Veolia Water UK provides water and wastewater management services throughout the UK and Ireland and is part of the world’s leading water company that operates in 66 Countries.
In the UK, Veolia Water own and operate three water companies responsible for supplying drinking water to more than 3.5 million people. Veolia Water Central is also responsible for operating and maintaining over 350 installations and more than 16,000 km of water mains.
Veolia Water Central has amalgamated its security alarm management, allowing it to control and monitor a substantial number of intruder points and cctv cameras from three separate locations through integrated software. There is also back up capability to run all of these sites as independent stand alone control rooms should the need arise.
Cortech has developed alarm handover software for Veolia Water Central, which allows its control room operators to take control of alarm monitoring at particular sites under password control.
Operations Technical Support Group Manager for Veolia Water Central, Gerald Doocey, commented: “We have benefitted considerably from centralising our operations and it has brought about a multitude of operational and cost efficiencies. The Datalog software is now at the heart of our security operations and links our sites together seamlessly”.
Veolia Water Central continue to phase out older disparate systems and are now benefiting from a single operating platform for its security operations that provides the basis for its current and planned future integration. The new software has enabled Veolia ater Central to integrate legacy systems with new control equipment, while providing it with the flexibility to add to the system at any time in the future.
Gerald added: “Datalog has significantly simplified our processes for responding to alarms and events. We are able to identify the precise location of alarms and incidents quickly through the 3D rendered graphical building and floor plans. The information the system generates now provides us with an important audit trail of alarm and events including a historical log of video verification.”