SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
THOUGHT LEADERS FOR MANUFACTURING & SUPPLY CHAIN
ARC INSIGHTS
By Asish Ghosh
INSIGHT# 2003-08MP&H
JANUARY 30, 2003
The U. S. Department of Justice has
recently released a report that compares
and contrasts many of the commercially
available crisis information management
software packages. These packages can
be usefully deployed in large
manufacturing sites.
Benefits of CIMS Tools
• Provide real-time data, reports, and analysis
to emergency management personnel
• Provide assessment of the situation
• Support decisions on the application of
available resources
• Disseminate information to other interested
parties
Appropriate Crisis Management Infrastructure
Is Essential to Your Long Term Viability
Keywords
Crisis Management, Incident Management, Security
Summary
Crisis conditions resulting in disasters are usually caused by a combination
of natural and human induced events. Adequate response to such a disas-
ter usually requires multi-organization and multi-
jurisdiction efforts. This organizational complexity
often leads to inadequate intelligence and mis-
communications, causing further escalation of that
event. For consistent, coordinated, and construc-
tive actions there must be a common vocabulary,
model, and understanding of the problems for all
those that are involved in mitigating the situation.
The United States Department of Justice has recently released a report on
crisis information management that compares and contrasts many of the
commercially available software packages that are available in this area.
Analysis
Although the importance of security and crisis management has been rec-
ognized for a long time by manufacturing industries, its significance has
increased greatly since the events of September 11, 2001. Traditionally, cri-
sis management operated with scarce in-
formation about the event, whether fire,
hurricane, chemical spill, or arson. Today,
they may be overwhelmed with a glut of
information, with little knowledge or tools
to handle the data.
Crisis Information Management Software
(CIMS) is a part of an integrated incident
management system (IMS). The objective of an integrated IMS is a system
that connects all elements of an organization's response profile, such as
ARC Insights, Page 2
©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com
Common Problems for Safety Personnel
• Which software package to use?
• Is one product better than another?
• How to choose one?
• How to implement a new package?
• What is the securely over the Internet?
• Does it have all the needed features?
• What is the installed cost?
• What is the life-cycle cost?
telecommunications, wireless, network, voice,
video, and audio and eliminates the need for
separate communication channels. The fun-
damental objective is to optimizing emergency
management operations by the use of technol-
ogy tools that augment and enhance the
deployment of emergency response assets.
An integrated IMS requires that an emergency
management department use an integrated sys-
tem of technical capabilities that operates
seamlessly and without duplication. This notion combines the elements of
policy and procedure within a comprehensive emergency response plan
that is aided by information technology.
P r o c e s s
P la n t
P r o c e s s
P la n t
Crisis Management and Protection Layers
Crisis Information Management Software
In October 2002, the United States Department of Justice released a feature
comparison report on CIMS. The report compares and contrasts ten com-
mercially available software packages. It provides information on packages
that maintain control over the flood of information that are available during
an emergency. The report evaluates three main areas: system environment,
functions, and product support. It is available at:
http://www.ncjrs.org/pdffiles1/nij/197065.pdf
In addition to this report, this project produced a Feature Comparison Ma-
trix, a Microsoft Excel-based spreadsheet that allows users to input criteria
specific to their needs to select appropriate CIMS products. The matrix is
available at:
http://www.ojp.usdoj.gov/nij/temp/publications/197065-Matrix.zip.
ARC Insights, Page 3
©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com
Supplier Product Web Site
Blue292 Blue292 www.blue292.com
Ship Analytics International CRISIS www.shipanalytics.com
Specialized Disaster Systems Int. EM2000 www.sdsintl.net
E-Team E-Team www.eteam.com
Essential Information Systems Incident Mas-
ter & InfoBook
www.essential-technologies.com
Alert Technologies OpsCenter www.alerttech.com
RAMsafe RAMSAFE www.ramsafe.com
E. A. Renfroe RESPONSE www.earenfroe.com
SoftRisk Technologies SoftRisk www.softrisk.com
Emergency Services Integrators WebEOC www.esi911.com
Products Evaluated in the CIMS Report
Recommendations
• Industrial companies need to assess potential hazards, security vulner-
abilities, and crisis management capabilities in their manufacturing
sites. This assessment should be carried out in conjunction with the lo-
cal authorities responsible for crisis management.
• Based on the needs, manufacturers should select appropriate crisis
management software along with the necessary hardware platform to
install or upgrade their crisis management capabilities.
• Crisis information management software suppliers should develop ex-
pertise in assessing requirements and recommending appropriate
systems for CIM applications in manufacturing environments.
Please help us improve our deliverables to you – take our survey linked to this
transmittal e-mail or at www.arcweb.com/myarc in the Client Area. For further
information, contact your account manager or the author at aghosh@arcweb.com.
Recommended circulation: All MAS-H & P clients. ARC Insights are published
and copyrighted by ARC Advisory Group. The information is proprietary to ARC
and no part of it may be reproduced without prior permission from ARC.

