Healthcare security applications
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the ill and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Conne...
Nowadays, the telecare sector still relies heavily on traditional systems or even analogue systems, which lags behind the proliferation of smart technology in other sectors. Akuvox, with its blockbuster indoor monitor, is tipping the UK telecare sector towards more humane, proactive and intelligent care through a project involving half a million elderly people living in thousands of care homes. Akuvox's customer, a key telecare service provider in the UK, sought to transform its traditional tel...
Hospitals, medical centres, university training centres, clinics and other healthcare institutions are exposed to legal liability, ethical concerns and are subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare industry challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and eco...
The Savelberg nursing home has implemented smart domotics to provide elderly people affected by dementia with a wider range of movement. Depending on individual abilities, residents can move freely within three living zones. Savelberg has chosen the Conview Care solution from Leertouwer, which uses MOBOTIX cameras. Integrating residential and care services Savelberg in Gouda is part of Zorgpartners Midden-Holland. Zorgpartners is a full-service organisation offering diverse residential and car...
When it comes to securing a residential care home, there are no second chances. You need access control you can trust. In Pamplona, the Casa de la Misericordia care home put its trust in SMARTair™, advanced wireless access control from ASSA ABLOY. Caring for elderly residents Caring for vulnerable or elderly people presents a unique set of security challenges. Crucially when it comes to access control, residents may find it difficult to adapt to new or complex technology. Yet at the same...
Complicated key management systems can detrimentally affect nursing care. Staff using older, mechanical key systems find it difficult to keep track of who has the keys. Searching for that person to gain access to controlled drugs can waste much of a nurse’s valuable time. Pharmacy managers at Queen Elizabeth Hospital, Birmingham (QE Birmingham), identified a better solution for secure, quick and convenient staff access to controlled medicines: the PROTEC2 CLIQ® electromechanical lockin...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
People feel at home where they feel good and are familiar with the surroundings. The retirement village in the centre of Windisch in a park-like environment, is an ideal place to be for people in their third and fourth stages of life. The facility provides different types of living, support and care, plenty of variety and numerous opportunities to take part in group activities. EVVA Inner Code System Elderly residents with different residential options including care and support call Sanavita Alterszentrum Lindenpark their home. A pleasant and appealing atmosphere within and around the development is paramount – it goes without saying that security is also in the focus. In terms of locking systems owners opted for a combination of mechanical and electronic locking system: EVVA ICS and Xesar. Xesar: guaranteed healthcare Particularly healthcare facilities are highly sensitive areas that not everyone should have access to. A highly secure, yet flexible locking system is required to ensure access restrictions and simultaneously grant medical staff fast access to individual areas. You can flexibly grant and revoke access authorisations. As a result, exclusively authorised users are granted access. Consequently, the existing locking system at Alterszentrum Lindenpark was replaced by Xesar. Safeguarding medical cabinets The electronic solution now also secures medical cabinets including drawers containing toxic substances as well as refrigerated medical cabinets at the corresponding ward facilities. The Xesar wall reader as the updater unit at the main entrance guarantees fast security within the existing virtual network. Xesar wall readers in combination with electronic motorised cylinders (EMZY) have been installed in all outside doors. The project was managed by EVVA Rotkreuz and local EVVA Partner UTO Sicherheitstechnik AG took care of system installation. Securing residents’ properties “Securing the building towards the outside and securing residents’ properties was the primary aim”, Remo Breuss explains, EVVA’s head of sales in Switzerland. “Exclusively authorised persons must have access to medical areas. Xesar can record a precise protocol showing who has access to what and when. The ICS mechanical locking system has also been integrated. "The vast number of different user groups was a particular challenge. The project also required plenty of expertise to comply with the requirements for an escape route concept as per statutory stipulations. The combination of electronic and mechanical locking system was the ideal solution for Alterszentrum Lindenpark.” EVVA technology in the facility 502 ICS cylinders 415 Xesar combi keys 21 e-half cylinders 56 e-escutcheons 162 e-handles 14 wall readers 1 updater unit
