Healthcare security applications
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times&rsquo...
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individu...
It creates challenges when a mechanical locking system grows organically over the years: Managers at South Denmark’s Syrenparken mental health treatment facility no longer had a trustworthy overview of all their physical keys in circulation. Yet, to serve the people treated there, Syrenparken must store medicines and psychotropic drugs. However, it is critical that only trusted personnel gain access. On-site access control solution As part of a modernisation program, it was decided to u...
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorised access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could...
A total overhaul of care and safeguarding measures at Southern Health NHS Foundation Trust’s mental healthcare facilities was required following historic failures, including preventable deaths in 2012 and 2013. A root-and-branch reform programme was put in place to improve care, ensure transparency and cut risks. A comprehensive video surveillance solution was sought to underpin these efforts. The first phase project required complete video capture and recording at the Ravenswood House fa...
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centres, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organise each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What strategies do you use to get the most out of exhibiting at ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What company activities (outside the show floor) does your company organise each year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognisable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What strategies do you use to get the most out of exhibiting at ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What company activities (outside the show floor) does your company organise each year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organisations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analogue to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organised, and know which organisations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have travelled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organisations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organise each year? The activities we organise outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organise an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralised system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What strategies do you use to get the most out of exhibiting at ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What company activities (outside the show floor) does your company organise each year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What sets ISC West apart from other trade shows on the calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analogue cameras and switchers. Q: What strategies do you use to get the most out of exhibiting at ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilise a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How do you quantify your success at ISC West? What ROI do you receive from the show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialogue with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What company activities (outside the show floor) does your company organise each year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What sets ISC West apart from other trade shows on the calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organisation Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organisation, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organisations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organisations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organisation understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritised and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organisations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Could millions of burglar and fire alarm control units be recalled by the U.S. Consumer Product Safety Commission? That could be the upshot when the independent agency of the U.S. government rules on a 'Complaint of Non-Conforming Products' investigation requested on behalf of a consultant/forensic expert who says he has identified non-compliance dangers and vulnerabilities related to the devices. Breaching security standards Jeffrey Zwirn, an alarm and security forensic expert, says he has identified problems with the alarm devices and has posted online a series of videos confirming that they do not operate in conformance with Underwriters Laboratories (UL) 985 and 103 and NFPA 72 (National Fire Alarm and Signaling Code) Standards. Specifically, the single data-bus circuits of the hardwired devices can be short-circuited and become either fully or partially non-functional. The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products by addressing “unreasonable risks” of injury, such as risk of fire, chemical exposure, electrical malfunction or mechanical failure.The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products Typically, the CSPC evaluates such requests and determines what corrective action, if any, is appropriate, in this case possibly by the end of the year. IDS Research & Development Inc. (Zwirn’s company) and Connaughton Group LLC, a product integrity consulting firm, sent a request to the CSPC on Sept. 20 asking for an investigation of products across the North American household fire and burglar alarm control units and commercial burglar and fire alarm control panel category. Recalling alarm control units The request estimates that “hundreds of millions” of the units were sold and installed across the United States. They include products sold under brand names such as Honeywell, DSC, NAPCO, ELK Products, and Interlogix. If the recall were to happen, it would be the largest recall in the history of the alarm industry. The request states: “It is our expert opinion that these non-conforming control panels present a foreseeably dangerous and serious public safety hazard and risk to all of the unsuspecting consumers, their families and business owners who have these control panels installed in their homes and businesses.”These non-conforming control panels present a foreseeably dangerous and serious public safety hazard" Zwirn has also submitted the products for investigation by UL and Intertek Testing Services Inc., which respectively provide the UL and ETL certification marks and are Nationally Recognized Testing Laboratories (NRTL). Outcomes of those investigations are forthcoming. Jeffrey Zwirn also promotes and sells a product, The Interceptor, that would address the vulnerability. It is a microprocessor designed to protect the data-bus and auxiliary power output wiring installed throughout a protected premises.
