Juvare ARC Key Concepts
Visual Risk Intelligence (VRI) makes it easy for the incident and crisis management teams to visualize potential risks, trigger early warnings, initiate crisis communications, and enhance risk management. VRI provides a clear and detailed understanding of the threat perception by correlating global risk events with locations, people, facilities, systems, and logistics. This helps organizations to proactively plan preemptive strategies and build their operational resilience. Components of VRI include map views, filters, forecasts, radar animations, search by location/contact/asset, and alerts.
A threat, event, incident, or vector that may damage, impair, reduce, or adversely affect all organizational assets (people, facilities, equipment, and supply chains). A threat is the potential of a natural or man-made threat source to accidentally or intentionally exploit a vulnerability.
-
Natural threats include: rainstorms, cyclones, floods, and earthquakes.
-
Man-made threats include: pollution, chemical spills, terrorist activities, and cyber attacks.
For more information about threats, events, and incidents, refer to Filter Maps, Incident Management, and IT Event Management.
Risk is the likelihood that a natural or man-made threat source will exploit a potential vulnerability, resulting in an adverse impact.
An Incident is an unforeseen occurrence that has the potential to become severe or to disrupt or degrade an organization’s assets and services if left unaddressed. Incidents are split into three types:
-
Operational Incidents: Examples include: personnel absence, power outage, network failure, and transport disruption.
-
Major incidents: A mass emergency outage or loss of service, although the definition of what differentiates an incident from a major incident varies based on the organization's requirements. Examples include: earthquakes, wildfires, floods, and hurricanes.
-
IT incidents: An unexpected IT event that disrupts business operations or reduces the quality of service. Examples include: system slowness, corrupted data, and login issues.
For more information about incidents, refer to Incident Management or IT Event Management.
Critical Events are large-scale activities that would lead to a disruption. Critical Events could disrupt businesses by closing premises and access routes, imposing increased security restrictions, and inconveniencing customers.
Critical Events include: sporting events, political rallies with known dates and duration, and parades.
Critical assets are the organizational resources vital to maintain operations and achieve its objectives. A critical asset, when disrupted or caused to fail, impacts the organization's business operations. Critical assets include human resources, facilities, technical and technological infrastructure, data, and the supply chain.
-
Facilities: Premises such as office buildings, schools, hospitals, laboratories, or government institutions that host people, systems, and data.
-
Equipment: Any kind of machine, apparatus, or appliance, such as mechanical, electrical, and manufacturing used for operations or maintenance.
-
Supply chain: Everything that includes the delivery of source materials from the supplier to the manufacturer through its eventual delivery to the end user.
A notification usually informs the user about threats or incidents, and gives information about what can or has happened. Notifications are set up by specific roles and are triggered by alerts to send a voice message, SMS text, email, or push notification.
Mass Notifications are critical communications of threats or incidents to specific or multiple contacts selected and grouped under criteria such as Employee Role, Location, and so on.
For more information about notifications, refer to Create a Notification and Manage Notifications.
Message Templates are reusable message formats for organizations or businesses to notify their stakeholders. This helps businesses by using only a template identifier, along with the appropriate parameters, instead of requiring the business to create new, full message content each time.
For more information about notifications, refer to Create a Message Template and Manage Message Templates.
IT Event Management is the process that monitors all events that occur through the IT infrastructure to detect and alert exception conditions. It ensures resolution of these alerts in order to continue normal operation.
IT Configuration Management Database (IT CMDB) is a database used to store IT asset information that is essential for an organization's IT service management (ITSM).
A staff schedule is an employee schedule or calendar for a specific time with employee names and their shift times. Organizations use these schedules to assign hours to each of their employees and to have a reference for shift times.