Texas Water District Taps DVTel iSOC Technology

DVTel Inc. recently announced that the Tarrant Regional Water District (TRWD) has commissioned its fully-operational central operations center, which with the DVTel unified intelligent Security Operations Center (iSOC) as the command and control software, safeguards a wide variety of facilities located across 10 counties in North Central Texas. The installation also features DVTel cameras and a video analytics package. Maez Security Consultants oversaw system specification and design, and Access Technology Systems is in charge of project installation.

TRWD is one of the largest raw water suppliers in the state of Texas, providing water to more than 1.7 million people in the North Central Texas area. Operations span a 11-county area and include maintaining dams at the Water District’s four reservoirs and more than 150 miles of pipeline used for water transport. TRWD has deployed the unified DVTel solution at upwards to 30 different facilities with video surveillance from approximately 150 cameras and management of more than 200 access control points.

The newly-completed 26,000 square foot Gold LEED-certified annex building, located in Fort Worth, is home to TRWD’s engineering and information services departments, as well as the Security department and the Central Operations Center. The state-of-the-art control room has a Winstead console with 12 monitoring stations, and a Barco video wall projecting DVTel and SCADA data, live TV, and the capability to pull up facility blueprints from anywhere in the district. DVTel’s Professional Engineering Services (PES) group worked closely with Barco to integrate the technologies to more fully utilize the functionality and capability of the combined solution. At present, the central operations center shares monitoring and command with the incumbent center located in Cedar Creek, but eventually primary operations control will move to Fort Worth, with Cedar Creek providing back-up control.

The new TRWD annex building has a truly impressive mix of “green” technologies including the largest roof-mounted solar photovoltaic panel array in Texas covering 90 percent of the building’s rooftop. The panels will provide 70 percent of the building’s energy use annually and return unused solar electricity back to the region’s energy grid. Other green features include 2,500-gallon rain water cisterns which collect runoff from the roof and utilize it in a drip irrigation system; interior paint that is low VOC (volatile organic compounds), which improves air quality throughout the building; and automatic lights and low flow sinks and toilets installed throughout the building.

TRWD’s original vision, when plans were first conceived in 2004, was to pull all district sites together to where security staff can monitor everything and respond from a single, central location.

“Our goal was to improve upon our previous system with a fully integrated solution and a single point of control,” said Norman Ashton, TRWD risk manager. “Previously, we had four different software packages running in isolation of each other, not even popping video on alarm. We needed a much smarter system. Now staff can access any camera, any data, and pull that up in the central operations center.”

Authorized TRWD staff can also pull up cameras from any remote location. In the future, Ashton plans to integrate SCADA information more completely so that data will also trigger alarms and pop video when appropriate.

The operations center is staffed 24 hours a day, seven days a week. Staff monitor cameras and all other data, constantly on the lookout for threats that vary from a chlorine leak to a pipeline break to intruders in sensitive areas.

Operations have grown so substantially over the last two years, TRWD has hired a full-time staff member just to oversee security, along with additional staff as security operations and responsibilities have expanded.

“The overall system, with the DVTel iSOC at the center, is providing us with the necessary tools to track down issues and improve security,” Ashton said. “I like the fact that the DVTel system allows us to integrate with whatever third-party technologies we need to meet our security goals.”

Since the inception of the project, Ashton has seen the evolution of constantly improving technology.

“With the flexibility of the DVTel system, we’ve completely re-done our access management,”he said. “One recent innovation is with this new building, it is fully armed at all times, but upon authorized entry the building interior alarms automatically turn off as staff move around while the building exterior remains alarmed. All alarms go the DVTel system and it has been working perfectly. It’s great, you badge in, and that’s it, no manual intervention needed. We’re going to retro-fit other buildings in the same way, then we can drop our alarm monitoring service and save money.”

With DVTel’s flexible, scalable open architecture, TRWD plans to continue to expand their security system to keep pace with the district’s new construction. Current expansion plans, in addition to the new annex building, include a major undertaking to re-direct the flow of the Trinity River and create a new lake, along with new pump stations, a third pipeline, and other facilities to manage such significant infrastructure changes.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”