Pelco by Schneider Electric, a global provider of surveillance and security products and technologies, has joined forces with AMAG Technology, a manufacturer of access control and security products. The integration provides a truly integrated and scalable access control and surveillance system management solution, enabling end-users across a wide spectrum of applications to make faster and more informed decisions. Protect facilities, assets and people “The integration of Pelco’s VideoXpert VMS and AMAG’s Symmetry Access Control System provides security professionals with an extremely powerful and versatile system management and control solution,” said Jonathan Lewit, Director of Technology Leadership, Pelco by Schneider Electric. “By engaging with industry leaders like AMAG, Pelco continues to focus its attention of providing users with meaningful innovation that delivers the best combination of performance, functionality, and cost-efficiency they need to best protect their facilities, assets, and people.” Pelco’s VideoXpert VMS and AMAG’s Symmetry Access Control System provide a number of versatile ways to combine surveillance and access devices with software into a unified Security Management System. The integrated solution is standardised for any IP LAN, WAN, or VPN network and is designed for minimal bandwidth use. For small systems, a single PC can host both VideoXpert and Symmetry, acting as both the client and server. "There’s a driving demandfor system solutions that seamlessly integrate high performance surveillance and access control technologies" Benefits of integration Other benefits of the VideoXpert VMS and Symmetry Access Control System integration include: a user interface design with graphical map capability; comprehensive alarm handling features; and the capability for unlimited client workstations, card readers and card holders. As an added bonus, video badging and visitor management software is also included. “As security professionals continue to look for ways to increase efficiencies and control costs, there’s a driving demand for system solutions that seamlessly integrate high performance surveillance and access control technologies,” said Dave Ella, Vice President of Products and Partner Programs, AMAG Technology. “With the integration of our Symmetry Access Control System and Pelco’s VideoXpert VMS, users of all sizes, have access to an extremely powerful solution that we believe surpasses their expectations.” Pelco by Schneider Electric is a member of AMAG’s Symmetry Preferred Partner Program. The Program assists companies wishing to develop and certify an interface between their product and Symmetry and provides a clearly defined route for manufacturers to achieve a trusted solution that is tested, certified, and supported by the Partner. As a Symmetry Preferred Partner, Pelco has previously integrated their Endura and Digital Sentry VMS solutions with the Symmetry Access Control System.
LifeSafety Power, a provider of proactive, intelligent networking power, has announced a renewed technology partnership with AMAG Technology, Torrance, California, offering turnkey, mechanical and electrical integration of power, access control hardware and lock power in a pre-designed enclosure. The FlexPower ACLASS Unified Power System for AMAG will be available as a turnkey product in a single, coordinated unit, offering specification and installation efficiencies to systems installers. FlexPower ACLASS FlexPower ACLASS Systems will incorporate AMAG’s Symmetry™ M2150 series controllers and leverage the complete integration of all components for 4-, 8- and 16-door systems in single and dual voltages, with the ability to add battery management, remote system reporting and proactive managed services. Traditionally, access control integrators would need three separate cabinets for system power, lock power and access hardware, greatly increasing the wall space footprint and the job costs due to multiple AC drops and inter-cabinet wiring. With ACLASS, security integrators can take advantage of a single chassis engineered to coordinate electrical and mechanical integration, providing faster, simpler installation and greater service efficiencies for AMAG installations. A removable back plate simplifies controller wiring and expansion slots are ready for network monitoring upgrades. The pre-connected power section further saves labour field time and an AC disconnect point yields easy servicing. Save on time and labour "FlexPower ACLASS power solutions allow installers to quickly deploy enclosures and save time and labour” The enclosure includes space for additional output distribution, alarm monitoring or intelligent managed services with NetLink® Network Communications modules for detailed power health reporting, remote battery testing, email/SNMP alerts and other predictive data. “FlexPower ACLASS power solutions allow installers to quickly deploy enclosures and save time and labour,” said John Olliver, Senior Vice President of Sales and Marketing, LifeSafety Power. “We’re excited to expand our partnership with AMAG Technology, a global leader in access control. Working with AMAG to present FlexPower ACLASS systems to the security industry will bring new opportunities to grow our integrated power solution designs and provide much-needed cost savings to the security installation community.” Unlimited possibilities The modularity of LifeSafety Power’s FlexPower line and ACLASS enclosures also provides the versatility to create an unlimited number of system configurations and specification possibilities. The factory pre-wired power section lessens configuration time and the removable back plate further simplifies controller and component wiring. “Our renewed partnership with LifeSafety Power provides a new level of choice for our certified resellers and can simplify the installation of Symmetry M2150 Intelligent Controllers,” said Dave Ella, Vice President-Products and Partner Programs for AMAG Technology. “The integration with FlexPower ACLASS power solutions delivers a time-saving, robust solution and we look forward to a long and successful partnership.”
