Showing posts with label BMS. Show all posts
Showing posts with label BMS. Show all posts

Thursday, October 16, 2025

NBC - LIFE SAFETY REQUIREMENTS FOR DATA CENTRES

NBC - LIFE SAFETY REQUIREMENTS FOR DATA CENTRES

There are no specific annex in NBC 2016 Part 4 Fire & Life Safety regarding life safety requirements for Data Centres. In upcoming NBC 2025 (currently in Draft & BIS now accept valid comments from professionals) add new annex named ANNEX G (Clause 6). This Article just recommendation to BIS can include in upcoming NBC 2025, Writeups have copy from Draft NBC 2025. In NBC 2016 ANNEX G (Clause 6) indicates Commercial Kitchens. 

G-1 GENERAL

Data centres are classified under Group E Business occupancy and in particular as E-6 sub-occupancy considering its primary use, scale, and presence of process equipment. A comprehensive fire risk assessment should be conducted at the planning stage and periodically during operation. Assessments must include ignition sources, fire load, electrical risks, HVAC systems, etc. For guidance on the facilities and infrastructure of datacentres, refer the following good practices.

G-2 BUILDING DESIGN AND CONSTRUCTION

G-2.1 The fire resistance rating for the structural and non-structural elements shall be based on guidelines as per approved and accepted standards. The fire rating shall be validated and certified with a view to meeting the requirements of Table 1 above. In the absence of any validated/certified rating, guidance may be obtained from the information available in Annex C.

G-2.2 An anti-static floor system is highly recommended to prevent electrostatic discharge and support cable management. The data centre must be completely isolated from dust, water, vibration, and humidity. All external openings should be sealed, and no water sources or pipelines should be routed through or above the data centre, UPS room, or communications room to eliminate risks of leakage or moisture intrusion. However, any location of chillers at higher heights be opted considering the operational efficiency, the same should be adequately considered in the structural design; authorities may consider exempting the increased building height in such a case. Such floors shall have no other occupancy else considered in the calculation of floor area ratio and height.

G-2.3 Server rooms, battery banks, fuel storage, and other high-risk areas should be physically separated using fire-rated assemblies. Cable trays and ducts openings for cable trays and ducts should be sealed with materials having fire resistance rating of the compartment.

G-2.4 The number of basements should be kept as minimum and it shall not be more than 2. The basement(s) shall be within the building line and their total area shall not exceed the area of ground floor. Basement must not use for electronic garbage.

Basement-Specific Considerations

·        Moisture Control:  A primary concern for basements is the potential for water or moisture leakage from other parts of the building. 

·        Plumbing Isolation: Keep plumbing, except for fire suppression and HVAC systems, away from the data center space to minimize leak risks. 

·        Sealed Enclosure:  Data centers should ideally be "room-in-a-room" to ensure none of their walls form the external building facade, preventing air and moisture leakage. 

·        Air Filtration:  Use appropriate filters, such as MERV 8 or higher, to trap contaminants, preventing them from entering the sensitive electronic environment. 

G-2.5 The parking requirement shall be arrived at considering the requirement for administrative building (at 1 ECS per 100 m2). The parking requirement for the data centre/utility building shall be based on the actual required number and area (of trucks) for which additional considerations of loading and unloading spaces for services. Rack Placement consideration emphasize the hot-aisle, cold-aisle configuration for rack placement, where racks are arranged in alternating rows with their fronts (air inlets) facing the cold aisles and their backs (air exhausts) facing the hot aisles. This strategy, detailed in publications like the "Thermal Guidelines for Data Processing Environments," prevents the mixing of cold and hot air, ensuring efficient cooling by directing chilled air into the front of the racks and the warm exhaust air from the back of the racks back to the cooling units.  

Requirements for Fire Truck Movement:

·        Minimum Approach Width:  A clear, unobstructed path of at least 4.5 meters must be maintained for the fire tender's movement around the building. 

·        Height Clearance:  The height clearance for the approach path must be a minimum of 5 meters to allow for the passage of the fire truck. 

·        Turning Radius:  A minimum turning radius of 9 meters is required for fire tenders weighing up to 45 tonnes to facilitate their movement on site. 

·        Open Spaces:  The approach to the building must have a width of not less than 6 meters on all sides, in addition to the required turning radius. 

·        Remote Access: Buildings require at least two means of access to the site, positioned remotely from each other, to ensure fire units can move freely and effectively. 

Note: If above criteria not fulfil then consideration for the fire truck and its movement shall be ensured in consultation with the local Fire Authority.

