One of the most common tasks of an operator when responding to an alarm is to call key contacts from a call list. However, the list of who to call at a specific location and under what circumstances is often…
Revolutionize your personal safety with our new integration of cutting-edge security monitoring technology Many employees now travel globally and this, coupled with the growth of remote work, has made protecting individual employees’ security a challenging priority. That’s why SureView has…
What are data sources? Data sources are used by investigators and security teams to access commonly used information when completing their records. For example, a data source could be an employee directory that lists all the employees of the organization.…
Providing Better Intelligence to Law Enforcement The Miami Dade Real-Time Crime Center (RTCC) is responsible for the coordination and distribution of real-time information to police officers and investigators ensuring the protection of the seventh-most populous county in the United States.…
The Challenge The organization is a major electric utility, delivering electricity to over 5-million customers. In 2010, their security team monitored alarms from 13 locations. Fast forward to today and this same team is responsible for monitoring 665 sites! In…
One of the most flexible Action Plan steps is known as the ‘URL (or website address) type’. This function allows an administrator to set an action step that requires the user to visit a website. This can be helpful in…
The Challenge As the security contractor for major, multi-day music festivals, Ikanos needed to stand up fully functional command centers, without the complexity and cost of embarking on a major IT project. They required a “plug-and-play” system that would allow them to focus their security…
Critical Infrastructure organization dramatically increases number of alarms they monitor without increasing the size of their operations team. The Challenge The customer provides and manages critical infrastructure for the water industry. In order to scale for growth and comply with…
As you begin to break down operational and system bottlenecks, it’s important to be able to constantly adapt to change. An audit trail makes this possible. Keeping detailed audits of operator actions helps managers identify opportunities to improve response. Action…
We are excited to announce our newest integration partner, The SMS Works, a service that allows you to automatically turn incoming SMS/text messages into SureView alarms. When combined with GPS data, this can be used not only to notify your…
It is critical to identify the key information operators need to respond to an event. It’s rare that security teams have easy and immediate access to this sort of information without having to jump across various systems that were not…
Organizations typically have detailed Standard Operating Procedures (SOPs) to dictate how their team should respond to a given event. Too often, these SOPs are complex and/or inaccessible. Chances are, your security response SOPs are in a thick binder collecting dust…
The Challenge AAA recognized the need to stand up a new security command center to monitor and protect their more than 1,000 branch locations throughout North America. The goal of the command center was to consolidate their operations and handle…
So far, you have metrics to understand the traffic in your environment and a plan to reduce false alarms. It’s also important to identify the events that operators are responding to, and if their responses are appropriate and necessary. SureView…
Last year we published a short blog about the ease of creating a QR code as a really simple way for people to report security events into your command center, you can find the blog here. Because this post generated so…
Global technology company decreases response time by 92% The Challenge The customer was experiencing rapid business growth and over a 3-year period planned to increase their worldwide locations by 60% —to over 400 sites globally. Their goal was to standardize…
Once you’ve effectively implemented a process for measurement and analysis, it’s time to take your captured data and drill down into one of the most common response time detractors: false alarms. It’s a well-known story: operators have a long, scrolling…
ICYMI— here’s a quick review of the related Feature Spotlight: Automatically plot location of incoming alarms…. At SureView our integrations utilize common standards-based protocols to connect systems. By leveraging these standards, security technology teams do not need to embark on…
Security professionals are faced with difficulties normalizing and processing complex data relating to operator response times, alarms, and dispatches captured in multiple systems and formats. Systems like SureView centralize the response process in the command center and capture these key…
Building an accurate, and specific report that automatically provides the information you need in a flash can be a challenge. Cases' reporting module, Insights, can automatically calculate any field that has a numerical value—making it easy for administrators to custom-build…