AMAG Technology, a security solution provider specialising in access control, video management, policy-based identity solutions and visitor management, has announced that Matica Technologies is a new member of the Symmetry Preferred Partner Program. Matica’s EDIsecure XID8300 Retransfer ID Card Printer integrates with AMAG’s latest Symmetry™ Access Control software to provide Symmetry users with an affordable, high quality printer to print access cards. AMAG Technology and Matica Technologies cooperatively tested and approved this integration. Solution for challenging card projects “We are proud about this new partnership with AMAG Technology,” said Ricard Ferrer, Head of Global Marketing for Matica Technologies Group. “Built from our industry proven and extremely reliable XID retransfer engine, the XID8300 offers a solution to the most challenging card projects. The certification and integration with Symmetry, the leading access control and video management platform, is a recognition which expands opportunities for both parties.” “The integration between Symmetry and Matica card printers provides a high quality, versatile solution for security teams to print their own cards onsite,” said AMAG Technology Vice President of Products and Partner Program, Dave Ella. “It prints at 300 and 600dpi which allows Symmetry customers to print complex fine lines and patterns for increased visual security and improved corporate identity.” The printer can be equipped with a number of encoding options such as magnetic encoding, contact and contactless chip encoding Reliability, performance and affordability With its compact size, the printer delivers the right combination of reliability, performance and affordability for printing durable and secure cards. The Matica XID8300 prints on a variety of card materials including long-lasting, durable non-PVC cards such as ABS, PET, and Polycarbonate. The printer can be equipped with a number of encoding options such as magnetic encoding, contact and contactless chip encoding to provide Symmetry Access Control users with several choices. Its 300dpi resolution printing achieves offset printing quality, even on uneven surface of smart cards. Diverse security features such as dye-sublimation UV ink ribbon for invisible security printing, IPSEC for encrypted data transfer through networks, and security erase of black data on used supplies, help to secure the environment and cards from counterfeiting and to avoid misuse of personal information.
AMAG Technology, a security solution provider specializing in access control, video management, policy-based identity solutions and visitor management, welcomes Telaeris to the Symmetry Preferred Partner Program. Telaeris’s XPressEntry handheld access control device integrates with AMAG’s latest Symmetry Access Control software. AMAG Technology and Telaeris cooperatively tested and approved this integration. “Telaeris’ native integration with Symmetry allows us to provide a world class, handheld employee mustering and verification system to AMAG’s clients who want to provide the best security and safety systems for their employees,” said Telaeris CEO, David Carta. Enhanced security and safety “The XPressEntry integration with Symmetry provides flexible, mobile access control from anywhere in a facility, increasing security in emergency situations when emergency mustering is critical,” said AMAG Technology, Vice President of Products and Partner Programs, Dave Ella. “Fortune 500 customers have chosen the integrated solution to ensure demanding security requirements are met. We look forward to a long partnership with Telaeris.” Telaeris’s XPressEntry natively interfaces with the Symmetry access control system and enables a broad range of handheld capabilities for Symmetry. XPressEntry pulls data from Symmetry using the Symmetry XML Open Integration Module, including employee name, photo, access privileges, credentials, and activity. This allows security operators to enhance security and safety by using handheld badge readers anywhere in their facility for multiple purposes. Live tracking capabilities Additionally, XPressEntry monitors the occupancy of each building, live tracking each entry and exit of employees and visitors from both fixed badge readers and Telaeris mobile units. The information is presented as a live view of who is inside any facility controlled by Symmetry. This allows users to be quickly checked as safely exited from buildings during fire drills and most importantly during true emergencies. Telaeris is the worldwide leader for emergency mustering systems and handheld badge reading solutions for security and safety. The XPressEntry system is built to provide extended physical access control features from a mobile handheld badge scanner, with the capability to read any badge credential.