G-2.6 Lifts when planned to consider respectively for administrative building (as passenger lift as per Part 8/Sec 5A of the Code) and for the datacentre building (as special goods lifts and special service lifts, for which OEMs should be consulted considering the size, speed and weight of payload; and any required special requirement.

G-2.7 Heights of stories should be arrived at based on the size of racks opted and the associated services (like cooling/ducting) and the same is effectively addressed in the structural design. The total height of the datacentre building shall be arrived based on the FAR (which shall not exceed 5.0 and only Type 1 construction, see also Table of Part 3 ‘Development Control & Promotion Rules and General Building Requirements’ of the Code). Ground coverage shall not exceed 60 percent considering the peculiar requirements and the essential nature of these buildings which are required in the society in the current times.

G-2.8 Environmental Guidelines

·        Temperature: Recommends maintaining equipment within specific temperature ranges to ensure reliable and efficient operation. 18°C to 27°C (64°F to 81°F) for most common data center classes.

·        Humidity: Maintain relative humidity levels within an acceptable range, typically between 20% and 80% relative humidity. Low humidity can cause ESD, while high humidity leads to condensation and corrosion. 

·        Rate of Change: Control the rate of change for both temperature and humidity to prevent rapid shifts that can damage equipment. 

·        Prevent ESD: Low humidity can cause electrostatic discharge (ESD), which can damage or destroy sensitive electronic components. 

·        High-Density Cooling: For high-density IT equipment, consider advanced cooling solutions like direct liquid cooling in dedicated areas with independent controls. 

G-3 FIRE DETECTION SYSTEMS

G-3.1 Air Sampling is use of very early smoke detection apparatus (VESDA) in server areas. This system called Aspirating System. It provides extremely sensitive, pre-emptive fire detection by continuously drawing air samples through a network of pipes to a central laser-based detector that identifies microscopic smoke particles before a fire escalates. Pipe network design as per OEMs instructions. These systems, which require multiple alert and alarm thresholds, are characterized by very tight coverage limits, typically 200 square feet per detector.  Aspirating system can integrate with building management systems, fire alarm control panels, and suppression systems for comprehensive fire safety. Advanced aspirating models use sophisticated techniques, like CMOS imaging and multi-directional laser scattering, to accurately distinguish smoke from dust and other pollutants, significantly reducing false alarms.  As with any tool, proper maintenance is important. Set up a schedule, or use a fire prevention expert to assist you, to regularly calibrate your equipment, check for proper airflow patterns, and ensure the aspirating systems remains in proper working order.

G-3.2 For other requirements on fire detection and alarm system 4.9 be referred.

G-4 FIRE SUPPRESSION SYSTEMS

G-4.1 The fire suppression system in data centres shall be designed to ensure both operational continuity and protection of sensitive equipment. The preferred suppression technologies clean agent extinguishers (such as Inergen, HFC-236fa and HFC-227ea based system or equivalent) should be available throughout data hall areas. Aerosol extinguishing systems can be use a cutting-edge approach to fire suppression. These systems shall be effective in suppressing fires without leaving any residue, making them safe for electronic and electrical installations. Clean agent systems are essentially discharge nozzles connected to a pressurized tank that releases the contents of the tank upon system activation. The system can be activated by electronic means, such as smoke detectors, or by mechanical means, such as fusible links. Tube based suppression system at Rack level is also cutting-edge approach to fire suppression. Fire Suppression system design as per OEMs guideline. As with any tool, proper maintenance is important. Set up a schedule, or use a fire prevention expert to assist you, to regularly calibrate your equipment, check for proper patterns, and ensure the Fire Suppression systems remains in proper working order.

G-4.2 All critical areas within the data centre, including server rooms, network rooms, UPS and battery areas, and under-floor and overhead spaces, must be covered comprehensively by the fire suppression system.

G-4.3 The suppression agents should be ozone-friendly and compliant with international environmental norms. The recharge process must be easy, with minimal downtime, and the equipment should be easy to test periodically.

G-4.4 As an alternative to clean agents, special automatic fire sprinkler systems can be installed. These systems are referred to as “pre-action sprinkler systems.” Pre-action sprinkler systems are interlocked with electronic detectors, such as smoke or heat detectors, and activate only when the electronic detection system actuates. As an additional layer of protection from accidental activation, a single sprinkler head and an electronic detector need to activate before water fills the normally dry piping that protects sensitive rooms. When the system is not active, its piping is dry, and no damage would occur if a sprinkler head accidentally or inadvertently discharged (because the electronic detection system also must actuate to fill the sprinkler system with water). This type of sprinkler system is referred to as a double-interlock pre-action sprinkler system.