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMNorman Disney & Young
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
Safety and asset integrity for deepwater
Safety and asset integrity for deepwaterSafety and asset integrity for deepwater
Safety and asset integrity for deepwaterAdvisian
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...David Sweigert
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Unified threat management
Unified threat managementUnified threat management
Unified threat managementYabibo
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 

Was ist angesagt? (20)

Information Security
Information SecurityInformation Security
Information Security
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISM
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Safety and asset integrity for deepwater
Safety and asset integrity for deepwaterSafety and asset integrity for deepwater
Safety and asset integrity for deepwater
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Unified threat management
Unified threat managementUnified threat management
Unified threat management
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 

Ähnlich wie Manage Crisis with CIMS Software

Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...ARC Advisory Group
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
Ultimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxUltimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxBIS Safety
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpointLonda77
 
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)Becky Ward
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxmccormicknadine86
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfwardell henley
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design EssayTracy Berry
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company Abdulrahman Alamri
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docxlorainedeserre
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 

Ähnlich wie Manage Crisis with CIMS Software (20)

Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Ultimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxUltimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptx
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpoint
 
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design Essay
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 

Mehr von ARC Advisory Group

Information Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldInformation Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldARC Advisory Group
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)ARC Advisory Group
 
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumAsset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumARC Advisory Group
 
Three market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelThree market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelARC Advisory Group
 
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum ARC Advisory Group
 
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...ARC Advisory Group
 
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...ARC Advisory Group
 
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...ARC Advisory Group
 
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum ARC Advisory Group
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...ARC Advisory Group
 
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum ARC Advisory Group
 
Current Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortCurrent Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortARC Advisory Group
 
CPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumCPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumARC Advisory Group
 
Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?ARC Advisory Group
 
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayConoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayARC Advisory Group
 
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersComponent Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersARC Advisory Group
 
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsCombined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsARC Advisory Group
 
Collaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesCollaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesARC Advisory Group
 
Closing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingClosing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingARC Advisory Group
 

Mehr von ARC Advisory Group (20)

Eam guide-video-2015
Eam guide-video-2015Eam guide-video-2015
Eam guide-video-2015
 
Information Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldInformation Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected World
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)
 
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumAsset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
 
Three market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelThree market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next level
 
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
 
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
 
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
 
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
 
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
 
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
 
Current Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortCurrent Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall Short
 
CPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumCPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC Forum
 
Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?
 
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayConoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
 
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersComponent Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
 
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsCombined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
 
Collaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesCollaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and Strategies
 
Closing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingClosing the Gap on Digital Manufacturing
Closing the Gap on Digital Manufacturing
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Manage Crisis with CIMS Software