ZKAccess and AMAG Technology have cooperatively tested and certified the integration ZKAccess is proud to announce that it is now officially an AMAG Technology Symmetry preferred partner and member of the Symmetry Preferred Partner Programme. Symmetry access control system The ZKAccess OP-200 fingerprint reader interfaces with the Symmetry Access Control system to provide biometric capabilities without needing additional middleware. ZKAccess and AMAG Technology cooperatively tested and certified the integration. “ZKAccess has completed the required AMAG Certification of their product integration with AMAG’s Symmetry security management platform," said AMAG Technology, Vice President of Product & Partner Programmes, Dave Ella. "The ZKAccess OP-200 fingerprint reader will provide end users with a highly secure fingerprint reader, when a biometric is the preferred option or in combination with a smart card. Many organisations are looking to add biometrics to their Symmetry system as an additional layer of security,” he added. "We are proud to offer the OP-200 fingerprint readers to our joint customers and look forward to a long partnership with ZKAccess.” Opera biometric readers As noted by ZKAccess CEO Larry Reed: "Unlike our competitors, who need to develop and sell expensive supporting middleware, our affordable Opera biometric readers communicate directly to the Symmetry Access Control system without needing any middleware whatsoever. This translates into tremendous cost savings in both material and labor for AMAG installers and end-users.” "OP-200 is just one model in our new Opera series of biometric readers designed to integrate with Symmetry," added Manish Dalal, ZKAccess COO and Product Manager.
Schlage AD-Series wireless electronic locking systems provide options – credentials, styles, and modes – that add to the Symmetry system’s flexibility, scalability, and control AMAG Technology, a security solution provider specialising in access control, video management, policy-based identity solutions and visitor management, welcomes Allegion as the newest certified member of the Symmetry Preferred Partner Program. Allegion’s Schlage AD-400 Wireless Locks integrate with AMAG’s latest Symmetry Access Control software. AMAG Technology and Allegion cooperatively tested and approved this integration. Wide access control deployment “Our partnership with Allegion will allow customers to deploy access control more widely and in areas where they may not have been able to justify the cost,” said AMAG Technology, Vice President of Products, Dave Ella. “We welcome Allegion to the Symmetry Preferred Partner Program and look forward to a long-lasting relationship.” Customised security solution “With the AD-Series, Symmetry users will be able to customise a solution to secure their facilities today while protecting their access control investment for years to come,” said Brad Aikin, Electronics Portfolio Leader at Allegion. “The modular, open architecture AD-Series lets users customise door openings with options such as credential reader type, networking, finish and levers to create a perfect fit.” Security management system Symmetry customers can install access control on more doors by integrating the Schlage AD-400 wireless lock into their security management system, eliminating the need to run wires to each access point, reducing time and associated labour costs. Schlage AD-Series wireless electronic locking systems provide options – credentials, styles, and modes – that add to the Symmetry system’s flexibility, scalability, and control. For instance, Symmetry customers can now simply and efficiently extend their present card systems to individual offices, cleaning closets and college dorm rooms. Allegion is a global pioneer in safety and security. Focusing on security around the door and adjacent areas, Allegion produces a range of solutions for homes, businesses, schools, and other institutions.
EyeLock’s iris biometric technology integrates with AMAG’s latest Symmetry Access Control software AMAG Technology, a security solution provider specialising in access control, video detection, policy-based identity solutions and visitor management, announces EyeLock LLC as its newest certified partner of the Symmetry Preferred Partner Program. As a certified partner, EyeLock’s iris biometric technology integrates with AMAG’s latest Symmetry Access Control software. AMAG Technology and EyeLock cooperatively tested and certified this integration. State-of-the-art iris-biometric technology “We welcome EyeLock as a certified partner and look forward to a long relationship where we can provide state-of-the-art iris-biometric technology to our customers demanding a more secure environment,” said AMAG Technology, Vice President of Product Marketing, Dave Ella. “We are excited to be a part of AMAG’s Symmetry Preferred Partner Program,” said Anthony Antolino, Chief Marketing and Business Development officer at EyeLock. “The integration of EyeLock’s technology with AMAG’s Symmetry Access Control system will help accelerate the adoption of EyeLock’s product offering by simplifying the implementation of iris biometrics across access control environments.” “The integration of EyeLock’s technology with AMAG’s Symmetry Access Control system will help accelerate the adoption of EyeLock’s product offering" Fast and secure authentication EyeLock’s nano NXT integrates with Symmetry Access Control through EyeLock’s Identity Suite (EIS), and can serve as part of a single factor or two-factor authentication process. The combination of EIS and Symmetry has made it possible to enable and significantly accelerate the onboarding of iris-based identity authentication technology. The Eyelock software synchronises with existing employee identities using the Symmetry XML Open Integration module, and when the system is in operation nano NXT communicates directly with Symmetry door controllers for a fast and secure solution. The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. The nano NXT can be used in a variety of environments including commercial/enterprise, corrections, data centers, education, financial services, government, healthcare facilities and hospitality.
