3. AGENDA
1. Our Team
2. Main Challenges in a Control Room
3. Tailor-Made User Interface
4. Real-Time Performance
5. Trustful and Future-Proof Solutions
6. Minimize Security Risks
7. … at a Reasonable Price
8. Q&A
4. MAIN CHALLENGES IN THE CONTROL ROOM
More stakeholders to
collaborate with
More
disparate
systems
Access Control, Video
Surveillance, Intrusion
Detection, Fire Safety
Radio comm,
Intercom, phone
system,…
CAD, Allerting
systems, Maps,…
Administrative
Systems, White Space,
Social Media
Pressure on Operator
Lack of Effectiveness & Efficiency
5. What you had planned…
MAIN CHALLENGES IN THE CONTROL ROOM
7. What can happen………
Situation (Risk) Implication Solution
MAIN CHALLENGES IN THE CONTROL ROOM
Problem
Jeopardized work satisfaction
for the operators
▪ Staff fluctuations
▪ Absences due to health
problems
▪ Individual & flexible workplace
setups
▪ Ease of use
▪ Real-time performance – as if
the source is under the desk
Increased risk of operational
errors
▪ Lack of trust from stakeholders
▪ Loss of reputation, both
personal and organizational
▪ Loss of life, assets,
infrastructure, operational
integrity
▪ Tailor-made solutions
▪ Instant access to all sources
▪ Ease of use
▪ Shared collaborative views
System outages ▪ Separated sources and displays
▪ User and role management
▪ Redundant solutions
9. ▪ Ergonomic user interface
▪ Easy and intuitive access to all designated
information and systems
▪ Supporting the operators who bear the
responsibility for making the right decisions
▪ Fast and easy switching, collaboration and
sharing – with a single touch or by moving the
mouse
▪ Multiple individualized user or event driven
layouts and presets
▪ Easily control of third-party systems from any
workplace with a single keystroke
TAILOR MADE USER INTERFACE
10. Prefer a remote solution but fast as if the sources were under the desk
▪ Seamless latency - so low that it is not even
noticeable by the operators, as if the PCs were
under the desk
▪ Access all the various systems from anywhere –
any workplace, any control room, any site
▪ Free seating within and between control rooms
▪ Business Continuity between sites
▪ User and Role Management
REAL-TIME PERFORMANCE
11. ▪ Integrate different applications (legacy, current &
future) and IT environments
▪ Standard-based solutions – non-intrusive, without
interfering with customer PCs
▪ End-to-end quality assurance – from development
to maintenance and support
▪ Long term availability and support
▪ Future proof - i.e: 4K at the workplace & on the
video wall,…
TRUSTED & FUTURE-PROOF SOLUTION
12. Housing Sources in System Room
▪ Access the sources only via an
authentication device
(standalone or via a KVM
system)
▪ Access rights management –
with personal and role-based
rights
▪ Restricted access levels
Authentication
▪ Try to keep Independent and
separated networks on different
subsystems.
▪ Preventing potentially infected
computers in lower-security
environments from compromising
systems in higher-security
environments
▪ Preferably use a KVM system for
the operators. one console to
operate on different subsystems
Network Independence
▪ Protect IT assets and data from
unauthorized access
▪ Restrict and control physical
access to USB ports
▪ Centralized, efficient & cost-
effective maintenance
procedures
MINIMIZE SECURITY THREATS
13. ▪ Low investment costs – using standard-based solutions
▪ Reduced IT maintenance cost
▪ Optimized deployment of operators (e. g. reduce staff during night shifts)
▪ Reduced employee absences due to operator friendly working environment
▪ Real-estate savings – by reducing the footprint at the workplaces and in the system room
… AT A REASONABLE PRICE
14. We cordially invite you to
visit ..us at booth 14.
Questions?.
Luca Cannizzaro
Sales & Business Development
Manager
Luca.cannizzaro@weytec.com
+39 02 58431417