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the ill and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Connecticut. A challenging safety diagnosis Avigilon has made us more efficient as we don’t have to spend much time sifting through large amounts of video” Charlotte Hungerford Hospital prides itself on supporting patient and staff safety in all hospital areas and locations. Several years ago, they found themselves with an outdated security system that lacked quality video coverage and recording capabilities. CHH struggled with reliable video playback and faced frequent system crashes. As a result, the hospital’s security operators were often unable to provide accurate evidence during forensic investigations and many liability claims and hospital incidents went unresolved. CHH needed a cost-effective, comprehensive security solution that could protect patients and staff across multiple locations while still being flexible enough to scale with the hospital’s growing needs. Avigilon AI & analytics technology With a desire to improve its legacy security system, CHH looked to Avigilon’s advanced artificial intelligence (AI) technology and video analytics to meet their security needs. CHH began a multi-phase upgrade that included installing over 100 Avigilon cameras with self-learning video analytics, deploying AI-based Avigilon Appearance Search technology and using impulse radar technology with the Avigilon Presence Detector (APD) Sensor. Avigilon Appearance Search technology – a sophisticated deep learning AI search engine – helps CHH quickly locate a specific person or vehicle of interest across all cameras both inside the hospital and care centres as well as outside parking lots. This technology provides CHH’s operators with enhanced situational awareness, enabling fast event response and helping to save time and effort during critical investigations. To protect areas of the hospital where cameras cannot be installed, CHH installed the Avigilon Presence Detector (APD), a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment. Avigilon presence detector sensors Our Security Department’s mission at Charlotte Hungerford Hospital is the safety of our patients, visitors, and employees” Capable of detecting persons who aren’t moving or are hidden, the APD sensors help improve situational awareness for CHH staff, and are used in areas where cameras are not permitted, such as restrooms or change rooms. When integrated with Avigilon Control Centre (ACC) video management software, APD sensors alert CHH operators of human presence while still maintaining privacy. Avigilon H4 cameras were used throughout the hospital to provide exceptional image quality and built-in self-learning video analytics, which provides accurate detection and notification of movement of people and vehicles. CHH also deployed HD Multi-sensor cameras which provide up to four camera views per camera installation, using only one camera license and network drop. This allows CHH’s staff to efficiently cover all angles in order to detect, verify, and act on potential security events across the hospital’s premises. Avigilon H4 and HD multi-sensor cameras At the core of CHH is a desire to help the community and still serve as the beacon of compassion it was founded to be 100 years ago. With these values in mind, the hospital’s mission when it comes to security is the safety of patients, visitors, and employees. Avigilon’s AI solutions have helped achieve this by moving the CHH system from legacy to advanced and providing effective monitoring around the clock while also helping to create operational efficiencies. Since deploying ACC software, CHH’s operators spend significantly less time reviewing recorded video, allowing them to focus on proactive event response. Working with Avigilon, Charlotte Hungerford Hospital has a roadmap for continued growth and exceptional patient safety.
Nowadays, the telecare sector still relies heavily on traditional systems or even analogue systems, which lags behind the proliferation of smart technology in other sectors. Akuvox, with its blockbuster indoor monitor, is tipping the UK telecare sector towards more humane, proactive and intelligent care through a project involving half a million elderly people living in thousands of care homes. Akuvox's customer, a key telecare service provider in the UK, sought to transform its traditional telecare system to address two crucial problems: long response time to emergency calls and limited extensibility in functionality, which hampered the ramping up of its telecare service. Akuvox's solution enabled smooth and HD audio & video communication, which enjoyed <50 milliseconds audio delay. Solutions and benefits Akuvox’s indoor monitor IT82, which enjoys compelling SIP and Android competence, was the silver lining for the customer. It not only delivered stellar user experience for the residents, but also improved their service quality in many ways, by creating a much safer and improved living environment, enhancing the management efficiency and work productivity, and reducing TCO. Surpassing traditional or non-SIP systems, IT82 set off emergency calls in seconds, which is a critical life-saving feature. Moreover, it enabled smooth and HD audio & video communication, which enjoyed <50 milliseconds audio delay. Its expertly-tuned Android OS was easy for consolidating all kinds of routine service via apps, such as paying bills and booking repair appointments, which boosted the amenity of residents’ living and mitigated the risk of accident from their running errands from place to place. In contrast, the original non-Android panel was limited in features, and it was also difficult to introduce new functions. The expertly-tuned Android OS was easy for consolidating all kinds of routine service via apps It is also noteworthy that whether it was configuration, firmware upgrading or software updating, they were efficiently carried out in bulk by auto-provisioning or via Akuvox management software. Simple deployment and management The ‘Contact List’ app allows the seniors to easily make hands-free audio or video calls to the monitoring centre, family, friends as well as neighbours. It is a convenient way for them to spend more time together and acquire a sense of belonging and intimacy. The live camera feed from the rooms of bedridden residents enables remote monitoring in real time Alarm activation is easy, prompt and guaranteed. If elders feel unwell or have a fall, they simply pull the cord connected to IT82, and a call for help is immediately dialled out. Also, connected with various sensors, such as door magnet, smoke detector and infrared sensor, IT82 will emit alarm sirens in case of hazards to urge the resident to take preventative action, whilst automatically issuing an alert to the service centre. The built-in camera of IT82 is a boon to the carers. They are able to see the condition of the elderly and the emergency scene during the call, and guide them to take preliminary self-help. In addition, the live camera feed from the rooms of bedridden residents enables remote monitoring in real time. Why Akuvox? Akuvox is a pioneer in SIP and Android-based intercom solutions. Drawing on 12 years of SIP experience and almost 10 years of Android competence, IT82 is one of the few massively-deployed Android indoor monitors worldwide. It not only delivers stable systems, but also possesses exceptional capability of deep customisation.