The City International Hospital (CIH) is a new multi-specialty hospital located within the Binh Tan district in Ho Chi Minh City, Vietnam. Located in the International Hi-Tech Healthcare Park, CIH features the latest medical technology and imaging equipment. With a large volume of visitors anticipated at the hospital every day, the need for a best-in-breed surveillance solution was a high priority from the onset of the project. To fulfill this requirement, hospital administrators turned to Citek Corporation, a technology integrator located in Ho Chi Minh City. IP surveillance with Arecont megapixel cameras The need to secure CIH by maintaining the highest levels of situational awareness was a primary design objective for the new video surveillance system. To achieve this goal, Hoa Lam’s management team worked together with Citek’s technical personnel to design and install a superior video surveillance system. The decision to deploy an IP surveillance solution featuring Arecont Vision megapixel cameras was based on superior functionality and image quality, ease of use, and the ability to manage the system centrally or remotely. “We always rely on the quality of Arecont Vision® cameras”, says Mr. Thomas Tran, CEO of Citek Corporation. “Our experience with Arecont Vision® has made them our first choice for every large project because of their exceptional performance and image quality.” Situational awareness both day and night Citek became an Arecont Vision® installer in Vietnam in 2009, and installation of the video surveillance system was a smooth process by the experienced integrator. The video surveillance system at CIH is monitored on a local network, which includes a main server and two client systems. There are approximately two hundred Arecont Vision cameras installed at the CIH facility to date There are approximately two hundred Arecont Vision® cameras installed at the facility to date, including approximately one hundred SurroundVideo® 360° AV8365DN 8 megapixel (MP) panoramics and 35 SurroundVideo® 180° AV8185DN 8 MP panoramic cameras. These high-performing cameras deliver exceptional situational awareness in both day and night lighting conditions. Additionally, there are approximately 60 Arecont Vision® MegaVideo® AV2115DN compact day/night megapixel cameras installed at key locations which are operational 24/7. “The quality of Arecont Vision® cameras more than satisfies our requirements for image quality,” said Mr. Lai Voon Hon, General Director of Hoa Lam-Shangri-La. “The system is working very well for us and Arecont Vision® is extremely responsive to our needs.” Substantial savings, superior coverage The CIH management team carefully evaluated their long-term return on investment (ROI) comparing IP and analogue surveillance system solutions. Since a smaller number of Arecont Vision® megapixel cameras provide superior area coverage to conventional cameras, substantial savings are derived. This includes reducing the number of cameras, cables, poles, and housings plus the requirement for less ongoing maintenance and fewer VMS licences. Additional savings are derived from the reduction in manpower needed to watch video feeds and guard the facility. Beyond the financial benefits, CIH management recognises the intangible ROI achieved from maintaining high security, which makes the facility a safer place for patients, staff and visitors. “The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment,” said Mr. Lai Voon Hon.
Healthcare facilities such as hospitals and general practitioner surgeries are locations that pose significant challenges for security managers with lots of activities needing to take place quickly, such as lifesaving treatments, while ensuring the protection of patients, staff and property. MOBOTIX intelligent video MOBOTIX intelligent video systems, using decentralised architecture, have proven a particularly good fit to solve many of these issues. Alongside traditional video surveillance, MOBOTIX uses smart sensors able to detect a wide range of things such as person leaving a room or a bed during the night; how often lights are turned on; as well as the heat and room temperature control. Information from biomedical sensors and devices can also be captured and displayed in real time to notify care providers. Seamless integration For example, an integrated TELUS broadband service or other infernal facility infrastructures can send alarm notifications via SMS, voice & video messages or simply triggering a beeper. The open application programming interface (API) and software development kits allows MOBOTIX devices to be seamlessly integrated into a range of audio, video and SIP devices plus healthcare industry specific Lab Information System (LIS) and Electronic Medical Records (EMR) systems: A truly healthy option.