G-4.5 An early warning fire detection and suppression system shall be integrated with the fire alarm and Building Management System (BMS) for real-time monitoring and response. The system shall be engineered to offer reliable and quick suppression to minimize damage and downtime.

G-5 ELECTRICAL AND HVAC FIRE SAFETY (see also Part 8/Sec 2 and Part 8/Sec 3 of the Code)

G-5.1 UPS, transformer, and generator rooms should be separated with fire-rated partitions/doors and have independent suppression systems. Should the need arise, the generators can be placed one over the other/stacked (upto 5 numbers) parallel to the data centre building, but adequate fire safety should be ensured for which OEM’s advice and specialist literature should be referred. Height of datacentre shall be the upper limit for height of DG sets, if stacked. Integrate smoke detectors into the system to provide early warning of fire hazards, such as from short circuits or overheating components. 

G-5.2 Wherever batteries are provided, the same shall be segregated by 120 min fire rated construction. Ventilation to the room shall be provided as per manufacturer’s instructions. Ventilation system must provide a minimum of 1 cubic foot per minute per battery cell and operate based on hydrogen concentration.

Battery room,  generally requires a hydrogen gas detection system to mitigate explosive risks from lead-acid batteries. The system should include hydrogen sensors located high in the room where the gas accumulates, smoke detectors for early fire detection, and an integrated system to activate alarms, ventilation, and potentially trigger a safe shutdown of the charging system if hydrogen levels exceed a safe threshold, such as 1% by volume. Mount hydrogen sensors near the ceiling, as hydrogen gas is lighter than air and rises and accumulates at the highest points of the room. When hydrogen concentration reaches a preset level (e.g., 1% by volume), an audible and visual alarm should be activated to alert personnel. Integrate smoke detectors into the system to provide early warning of fire hazards, such as from short circuits or overheating components.

G-5.3 Air conditioning and ventilating systems shall be so installed and maintained as to minimize the danger of spread of fire, smoke or fumes from one floor to other or from outside to any occupied building or structure. Additionally, air inlets must be installed near the floor, while exhaust outlets must be placed at the high point of the room, to exploit hydrogen's low density and upward movement, maximizing ventilation efficiency. (hydrogen is lighter than air and diffuses upwards very rapidly)

G-5.4 Supply air ducts, fresh air and return air ducts/ passages must include fire dampers and smoke detectors (see 3.4.8.4).

G-5.5 Insufficient power capacity design for a data centre can result in various issues such as system downtime, data loss, Increased cost, reduced performance, regulatory non-compliance. Ensuring a robust power capacity design is crucial for the reliable and efficient operation of data centres.

G-6 MEANS OF EGRESS

G-6.1 Exit Access

Exits for shall be provided on each floor or compartment in accordance with 4.4.2. All exits should be unobstructed, illuminated, and clearly marked.

G-6.2 Staircases and Corridors

Staircases must be enclosed, fire-rated, and positively pressurized to prevent smoke ingress. Staircases shall be of minimum 1.5 m in width, and 2 numbers of it will be required in the datacentre building. Staircase for administrative building shall be arrived at using clause 4; in any case, minimum 2 staircases are required.

G-6.3 Emergency Lighting and Signage

Emergency lighting consistent with emergency system for the building shall be provided. Addressable emergency exit lighting system is recommended, adaptive type exit signages can also be used.

G-7 MEP, FIRE FIGHTING, AND SEISMIC SUPPORT REQUIREMENT

G-7.1 Earthquakes can cause downtime, data loss, service disruptions, fire, etc. Seismic bracing is essential to secure MEP equipment and systems, safeguarding them against the threats posed by earthquakes.

G-7.2 Non-structural measures focus on protecting operational components. These include seismic-rated mounting systems for equipment racks, secure cable pathways, MEP and fire fighting services to avoid disconnections, and reinforced architectural features like ceilings and raised floors. These elements must meet seismic standards to ensure systems stay operational during and after an earthquake.

G-7.3 Seismic analysis/calculations should be carried out based on Part 6 ‘Structural Design, Section 1 Loads, Forces and Effects’ of the Code and IS 16700. Each nonstructural component’s seismic interactions with all other connected components and with the supporting structure shall be accounted for in the design. The component shall accommodate drifts, deflections, and relative displacements determined in accordance with the applicable seismic requirements of standards.

