Request a Demo

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • Emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • Emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
Resource 4
Whitepaper

A Comprehensive Guide to Understanding ISO45001

Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More

Top Four Challenges to Virtual Emergency Operations

With COVID the use case for virtual emergency operations became clear. Safety concerns aside, though, virtual emergency operations can provide superior communications and coordination benefits over physical emergency operations centers (EOCs). You won’t recoup those benefits, however, without first understanding the top four challenges to virtual emergency operations.

What are they? Read on to learn more.

Challenges to virtual emergency operations

For one, virtual operations require stable access to an electrical power source and internet to support operations. That can be tricky in the emergency context.

Long-term physical isolation can also impact employee morale. Productivity might suffer, as well, with a lack of face-to-face interaction with partners limiting one’s ability to pick up on social and subtle body language cues.

Biggest software challenges to virtual emergency operations

Of course, those concerns can all be overcome by supplementing virtual emergency operations with a brick-and-mortar option, which is often considered the industry best practice.

More to the point, though, public safety agencies who went virtual often found their virtual platforms options to be ineffective for such a large-scale, complex disaster.

Meeting the needs of remote users, in particular, wasn’t easy. What’s worse, many of the technology challenges to EOCs operating in the virtual environment persist.

The full list of emergency management software challenges to virtual emergency operations include:

1. A deficiency in responsive design

In the past, software platforms only needed to deliver a mobile-friendly experience for field users. However, that’s no longer sufficient.

Many platforms designed with desktop users in mind don’t effectively cater to mobile users.

And the less user-friendly the virtual Emergency Operations Center (vEOC) platform, the more resources an organization expends on training and administrative tasks to bring mobile users up to speed.

2. Poor usability

Responsive design is just one facet of the usability hurdle that EOCs face in virtual settings. Many practitioners complain that their platforms lack basic usability, as well. In fact, they often describe them as cumbersome and uncomfortable.

What’s wrong with that? Well, research indicates that it’s not specific features but a stellar user experience that drives software adoption.

Conversely, a subpar user experience hinders adoption. That then leads to grudging utilization and users resorting to more laborious workarounds, resulting in the emergence of Shadow IT.

Additionally, new users with no prior emergency response experience cycle into the fold during incidents. An unsatisfactory user experience for them will compound your training lift.

3. Security and accessibility concerns

Poor usability and the subsequent emergence of Shadow IT are problems in and of themselves. But they also introduce security risks for agencies and organizations.

Remember, both state and non-state actors actively seek access to the information stored in these platforms and may not hesitate to disrupt operations through malicious actions.

Implementing workarounds might be counterproductive, too. Too many permissions’ restrictions can exacerbate usability issues and hinder information sharing.

As mentioned, vEOCs also exhibit a greater reliance on public infrastructure, heightening accessibility risks.

Even severe weather events have the potential to disrupt local infrastructure for extended periods, undermining remote operations unless reliable backups are in place.

4. Limited configurability

The final software challenge to virtual emergency operations is   the protracted implementation cycle that too often comes when deploying emergency management software.

What are we talking about? Well, it's not uncommon for implementations cycles to extend for over a year before users can deploy the system in a virtual environment.

That taxes precious IT resources.

What’s more, it’s been reported that some software platform developers adopt a "take it or leave it" approach regarding customization. That deprives customers of the ability to tailor the platform to their unique needs.

Of course, vEOCs remain the superior option. So, the question now turns to, how to surmount the challenges to make virtual emergency operations work for your agency or organization? To find out, download our guide to Integrating Best Practice into Virtual Emergency Operations.

 

Integrating Best Practice into Virtual Emergency Operations