Located in the city of Pinelands, South Africa's Western Province Blood Transfusion Service (WPBTS) is a non-profit, independent organisation operating throughout the Western Cape. However, in reality, this is the largest blood bank in the nation and shoulders a medical responsibility commiserate with this status. Annually in charge of over 165,000 units of blood, the WPBTS operates in accordance with both the World Health Organisation's international standards and local South African national law to assist patients with their medical needs. Monitoring medical areas In late 2011, the WPBTS contacted South African security installer Verivision to develop a hybrid solution that would: Ensure that sensitive medical areas are continually monitored Logistically monitor the packaging and dispatching of blood stock Monitor the movement of individuals throughout the facility Interestingly, from its very inception, this solution was meant to transcend the traditional goals of a normative security. This is to say, instead of only stopping 'bad guys', this WPBTS solution is intended to add value and bring logistical benefits to the medical facility. This is not to say that security was de-prioritised; but rather that it is meant to highlight the multi-functional IP role that Verivision aspires towards. iVMS Smart Search A big part of this value-add was the logistical tracking of blood packets. In this case, it was a Hikvision software feature that helped facilitate this aspect of the solution. Specifically, it was Hikvision iVMS-4200 Software's Smart Search feature for both the facility's existing analogue and IP cameras. Essentially, this feature provides motion detection, in a specified area, for security functions. In the case of the WPBTS, cameras are trained on a certain area containing valuable blood stock; if activity occurs, Hikvision's DS-8132HFSI-SH Standalone DVR is programmed to start recording a particular camera's video feed. Furthermore, if a bookkeeping incongruence is later detected, Smart Search allows the Material Manager (the individual largely responsible for the day-to-day and managerial duties associated with this IP CCTV system) to quickly search for the associated video based upon related date & time parameters. Keith Lewis, owner of Verivision, noted, "In many respects, this Smart Search feature is the key to the entire solution. Of course, it is only one of many aspects; however much of the hardware and technical work that went into designing the overall system was based upon the idea of efficiency. Smart Search very much epitomises this efficiency and has improved overall security while concurrently reducing shrinkage [loss] by a large margin. We are even able to better ensure laboratory standards are more efficiently met with WPBTS blood resources." Keeping with the DS-8132HFSI-SH, Mr. Lewis explained that in the WPBTS, the CCTV system has a unique internal design. Essentially, the CCTV system is maintained by the Central IT Department. In turn, the aforementioned Material Manager has an office in close proximity to this Central IT Department, and is connected by fibre-optical cable. Through these means, the Material Manager has the facility's lone client PC used to access any live or recorded video that is deemed to be of importance. "We are even able to better ensure laboratory standards are more efficiently met with WPBTS blood resources" The WPBTS requires video storage of anywhere between 50 - 90 days. With the medical importance of this facility, Mr. Lewis stated, "I only want the best possible resolution for both live and recorded views. This is why I chose the DS-8132HFSI-SH - it gives me 4CIF resolution real-time recording and an HDMI/VGA output at 1920×1080P resolution ... the best resolution possible for any of the analogue cameras in this medical facility." Current and future IP possibilities Hikvision's DS-9632NI-ST Embedded NVR was selected to allow the facility's IP cameras to function. As can be expected, Mr. Lewis expected nothing less from this NVR model. With up-to 5MP recording resolution and identical HDMI / VGA output as the previous DVR, he was not disappointed. Additionally, this NVR provides the ability to add 32 IP cameras to the overall solution, providing both an element of foresight and fiscal practicality for whatever the future may bring. IP eyes Placed in critical areas, such as the blood dispatch / transport area, and biometrically-secured access control stations, Hikvision's DS-2CD2012-I 1.3MP IR Mini Bullet Camera relies upon its excellent high-resolution capability to provide quality images. Almost antithetical to this 1.3MP technology is an equally important aspect: the DS-2CD2012-I's small, low-profile design. Mr. Lewis elaborated, "Since this model is primarily in main passageways, we wanted a camera that did not ... stick out. Instead, the goal was for a durable, unobtrusive camera that does a great job ... and with its IR ability, it had no problem doing this job in the middle of night, when the facility is locked-down and lights are off." Adding the proverbial cherry-on-top is the Hikvision DS-2CD7153-E 2MP Mini Dome Camera. Placed in the Transport Control Room, a logistical nerve centre of the medical building, the DS-2CD7153-E is responsible for keeping a visual record of exactly who is entering the building and exactly why they are doing so. In this transport control room, Hikvision's 2MP resolution mini dome is able to easily view the attendant's activities; giving a clear view of the logbooks and of people in the area. Providing a superb wide-angle view, this IP mini dome camera is both a security and value-added logistical benefit.