G-7.4 Each straight pipe/duct/cable containment run with two or more supports requires a minimum of two transverse braces (perpendicular to the run) and one longitudinal brace (parallel to the run).

G-7.5 Wire rope angular bracing should be seismic certified/tested by third party accredited lab as per method of testing for rating seismic and wind restraints. Rigid angular bracing and modular support system should be analyzed for both tensile and compressive loads for strength and serviceability for the maximum length of element being used in worst case condition as per load combination as mentioned in standards.

G-7.6 Calculate static and dynamic loading due to wind forces required to select/design vibration isolators, bases and seismic and wind restraints for outdoor and roof top equipment’s/services. The calculation of wind load shall be as per Part 6/Sec 1 of the Code. Worst case between seismic loads and wind loads shall be considered for supporting and vibration isolation.

G-8 SECURITY

G-8.1 It is recommended that all doors shall be access controlled measures to restrict entry to authorized personnel only, preventing unauthorized access and protecting sensitive data and infrastructure. This is achieved through a layered security approach including physical security for building entry, electronic systems like proximity card readers or biometric authentication for server rooms, and even integrated software for remote monitoring and control.

Key Elements of Data Center Door Access Control

  • Layered Security: Access control is implemented in multiple layers, starting from the building's main entrance and progressing to more secure areas like server rooms.
  • Racks level Security: Access to each individual server rack within a data center will be individually secured and controlled, not just the overall data center facility. This implies that, in addition to physical entry to the building and data center floor, each specific rack needs separate authorization for access, typically using systems like keycard readers, biometrics, or PIN codes, to prevent unauthorized individuals from directly interacting with or tampering with the servers and equipment housed within the racks.
  • Authentication Methods: Common methods include proximity cards, key fobs, smart cards, and biometric scanners (fingerprint or face scans). 
  • Multi-Factor Authentication: Some areas may require a combination of authentication methods, such as both a card and a biometric scan, to grant access. 
  • Monitoring and Alarms: Systems record every access instance, and alarms are triggered if doors are forced open or held open for too long, initiating an incident response. 
  • Remote Control and Surveillance: Advanced solutions allow administrators to remotely monitor door status (locked/unlocked) and integrate real-time surveillance feeds into a central Data Center Infrastructure Management (DCIM) system.
  • Integration with CCTV & Alarm Systems: Centralizing security management through the integration of third-party solutions like CCTV into the Command Centre platform enhances both visibility and response.

    For example, when access to a restricted area is denied, a critical alarm is triggered. Operators can utilize the Command Centre viewer to monitor the alarm and associated CCTV footage. Notifications can then be sent to the cardholder via email, text, or app alerts, guiding the appropriate response. This system streamlines the management of access denial alarms, consolidating all necessary information into a single interface, and facilitating seamless coordination between different security measures, enhancing overall protection.
  • Visitor Management: Visitors are issued temporary photo badges and must be escorted by authorized personnel, with their access rights being logged and revoked upon departure or as per automatic time defined. 
  • Mantraps: Some highly secure areas, like server rooms, utilize mantraps—two interlocked doors that prevent more than one person from passing through at a time—to serve as a final layer of defense. 
  • Lights-Out Data Centers: In some advanced facilities, access is minimized, with remote management and automation systems handling operations, further reducing the need for physical entry and enhancing security. 

G-8.2 In line with safety requirements, access shall be open for the fire affected area.

G-9 OPTIONAL PERFORMANCE INDICATORS

For guidance on the performance indicators of datacentres, the following good practices may be referred.

Reference:
CED 46(26992) WC - Draft Code for Comments Only.
NBC 2016 Part 4.
NFPA Portal

About Author:

Dr. Arindam Bhadra is a Fire safety consultant  & ISO Auditor based in Kolkata, India, with over 20 years of experience in Fire safety systems. He’s currently founding director of the Sprinkler Fire Safety Awareness and Welfare Foundation & SSA Integrate. He working on Fire Safety awareness, training, consultancy & Audit in same field. Dr. Arindam Bhadra is popularly known as "Fire ka Doctor" because of his expertise in fire safety, prevention, and awareness, helping people and organizations stay safe from fire hazards. He is Member of FSAI, NFPA, Conformity Assessment Society (CAS) etc. He is certified fire Inspector and certified Fire Protection professional.