  • 1. THOUGHT LEADERS FOR MANUFACTURING & SUPPLY CHAIN ARC INSIGHTS By Asish Ghosh INSIGHT# 2003-08MP&H JANUARY 30, 2003 The U. S. Department of Justice has recently released a report that compares and contrasts many of the commercially available crisis information management software packages. These packages can be usefully deployed in large manufacturing sites. Benefits of CIMS Tools • Provide real-time data, reports, and analysis to emergency management personnel • Provide assessment of the situation • Support decisions on the application of available resources • Disseminate information to other interested parties Appropriate Crisis Management Infrastructure Is Essential to Your Long Term Viability Keywords Crisis Management, Incident Management, Security Summary Crisis conditions resulting in disasters are usually caused by a combination of natural and human induced events. Adequate response to such a disas- ter usually requires multi-organization and multi- jurisdiction efforts. This organizational complexity often leads to inadequate intelligence and mis- communications, causing further escalation of that event. For consistent, coordinated, and construc- tive actions there must be a common vocabulary, model, and understanding of the problems for all those that are involved in mitigating the situation. The United States Department of Justice has recently released a report on crisis information management that compares and contrasts many of the commercially available software packages that are available in this area. Analysis Although the importance of security and crisis management has been rec- ognized for a long time by manufacturing industries, its significance has increased greatly since the events of September 11, 2001. Traditionally, cri- sis management operated with scarce in- formation about the event, whether fire, hurricane, chemical spill, or arson. Today, they may be overwhelmed with a glut of information, with little knowledge or tools to handle the data. Crisis Information Management Software (CIMS) is a part of an integrated incident management system (IMS). The objective of an integrated IMS is a system that connects all elements of an organization's response profile, such as
  • 2. ARC Insights, Page 2 ©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com Common Problems for Safety Personnel • Which software package to use? • Is one product better than another? • How to choose one? • How to implement a new package? • What is the securely over the Internet? • Does it have all the needed features? • What is the installed cost? • What is the life-cycle cost? telecommunications, wireless, network, voice, video, and audio and eliminates the need for separate communication channels. The fun- damental objective is to optimizing emergency management operations by the use of technol- ogy tools that augment and enhance the deployment of emergency response assets. An integrated IMS requires that an emergency management department use an integrated sys- tem of technical capabilities that operates seamlessly and without duplication. This notion combines the elements of policy and procedure within a comprehensive emergency response plan that is aided by information technology. P r o c e s s P la n t P r o c e s s P la n t Crisis Management and Protection Layers Crisis Information Management Software In October 2002, the United States Department of Justice released a feature comparison report on CIMS. The report compares and contrasts ten com- mercially available software packages. It provides information on packages that maintain control over the flood of information that are available during an emergency. The report evaluates three main areas: system environment, functions, and product support. It is available at: http://www.ncjrs.org/pdffiles1/nij/197065.pdf In addition to this report, this project produced a Feature Comparison Ma- trix, a Microsoft Excel-based spreadsheet that allows users to input criteria specific to their needs to select appropriate CIMS products. The matrix is available at: http://www.ojp.usdoj.gov/nij/temp/publications/197065-Matrix.zip.
  • 3. ARC Insights, Page 3 ©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com Supplier Product Web Site Blue292 Blue292 www.blue292.com Ship Analytics International CRISIS www.shipanalytics.com Specialized Disaster Systems Int. EM2000 www.sdsintl.net E-Team E-Team www.eteam.com Essential Information Systems Incident Mas- ter & InfoBook www.essential-technologies.com Alert Technologies OpsCenter www.alerttech.com RAMsafe RAMSAFE www.ramsafe.com E. A. Renfroe RESPONSE www.earenfroe.com SoftRisk Technologies SoftRisk www.softrisk.com Emergency Services Integrators WebEOC www.esi911.com Products Evaluated in the CIMS Report Recommendations • Industrial companies need to assess potential hazards, security vulner- abilities, and crisis management capabilities in their manufacturing sites. This assessment should be carried out in conjunction with the lo- cal authorities responsible for crisis management. • Based on the needs, manufacturers should select appropriate crisis management software along with the necessary hardware platform to install or upgrade their crisis management capabilities. • Crisis information management software suppliers should develop ex- pertise in assessing requirements and recommending appropriate systems for CIM applications in manufacturing environments. Please help us improve our deliverables to you – take our survey linked to this transmittal e-mail or at www.arcweb.com/myarc in the Client Area. For further information, contact your account manager or the author at aghosh@arcweb.com. Recommended circulation: All MAS-H & P clients. ARC Insights are published and copyrighted by ARC Advisory Group. The information is proprietary to ARC and no part of it may be reproduced without prior permission from ARC.