Hospitals, medical centres, university training centres, clinics and other healthcare institutions are exposed to legal liability, ethical concerns and are subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare industry challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and economic growth are naturally driving healthcare expenditures higher in developing markets. The frequency of physician, medical service provider, and hospital/clinic visits are all likely to rise considerably in the future in both developed and emerging markets. All of this drives the need for video surveillance for security and for active medical treatment activities. Arecont Vision megapixel cameras are deployed by healthcare facilities of all sizes and types around the world to increase the quality and coverage of video while driving down costs of installation and ongoing operation. Arecont Vision deployment examples Arecont Vision IP megapixel camera technology, both single-sensor and multi-sensor products, has been proven around the world for a variety of healthcare sector needs. Entrances and exits to buildings, grounds, parking structures, car parks and facilities Office areas, emergency rooms, nursing stations, treatment centres, clinics, operating rooms, procedure rooms, morgues and patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient and staff safety What Arecont Vision’s healthcare customers say “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results." The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua" "The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua,” said Paul M. Sarnese, System Safety Director, Virtua Health “Performance sold us on Arecont Vision megapixel cameras. We are using the video surveillance system to look for recorded video of suspicious persons after a description is given. We are also using it to review slip-and-fall complaints and to address issues of employee accountability,” said Michael J. Matroni, Emergency Preparedness and Security Manager, Sacred Heart Health System. “The quality of Arecont Vision cameras more than satisfies our requirements for image quality. The system is working very well for us and Arecont Vision is extremely responsive to our needs.” "The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment," said Lai Voon Hon, General Director of Hoa Lam-Shangri-La, Vietnam
The Savelberg nursing home has implemented smart domotics to provide elderly people affected by dementia with a wider range of movement. Depending on individual abilities, residents can move freely within three living zones. Savelberg has chosen the Conview Care solution from Leertouwer, which uses MOBOTIX cameras. Integrating residential and care services Savelberg in Gouda is part of Zorgpartners Midden-Holland. Zorgpartners is a full-service organisation offering diverse residential and care options for elderly people in the Central Holland region. A lot of attention is paid to integrating independent living and care provision.Conview Care is a complete care solution for organisations that wish to improve their processes with the help of technology One of the fifteen centres, Savelberg is managed by Irene Feenstra, who said: “We have been investing for years in care for elderly people affected by dementia in order to increase their quality of life. In late 2014, prior to commencing the planned renovation of two sections that house elderly people affected by dementia, we started looking for a new call-for-assistance system. "Zorgpartners Midden-Holland have been using the IQ Messenger communication platform for some time, which is one of the reasons why, after comparing several solutions, we decided on Conview Care from Leertouwer.” Conview Care is a complete care solution for organisations that wish to improve their processes with the help of technology. It stands out in the market due to its open integrability, vendor-neutral technology, and ease of management. Video and audio care solution As soon as a resident ventures outside their allowed living zone, the care givers are notified through a message on their smartphone" "Here at Savelberg, the care solution includes video surveillance, sound and motion detection and electronic wristbands", says Jasper Coppes, Care & Technology specialist at Leertouwer. "This combination automatically informs the staff if one of the residents exits the approved living zone. "High resolution Q25 MOBOTIX cameras function as smart video and audio sensors. In addition, an infrared ring developed by Gold-IP is provided thus allowing for night-time surveillance. This naturally happens with the consent of the customers or their direct family, and without saving any images." "Each residence is equipped with a smart sensor with camera which automatically sends a message once a resident gets out of bed," says Feenstra. "If the person returns to bed after going to the toilet, there is no problem and nobody needs to go and check on them. If said resident needs help, the care giver in charge notices immediately, enabling them to react adequately." 