Water & Wastewater Treatment

WWT July 2017

Water & Wastewater Treatment Magazine

Issue link: https://fhpublishing.uberflip.com/i/840541

Contents of this Issue

Navigation

Page 21 of 39

22 | JULY 2017 | WWT | www.wwtonline.co.uk Incidents can emanate from multiple sources such as system analytics or intruder devices, and an automated workflow or rules engine will prioritise the importance of these and alert operators in a number of ways. Alarm rules will also assist operatives in managing response times, actions and feedback. Exported video can be combined from multiple cameras into one cohesive flow of evidence for analysis and importantly, a full audit of all activity is automatically generated to provide a full incident report. Q: How can remote locations be protected? A: Appropriate protection for organisations operating in harsh and o en remote environments involves implementing layers of security. Creating intelligence at the perimeter plays a major role in enabling proper control and situational awareness of the entire site. When this intelligence is integrated with other security technologies such as access control to restrict entry at gates, barriers and turnstiles, organisations are able to accelerate their response to critical events and manage risk before it escalates to a more serious incident. Solar-powered solutions, such as infra-red beam systems and fence mounted protection, increase the viability of safeguarding perimeters that hazardous incident. A typical project scope might encompass: command and control solutions; wide area surveillance; perimeter and site intrusion protection; access control for people, contractors and vehicles; alarm management; fire detection and extinguishing; phased evacuation systems; and lone worker monitoring and asset tracking. Q: What level of technology integration is needed? A: The integration of multiple security technologies provides centralised situational awareness, improved information and intelligence, effective response to critical events and the proper co- ordination of resources. To achieve a fully protected infrastructure necessitates the installation of robust command and control platforms that improve protection across multiple sites, manage critical situations and enhance procedures. Centralised command and control platforms improve efficiency and enhance security and safety operations, whilst reducing risks. Operators are immediately prompted to take the correct action and the so ware will automatically set in motion a sequence of pre- agreed activities to ensure the right procedures are adhered to, as well as distributing essential information across multiple agencies. The Knowledge Getting to Grips with... site security have previously been too difficult or cost-prohibitive to consider. They have a significant impact on situational awareness and the securing of assets and services. A recent example of the application of solar-powered perimeter protection is that of a major UK water authority which was able to save valuable construction time and money on the protection of reservoirs. A key challenge was the safeguarding of their widespread perimeters and numerous assets that would normally include the requirement for costly duct networks, together with the associated power supplies and cabling infrastructure. This innovative technology not only offers high level protection by creating a virtual detection wall that is both invisible and impenetrable, but also means that water authorities are able to accelerate their delivery programmes and forgo both the cost and time needed to install civils, power and communications. Q: What about the cyber threat? A: Minimising risk in the area of cyber security comprises both comprehensive security mechanisms and integrating security activities into the whole lifecycle. This means taking security considerations into account during development and engineering as well as service and operations activities. Comprehensive security mechanisms should combine physical and network security, and system and so ware integrity. Cyber security issues have been the subject of standardisation for some time, and Siemens plays an active role in all major organisations, including supporting the work of ISA-99, IEC 62443, DHS, BSI, WIB NAMUR and CLSI AUTO11-A2 to make sure that common cyber security standards are developed. Q: How do I integrate legacy systems? A: As many organisations have evolved over a number of years, there is o en a mix of existing systems and technologies that needs to be integrated into a new, state-of-the-art control system. This will necessitate the creation of 'so ' interfaces, making it easier to integrate and reconfigure to adapt to change in the future, and operate from one single platform. A high knowledge base is required to address the technical complexities of this critical environment, as well as the necessary capabilities to operate effectively in a hazardous environment with full compliance to rigorous processes and procedures, and fundamentally robust Health & Safety policies and practices. Q: How can Siemens help? A: It is vital that life critical systems are fully supported by engineering teams who are trained to identify and interpret customer specifications, CDM requirements, relevant legislation and British Standards, and the impact on health, safety and the environment. Siemens is focused on the protection of people, communities and assets by delivering technologies that provide an effective response to emergency incidents, complete situational awareness, instant mobilisation and deployment of resources of procedures and personnel. We believe that better intelligence and information will save lives, protect water authorities and ensure business continuity across the UK's vital services. We work with our customers using a systematic approach; one that includes the development of a clear technological roadmap to drive a coherent, joined-up and long- term safety strategy.

Articles in this issue

Links on this page

Archives of this issue

view archives of Water & Wastewater Treatment - WWT July 2017