Monday, November 15, 2021

Fire Exit Door Alarm

Fire Exit Door Alarm 

Fire Exit Door Alarm has proven to be a highly effective way to deter personnel and visitors from making unauthorised exits or entry through emergency exit doors or fire exit door. This versatile exit alarm can serve as an extremely inexpensive security device and also deter theft. Arming delay allows unit to arm following authorized exits.

How It Works
If the protected door is opened, the Electronic Exit Alarm emits an ear piercing alarm. Once the door is closed, it can be programmed to automatically reset or continue sounding the alarm until manually reset.

In exit alarm mode, alarm can be set to sound for 30 seconds, 3 minutes or indefinitely (unless disarmed with key supplied or until battery is drained).

A variety of alarm duration and automatic reset features are available. A key operated override facility will silence the alarm and allow authorised exits.

It can be integrate with local addressable fire detection & alarm system to get info at BMS / FACP, if your programmer enable logic program then you able to operate Strobe / Hooter accordingly.

It can be integrate with local access control system.

Easy to install
The battery provided with the exit alarm should be inserted into alarm unit. This red octagonal unit is then easily attached on the inside of the exit door using the four screws supplied. The small, corresponding magnetised piece is then attached to the door frame. When the door is in the closed position, the alarm unit remains silent. However, when the door is opened and the contact broken, the alarm will sound, thus deterring any unauthorised door use.

Being red, it is highly visible. As such, it also acts as a visual deterrent as well as an actual deterrent once the alarm is activated (unit also available in green) This product also comes with a strobe light so it can be easily identified in low-light areas.



You may need one or both types of system on the different doors within your building. Hopefully, this post has provided you with the information you can use to determine if the current system use for fire exit door monitoring are adequately meeting those needs and are compliant with all the relevant codes. You can not use EM Lock in Fire Exit Door with Access Control System. Panic bar is mostly use to protect unauthorized entry / exit.  If you’re not sure, SSA Integrate can help. We have Certified Access Control & fire experts that can help you determine the best solution to meet your security needs while keeping you compliant with all the relevant codes. Contact SSA Integrate today to learn more.

Thursday, July 15, 2021

Cybersecurity for Fire Alarm Systems

 Cybersecurity for Fire Alarm Systems

Active fire protection typically requires some sort of input, such as a person triggering a fire alarm. Where it is automatic, such as with sprinklers or alarms which detect smoke and fire, these systems are usually localised, operating only within a certain vicinity. To turn them off, you usually have to access a valve or control panel and make the change manually.

From cell phones to refrigerators, we live in an interconnected world. The Internet of Things (IoT) is the network of physical objects — such as cars, thermostats and watches — that have the ability to exchange data and interoperate with existing network infrastructure. They transmit data to manufacturers, owners or other devices, and can be sensed and controlled remotely. It provides us with real-time control and information from IoT-enabled products and systems.

Networked fire Alarm systems have a number of advantages over these traditional ones. If an alarm goes off, for instance, a networked system can tell you exactly where it is and when it was activated, giving you more information that you can use to take action. It can also allow you to link different parts of a building or site without running cables between them, and can allow you to operate it remotely, either to turn it off or for testing.  Today’s IoT smart buildings include two types of connected technologies: information technology (IT) and operational technology (OT).

Fire alarm control units, intrusion detection systems, mass notification systems and access control systems reside on the OT side usually managed by facilities operations. Both systems have vulnerabilities that commonly include equipment tampering as well as inside and outside threats. Firewalls and other cyber protection processes and devices can help mitigate the potential for a widespread attack and protect the individual components of the IT or OT systems. 

Cyber vulnerabilities can have a dramatic consequence if these products and systems are not properly protected. Building sensors can provide early detection of unwanted events such as intrusion or fire. Cameras are used for monitoring and remote surveillance that may communicate with alarm control units that can in turn provide information to end users and monitoring stations. Historically these products were hardwired, but technology has enabled us to communicate either wirelessly or wired through an IT infrastructure that is also linked to the internet. Electronic life safety and physical security infrastructures include emergency communications systems, fire alarm systems, alarm receiving systems, automated teller machine systems, access control systems, surveillance cameras, DVRs, NVRs and the like.

