TECHNOLOGIES FO PRODUCTION MOBILE GUARD COLLECT POIN Accident Fault Management Factory firefighter Appreciation of staff Mobile control desk Access cont Intelligent c LOGISTICS Self check-in terminals Integration into ERP processes LARGE AREAS REMOTE SUPERVISED WORK POLIC Safety instructions Control of visitor flows Vital data acquisition Emergency Video / aud Information 26

METASEC - NETWORKED CONCEPTS R NETWORKED CONCEPTS ION T ADMINISTRATION SHELTER rol - connection ollection point Visitor management Autonomous reception Infrastructure for refugee shelters VER CITIZEN AUTHORITY Appointment registration via web Welcome screen E 3-RD PARTY INTEGRATION SCHOOL / UNIVERSITY AUTHORITIES io multiplex distribution Video / audio multiplex Information distribution Silent-, amok-, assault alarm BMA connection, evacuation 27

ALSO AVAILABLE AT : metasec Managing Director: Lukas Ziaja Stockumer Bruch 4 DE-58454 Witten Stockum Phone: +49 2302 / 98391080 Fax: +49 2302 / 98391089 E-Mail: info@metasec.de Web: www.metasec.de metasec_roger brochure_en_august 2017_Nr. 01 www.metasec.de