Specified Symmetry alarms communicate with RISK360 allowing security teams to investigate incidents and produce accurate case management reports AMAG Technology, the security solution manufacturer specialising in access control, intrusion detection, video management, policy-based identity solutions and visitor management, announces the integration of AMAG’s Symmetry Access Control software with the G4S RISK360 incident and case management software. The integration delivers increased situational awareness and case management via a mobile platform for Symmetry users to investigate serious incidents. The Symmetry security management system is a comprehensive end-to-end software platform that provides access control, video management and identity management solutions. Its intelligent, easy-to-use software delivers the latest technology in a proven, scalable, easily deployed, integrated system that can be managed from a central application. Symmetry products give customers the ability to manage all their security needs while reducing risk and meeting industry compliance. "End users need to have informationand resources readily available tomake difficult decisions on how tobest protect their business, assets,brand, and, most importantly, theirpeople" Smart incident management and risk mitigation solution RISK360 is a web-based incident and case management solution that enables users to capture incidents, allocate investigations, promote standard operating procedures and aggregate data from disparate systems to mitigate risk. Capturing data via smart phone, tablet, kiosk or computer entry, RISK360 ensures success through configurable and customisable workflows, drill down reports and dashboards, and flexible escalation. Together, specified Symmetry alarms communicate with RISK360 to allow security teams to better investigate incidents and produce accurate case management reports. RISK360 workflow capabilities escalate incidents to determine if more investigation is necessary, providing increased security. After an event, case management allows full incident investigation and evidence gathering to take place for compliance reporting and risk mitigation. Accurately reporting, investigating incidents “The RISK360 integration works with Symmetry to provide a mechanism for capturing data related to reportable incidents and case managers take them through a full investigation process — quickly, easily and accurately,” said AMAG Technology, Vice President of Product Marketing, Dave Ella. “RISK360 also ensures all the appropriate stakeholders are informed and updated at the right time.” “With incidents happening every day impacting security, facilities, human resources, legal, safety and more, end users need to have information and resources readily available to make difficult decisions on how to best protect their business, assets, brand, and, most importantly, their people,” said G4S North America & Technology, Vice President of Managed Services, Allison Whitley Maffei. “Integrating RISK360 with Symmetry allows end users to respond to customer needs quickly, providing an accurate record of the alarm in Symmetry to capture incidents and produce actionable data for better overall security.” Save Save
Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin Wine, Vice President of Marketing, Verint, says healthcare users are looking for systems that are: Open and scalable, and can easily integrate with other systems and sensors; Intuitive to use and manage to help keep the focus on better situation management; Comprehensive and automated to help operators align with standard operating procedures and reporting structures; Intelligence-driven to correlate data with other sources of security and operational data for more accurate and comprehensive risk profile. Enhancing security efforts by the right means Ensuring the safety of patients, staff and visitors is no easy task, and while it is challenging for security officials to predict, prepare for or prevent every incident from occurring on the premises, robust strategies and programmes help these facilities achieve a higher level of situational awareness, says Wine. By improving security efforts with the right technology, protocols and procedures, hospitals are better equipped to ensure safety and security while driving new levels of business intelligence to ensure long-term viability in today’s market. By improving security effortswith the right technology,protocols and procedures,hospitals are better equippedto ensure security Healthcare facilities today seek holistic solutions that address a wide variety of security and business needs, says Wine. Video surveillance is a force multiplier, helping mitigate risks. Video and other security sensors and communication systems (i.e., access control, video analytics, dispatch, nurse call, alarms, RFID, et.al.) also help enable users to realise new levels of prevention – earlier detection is vital to prevent incidents. Situational awareness solutions But all of these valuable data points cannot be fully realised without correlating information from various solutions together, says Wine. Situational awareness solutions help hospitals gain a full picture of a security situation, improve communication among stakeholders, and streamline reporting to allow officials to effectively manage a situation on a more proactive basis. All of these needs are driving healthcare organisations to seek out solutions and programmes that can provide value beyond feature sets, and can help drive new levels of security and business intelligence. Wine contends that, by integrating data from various sources into a single command-and-control platform, true situational awareness can be achieved. This comprehensive approach helps enable faster and more effective response to support a high level of safety to employees, patients, visitors and the overall community. “Situational awareness solutions automatically combine critical data points from multiple systems and sensors, allowing operators to understand what is happening in real-time through one intuitive interface,” says Wine. “We like to think of this approach as a single pane of glass – helping enable officials to quickly and effectively identify risks, manage situations and thoroughly investigate. Bringing all data points into one platform helps allow for early detection of threats, which can also be used to initiate better planning, timely response and better decision-making.