24/7 wander detection Using the Conview Care solution, Leertouwer has created three living zones for Savelberg, allowing for 24/7 wander detection. The innermost zone consists of the floor where elderly people affected by dementia live. Within this zone, they can move with a greater feeling of freedom, as the previous boundary using air-lock doors has been removed from near the elevator. The second living zone consists of the entire building with nine floors and all shared areas, while the third zone has an additional open terrace and garden. "Since we removed all physical boundaries our dementia patients have visibly thrived," says Feenstra. "As soon as a resident ventures outside their allowed living zone, the care givers in charge are notified through a message on their smartphone. If a resident leaves the outermost zone and thus our premises, we can immediately bring him or her back.”We plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years." New domotics give more freedom Although Feenstra prepared a business case for the new solution in late 2014, the greater freedom for all residents and the staff are more important than financial savings. "Our employees no longer need to do unnecessary night-time rounds which may disturb the sleep of residents, but can nevertheless immediately intervene if there really is a problem. Moreover, they feel that the new domotics ensures a lighter and happier atmosphere in the ward, which helps them enjoy their work more. "Approximately 40 flats over two floors have currently been equipped with a MOBOTIX Q25 camera connected to Conview Care. Until now, they have been working flawlessly. Implementing them was easier than expected and our care givers are also remarkably enthusiastic about and happy with them. They perceive it as a new way of working which increases the well-being of our residents. "Given these positive experiences, we plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years."
When it comes to securing a residential care home, there are no second chances. You need access control you can trust. In Pamplona, the Casa de la Misericordia care home put its trust in SMARTair™, advanced wireless access control from ASSA ABLOY. Caring for elderly residents Caring for vulnerable or elderly people presents a unique set of security challenges. Crucially when it comes to access control, residents may find it difficult to adapt to new or complex technology. Yet at the same time, an advanced system can hugely benefit this client group. Access control that feeds back to site managers in real time can directly impact quality of care, enabling staff to respond to incidents as soon as they arise. Residents aren’t the only ones that use a care home’s access system. Staff, volunteers and visitors must also be kept safe And, of course, residents aren’t the only ones that use a care home’s access system. Staff, volunteers and visitors must also be kept safe. What’s needed is a system that is both easy to operate and equipped with advanced access control features — a system like SMARTair™ Wireless Online. Flexible and expandable system To assist in the day-to-day care of over 500 residents, Pamplona’s Casa de la Misericordia had a specific set of demands for its new access system. Real-time control over the premises was essential in giving the residents the care they need, 24/7 and 365 days a year. “In a residence like ours it is critical to have real-time management that allows us to interact with a door at any time,” explains Ernesto Serra, Facility Manager at Casa de la Misericordia. The system also needed to be flexible and expandable, so it could be installed in 2 phases, starting with a new build before moving on to a building dating to the 1930s. Advanced wireless technology suited to retrofitting in an old building was another must-have: the older building has large doors and walls up to 1m thick. The new system needed to be flexible and scalable, so staff could manage access to 2 separate buildings from the same control point, amend access rights instantly, and tailor access privileges to the profiles of a varied set of site users, including staff, residents, volunteers, visitors and emergency workers. In a care-home environment, SMARTair™ upgrades security and convenience for both administrators and residents. SMARTair™ Wireless Online SMARTair™ Wireless Online met every requirement. With the 2-stage project complete — including 650 additional SMARTair™-enabled doors in the old building — access to the whole Casa de la Misericordia is managed from one control panel. Because SMARTair™ battery-powered components are fitted without the need for electric cabling, installing the system in a building with thick walls and doors was no problem. Installation was also quick, and minimised disruption to the day-to-day operation of the home. “A wireless solution that allows us to install access control without wiring up the buildings is a big advantage, the system has adapted to our present and future needs,” says Ernesto Serra. Remote management In a care-home environment, SMARTair™ upgrades security and convenience for