"In the busy environment of our ITU ward we have nurses working in shifts and visitors walking in and out. Consequently, the policy of the NHS trust is that we need to securely store our drugs. Before, we used key based cupboards to do so. Each of our 65 nurses owned a key to operate them, sometimes up to 100 times a day. As a result of the intensive use, the locks wore out regularly. Sometimes the nurses couldn’t lock the cupboards properly anymore and bent or broke their keys as a result. Patient safety always comes first, and we had to be confident that the cupboards were secure at all times. We also had to comply with the national NHS policy to securely store the drugs. That’s where Nedap came in." Recommendation for Nedap "When we asked our partner Carillion, facilitator of the NHS trust fund buildings, about a solution to comply with the NHS security policy, they recommended Nedap. They worked with Nedap before in other NHS site projects, for example NHS Crawley & Horsham hospital. Carillion had heard about the locker management functionality of Nedap’s security management platform AEOS. They told us that this solution could help us solve our key management problem in a cost effective way. Not only for us, but also for Carillion themselves," says Tara Laybourne, Manager of the ITU ward, Darent Valley Hospital. No more key management "Because the mechanical keys and locks wore out all the time, Carillion had to come over very often to replace them. Also, every time you copy a key, the key gets worse. Eventually it didn’t fit the lock anymore. It was an ongoing problem. That’s why we chose AEOS Locker Management,’ says Tara. ‘The main reason is that the locks can be operated with badges instead of keys. All of our nurses now have one single badge which operates every drug cupboard on the ITU ward.’ Also from a maintenance point of view the electronic locker management solution is very cost effective; locks and keys don’t have to be replaced anymore and as the locks are wired, there’s no need to replace batteries. Tara says: ‘Generally, the solution serves a good purpose and is worth the money." Track and trace access "Apart from the fact that we can now secure the access to the cupboards, we can also track and trace who’s accessed the cupboards at what time. That’s also one of the reasons why we’ve chosen for AEOS Locker Management. According to NHS policy, we have to keep our drugs securely stored. They regularly perform audit trails to check if we comply to the policy. In case of an audit trail, we can easily prove that only authorised persons had access to the cupboards," says Tara. AEOS Locker Management provides access control on micro level. Via an easy to use web application, accessible via every web browser, users can easily define who should have access to which lockable compartment at what time. When asked about the user friendliness of the system, Tara says: "We’re happy about the system, but still finding our way around it though. Sometimes, when we issue a new badge to a new colleague, we accidentally issue a visitor badge instead of an employee badge. Consequently, the new colleague can’t open the cupboards. Then we know that we did something wrong. With a few mouse clicks we can fix our mistake; the system is easy to manage. To keep the process of managing the cupboards secure and clear, only myself and someone else are authorised to manage the system and assign badges. In case both of us are out, the others have an algorithm to check user history if necessary." "In the past keys were sometimes lost or misplaced. Since the installation of AEOS Locker Management, they never lost a badge, so that’s a great benefit too" User experiences When asked about the cooperation with Nedap and its certified Business Partner, Tara says: "The cooperation was good. Nedap was available to come over in the case of an event. For example, one time, the cupboard wouldn’t close. It turned out that the hinges where dislocated. Because the nurses lean on it all the time, we had to renew them. So, it wasn’t really due to the system. In the past keys were sometimes lost or misplaced. Since the installation of AEOS Locker Management, they never lost a badge, so that’s a great benefit too." Future proof Darent Valley hospital is now ready for the future. In case more drug cupboards should be equipped with Nedap’s electronic locks, they can be integrated into the existing AEOS Locker Management system with a few mouse clicks. Because the hospital opted for the solid AEOS security management platform, they can also choose to add on functionalities like access control, intrusion or video management later on. For now, they only use the locker management functionality of the platform and they only pay for the locker management feature they use. Darent Valley hospital Darent Valley is a modern hospital in Kent offering professional care, exceptional quality and providing patients with the latest technology for their treatment in safe, comfortable and clean surroundings. The hospital’s team of around 2000 professional and friendly staff provides care for patients across a full range of day-patient, inpatient and out-patient care. It works closely with the local community to improve the standards of its services and welcome all patients both locally or further afield. As Darent Valley benefits from the solid AEOS platform, they can choose to add on functionalities like access control, intrusion or CCTV later on. For now, they only pay for the feature they use.