There are a variety of codes, standards and best practice guidelines that can help guide creation of a cybersecurity program. Fire alarm control units may include two types of software: executive software and site-specific software. These applications are covered by UL 864, the Standard for Safety of Control Units and Accessories for Fire Alarm Systems, and NFPA 72. Under part of UL 864, third-party certifiers execute and test the equipment’s software for integrity of normal operation. UL 5500, the & Standard for Safety for Remote Software Updates, covers best practices for software patches and updates. UL 5500 offers guidance on technical attributes necessary for the remote connection to smart devices and safe functionalities and securely executing remote software downloads. Most smart systems rely on the ability to update software remotely or onsite. UL 5500 applies to these applications in conjunction with the product’s end standard. To evaluate through tests, the cybersecurity of critically connected life safety and electronic physical security systems, Underwriters Laboratories has published UL 2900-2-3, the Standard for Software Cybersecurity for Network-Connectable Products, Part 2-3: Particular Requirements for Security and Life Safety Signaling Systems. This newest addition to the UL 2900 series of cybersecurity Standards was developed as a bi-national (U.S. and Canada) consensus Standard and with industry input. It provides a foundational set of cybersecurity performance and evaluation requirements that manufacturers of network connectable products can use to establish a baseline of cyber protection against known vulnerabilities, weaknesses and malware. UL 2900-2-3 was developed specifically for security and life safety equipment and systems. It is a testable standard (not limited to audit-based investigations) applicable to IoT connected equipment such as fire alarm control units, mass notification systems, access control equipment and smoke alarms. For UL 2900-2-3, a three-tiered security approach was developed with an increasing level of security requirements for each tier.

The National Fire Protection Association (NPFA) Code 72 (National Fire Alarm and Signaling Code) describes reacceptance testing of equipment and systems when site-specific or executive software changes have been made and the equipment is commissioned and already in use. Site specific software update requires a 100% test of all functions known to be affected by the change. Currently, 10% of initiating devices that are not directly affected by the change (up to 50 devices) must be tested to verify correct system operation and a record of completion must be kept. These commonsense requirements help ensure full integrity of software changes. However, it would be challenging for any end user or code authority to directly verify that the software changes did not affect the integrity or operation of the system or equipment without additional testing or investigation. Third-party validation, reconfirmation and field testing is crucial. The work on the 2022 edition of NFPA 72, National Fire Alarm and Signaling Code is at the halfway point. The work on the first draft has been completed. In NFPA 72 2022 edition cybersecurity has been added. This is in addition to requirements to be added to 72 addressing cybersecurity that will be included in a new Chapter 11 and references the associated Annex J to address cybersecurity guidance. The Technical Committee on Fundamentals has been tasked with the development of the new chapter on cybersecurity. This chapter is still in development and will not be finalized until the second draft meeting to be held later this year. There is a task group made up of members from a number of the technical committees that are working on the requirements for cybersecurity.

At the time of the first draft this was still located in Chapter 10. At the close of the first draft, the following text was added:

Systems shall be designed and installed in accordance with one or more of the following cybersecurity standards:
(1) ANSI/ISA-62443 Series
(2) NIST Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
(3) UL 2900 Series
(4) or other standards accepted by the authority having jurisdiction.

This is not the final version.

I recommend the use of the EST4, which is an industrial or commercial life safety system with a firewall solution from EDWARDS. The EST4 Life Safety System is a state-of-the-art system with a firewall built to add several layers of protection to your systems. The EST4 comes with a 4-FWAL firewall, which blocks all traffic not needed for EST4 operation. It also features impenetrable 256 bit AES encryption securing the traffic through the EST4, including emails and communication with fire operation centres.  At SSA Integrate are ready for migration from EST3 to EST4 without changes of field component, with minimising financial impact.

 

Conclusion 

In today’s connected world, the variety of available devices offers numerous points of entry for cyberattacks. Now is the time for software developers and manufacturers to understand a system's vulnerabilities and to harden their product against cyberattacks. Verifying that alarm systems meet appropriate standards can help ensure the performance and reliability of a product’s software to decrease downtime and mitigate cyber risks. A safety system with a firewall is the most viable solution for this problem. A firewall is a comprehensive cybersecurity solution able to protect a fire alarm system and its IT infrastructure from unauthorized access.

If your Fire Alarm connect with IoT devices / Internet, then only your FACP is get entry for cyberattacks. If your FACP use as standalone basis or not connected with Internet any more than your FACP is completely safe for cyberattacks. In India most of FACP not connect with Internet so it’s safe from cyberattacks. Lots of customer having Control remotely Like: Two EST3 panel are in Kolkata, One EST3x in Bangalore & one EST3 in Delhi, Customer control via FireWorks all panel from Kolkata, in this case you must consider cyber security part for your estimate organization. Responsible System Integrator or OEM can’t offer you cyber vulnerable product.