both administrators and residents. With SMARTair™ Wireless Pro Online, system administrators can open any door remotely, without even being present at the premises. So, if there’s an on-site emergency, a security manager can open a door for any member of staff, even doors for which staff don’t usually have access permissions. It’s also easy to configure the system to detect use of an internal escutcheon handle. If a resident operates their room handle, the SMARTair™ system registers an event in real time, and can send an alert to security or care staff. With this feature, residents have the independence to come and go as they please, while those responsible for their care remain updated on movements. If a SMARTair™ card is lost, it takes a couple of click to cancel it. The costs, risks and inconveniences a mechanical key system have been eliminated A SMARTair™ Wireless Online installation also allows administrators to amend access rights on-the-go, so users can update their permissions without having to visit an access control point, cutting wasted staff time. SMARTair™ enables administrators to tailor fine-grained levels of access to the main entrance, drug and medicine rooms, residents’ private rooms, and any other configuration needed, for any individual. Practical advantages SMARTair™ practical advantages include battery-powered escutcheons and cylinders to fit wood, glass, emergency exit and fire-resistant doors, barriers, elevators, and more. The escutcheons can all be delivered with an antibacterial coating, for improved hygiene. Plus, there is a wide range of credentials, allowing every individual to open doors in the most convenient way. So, patients can carry a bracelet and tag for easy door opening. Managers can use the SMARTair™ app to open doors instantly from any Apple, Android or Windows smartphone. For staff, a standard RFID smart card is often the most convenient solution. The system also supports PIN and card+PIN multi-authentication, for an extra layer of security. At this Pamplona care home, SMARTair™ has provided a major security upgrade on mechanical keys. If a card is lost, it takes a couple of click to cancel it. The costs, risks and inconveniences a mechanical key system have been eliminated. For more information on how SMARTair™ access control is helping to protect the care homes of the future, visit www.tesa.es/smartair-residentialcare
Complicated key management systems can detrimentally affect nursing care. Staff using older, mechanical key systems find it difficult to keep track of who has the keys. Searching for that person to gain access to controlled drugs can waste much of a nurse’s valuable time. Pharmacy managers at Queen Elizabeth Hospital, Birmingham (QE Birmingham), identified a better solution for secure, quick and convenient staff access to controlled medicines: the PROTEC2 CLIQ® electromechanical locking system from ASSA ABLOY group brand ABLOY. Encrypted electronic locking and identification PROTEC2 CLIQ® is a key-based access control system based on high-security mechanical disc cylinders combined with highly encrypted electronic locking and identification. ASSA ABLOY worked with medical equipment manufacturer Bristol Maid to supply QE Birmingham with 1,400 keys and 1,600 cylinders to improve medicine security at the hospital – further broadening the company’s experience in safeguarding access to healthcare environments across Europe. With CLIQ®, power to the cylinder is supplied by a standard battery inside every programmable CLIQ® key, so no wires are required, making it an ideal retrofit solution for doors, cabinets and mobile drug trolleys. Each employee can now carry a single, physically identical, programmable CLIQ® key that opens any CLIQ® cylinder for which the system has authorised its access. No CLIQ® cylinder can be opened without the key first being authorised by the software. Remote key management QE Birmingham’s new PROTEC2 CLIQ® system also allows for remote key management. Comprehensive audit trails for locks and padlocks are available on demand, so chief pharmacists and nurse managers can instantly generate a report detailing who has accessed particular cabinets or drug trolleys at any time. It is easy to remove access permissions from lost or stolen keys using the admin software, or to amend the access permissions of any CLIQ® key. All these features are enabled by CLIQ® technology, and combine to substantially increase the security of controlled drugs — and to save nurses’ time. “Efficiency is also increased,” explains Aaron Ballard Ridley, healthcare sales specialist at ABLOY UK. “As each nurse has access to their own key with personalised access rights, they don’t have to waste time looking for who has the key to a particular cupboard.” “The message from all nursing staff is that patients are getting medicines much easier and in a more timely fashion,” says Inderjit Singh, Chief Pharmacist at QE Birmingham. “For us, the key return on investment is the quality of service we’re providing.”
Round table discussion
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?