Hospitals present a complex security challenge, in that they should always be welcoming public spaces. Indeed, in Sweden, many are ‘open’ during daylight hours. However, every hospital also has many sensitive assets that need securing around the clock. Hospital security Key assets include patients, doctors, nurses and support staff. The protection of drugs and confidential patient data is critical. In labs, sensitive – even dangerous – research or testing materials demand constant monitoring. Valuable lab equipment is, unfortunately, a target for theft and vandalism. Then there are the extra logistical challenges; hospitals are often large and spread out and locks may need to integrate with fire detection, CCTV and other security systems. Not all site users are equal: medical staff, cleaners, patients and their visitors and countless temporary and contract workers all need access tailored to their specific and very different needs. Labs with a steady flow of visitors and contractors are safer if access is managed with time-limited ‘keys’ that can be revoked or revalidated when required. In case of any security breach, a thorough investigation is essential. In fact, it is often mandated for regulatory compliance. We expect too much of the traditional lock and key if we expect it to meet such a challenge. What is the alternative – especially at a time when European healthcare budgets are tight, even more so in taxpayer-funded institutions? Wireless access control solution An access control system with wired doors and programmable RFID smartcards can solve many of these problems. However, conventional wisdom says access control is expensive and cannot be installed everywhere, due to the need for extensive cabling. The result? It only covers doors with very high security requirements. That needn’t be the case – if we cut the wires. Wireless locks are the most affordable way to extend access control throughout a site, greatly enhancing security for a small outlay. What’s more, it does not require you to rip up the current security system and start again. Aperio® locks, for example, can easily ‘plug in’ to an existing access system, to bring monitored security to many more openings than would be possible with wired doors. They interoperate seamlessly with building management systems, linking wirelessly via a communications hub to the central system. Most importantly, they allow hospital managers to upgrade security and to give facility administrators more control over the premises – from monitoring pharmacy doors, to granting cleaners access only to their designated work areas, to revoking the access rights of any lost smartcard instantly. Exterior and interior doors Aperio® wireless locking technology meets the security and budget requirements of the modern hospital Critically from a compliance perspective, audit trails can be generated for any Aperio® lock, key or system user, at any time, making a proper investigation of any breach not just feasible, but straightforward. Aperio® components come in all shapes and sizes, for all kinds of hospital doors. The range includes locks, cylinders and escutcheons for wood, aluminium and glass doors. Aperio® can protect both exterior and interior doors, from certified fire and safety doors with mandatory security requirements to meeting and consulting rooms, labs, store rooms, offices and even server racks. The system can assign each a different level of security, if needed. Any installation can incorporate online or offline locks — or a mixture of both. Cost efficiency These locks can be installed quickly, without changing door hardware. There are YouTube videos under the search ‘Time challenge Aperio® cylinder’ which depict a technician complete an installation, from start to finish, in under 2 minutes. No wiring and no cabling means there is no electrician required and so no need to pay decorators to tidy up afterwards. Maintenance simply involves changing a standard lithium-ion battery once every 2 years – that’s it. Wireless locks are cheaper to run, too. Unlike wired locks, Aperio® wireless locks only ‘wake up’ when prompted by a credential. They are not connected to the mains and use no power when inactive. One wireless electronic lock uses approximately 0.001 kWh of energy per year. A standard wired lock and reader uses 55.2 kWh. Further, because any lost credential can simply have its access rights revoked, there is no longer any need for the expensive, time-consuming process of changing the locks when someone loses a physical key. Audit trails can be generated at the touch of a button, another saving on the substantial cost – in both staff time and money – of administering a mechanical master-key system. Aperio® locks can protect both exterior and interior doors and the system can assign each a different level of security Wireless access control in action Securing hospitals wirelessly has gone beyond the concept stage: Aperio® is already deployed in European hospitals. For example, in Belgium, Hospital Maria Middelares is a vital part of Ghent’s health infrastructure. In partnership with Nedap, around 700 doors in a new hospital building which opened in 2014 have been fitted with Aperio® Offline locks connected to a Nedap AEOS access control system. The deployment is 100 percent wireless, maintaining design aesthetics in the new build. Staff now open doors and access secure areas with a single smartcard using MIFARE RFID technology. As part of a £35 million refurbishment of A&E and other urgent care services, Aintree University Hospital in Liverpool, England, sought an upgrade to its access control system. The trust needed flexible access control to streamline day-to-day security operations, extending public access while also maintaining restrictions to sensitive areas. They wanted a cost-effective, wire-free system, so installation could be done quickly and efficiently, without disrupting the day-to-day work of the hospital. ASSA ABLOY partnered with Grantfen and Inner Range to deliver a unified platform, which extended the Integriti access control system with ASSA ABLOY’s Aperio® wireless escutcheons. Hospital security managers It took a minimal outlay on Aperio® wireless locks to transform security at the Centre Hospitalier Universitaire de Grenoble. Approximately 20 Aperio® Online cylinders and escutcheons were installed in hospital buildings. Previously, the open nature of the site had posed a significant risk of intrusion and stealing hospital property had become widespread, until Aperio® wireless access control drastically reduced theft from the premises. Aperio® Online technology also ensures hospital security managers can access building information in real time, even removing a swipe card’s permission remotely, if required. In France, the UK, Belgium and elsewhere, Aperio® gives doctors and nurses controlled access tailored to their shift patterns or working hours. Facility managers have real-time status information about their premises, with online or offline integration protecting wards, clinics and management offices. Audit trails for sensitive areas, such as labs and rooms where drugs or medical records are kept, are available on demand and hospital managers can extend access control to new buildings or bring monitoring to more areas as and when required, without breaking the bank. The key to upgraded, cost-effective hospital security? Cut the wires. For further information, please go to: www.assaabloy.co.uk/aperioforhospitals