“ The healthcare vertical is moving toward a complete solution that integrates nearly any system using a facility’s network Integration: access control and beyond Access control is an important aspect of integration in healthcare settings. Hospitals must support affiliated doctors who need to carry multiple badges for all the locations they visit, for example. Over time, administrators may want to integrate access control with visitor management, or add video surveillance and other technologies. This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities. In contrast, the latest physical access control system (PACS) system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them. “Today’s solutions enable healthcare organisations to achieve a versatile PACS that protects everything from hospital doors and storage areas to the cloud and desktops,” says Sheila Loy, Director Healthcare Strategies, North America, HID Global. “With proper planning, healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they seamlessly add new capabilities in the future,” she says. The result is a fully interoperable, multi-layered and highly adaptable security solution that spans the organisation’s networks, systems and facilities, and has room to grow, evolve and improve over time. Healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they add new capabilities in the future The latest PACS architectures support new applications such as infant protection systems, and biometrics in sensitive areas such as laboratories and research centres. There are also opportunities to “do more with the card,” says Loy. Hospitals can offer physicians, nurses and staff one card for accessing the emergency room and pharmacy, and for visual ID verification, time-and-attendance logging, payroll transactions, and cafeteria purchases. This simplifies life for cardholders while centralising and streamlining management. To protect information, access control systems now also deliver the ability to “tap” in and out of computer applications, eliminating complex passwords and password fatigue where it can require 20 or more logins each day in order to access the hospital’s enterprise data and services. Instead, the user simply taps his or her ID card to a laptop, tablet, phone or other NFC-enabled devices to access network resources, cloud apps and web-based services. It’s easier and more secure than passwords, and faster and more seamless and convenient than dedicated hardware one-time passwords and display cards or other physical devices. Plus, there is the added benefit of using the same card that opens doors to also access data and cloud-based applications. Integration with other systems A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “At Tyco Security Products, we are offering this kind of holistic approach by integrating our C-CURE 9000 access control platform with video, intrusion, duress notification and infant abduction technologies together and adding license plate recognition, biometric identity management, NFC and BLE, visitor management and home automation interfaces and capabilities,” he says. “All of these systems coming through a single pane-of-glass view give operators more to see and react to. “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. “I think we’ll also see more edge controllers and further development of mobile technology capabilities,” he adds. We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities Complete security integration Infant abduction systems like Elpas and Hugs can now be connected to access control systems, says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. This is significant, and the integration among these systems will no doubt grow, as this makes infant abduction very difficult. A real world example is if an infant is taken without authorisation onto an elevator. If this occurs, an alarm can be sounded, and a hospital-wide alert can be dispatched over radios and over the facility’s public address (PA) system in seconds. “This growing level of automation is one of the things I expect will continue to develop in the future,” says Stankevich. “These systems integrated into the Lynx duress/notification system allow for a wide range of notification options.” "These end users need a way to grant permissions in a way that saves time and energy on manual input, and makes changing permissions easy and efficient" Also, facilities require increased integration with today’s video surveillance and video management systems from their access control solutions, and there’s an additional push toward integrating human resources and other event management and directory software tools as well, adds Stankevich. “These end users need a way to grant permissions in a way that not only saves time and energy on manual input, but also makes changing permissions easy and efficient,” he says. “This is especially paramount for large-scale enterprise organisations, such as a hospital campus, that can span multiple geographic locations.” Access control can be integrated with other systems, too. “The continuing evolution of network technologies and our interconnected world has transformed access control systems from standalone solutions into a vital part of a more robust, highly integrated system that allows users to utilise a single control platform to monitor the status of a facility,” says Robert Laughlin, President, Galaxy Control Systems. “We expect that advanced access control solutions will be integrated with patient information, identity management, video surveillance, medicine storage and distribution, parking and other systems, all of which provide information and intelligence in the form of data that contributes to the emerging model of predictive analytics. The actionable intelligence that will result from this analysis will help move security from a reactive to a more proactive function.” Wider adoption of electronic access control Tighter integration between physical access control systems with specific hospital-based systems such as mother and baby alarms, asset location technologies and robotic vehicle systems are likely advances that we will see adopted more often, agrees Dave Ella, Vice President of Product Marketing, AMAG Technology. “We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities through the adoption of a new generation of locks that are wire-free and Wi-Fi-based, but that form part of the overall access control system,” says Ella of AMAG. AMAG also sees that frictionless access – in which no physical contact needs to be made with a card or card reader – will assist in the control of healthcare-associated infections. Read Part 11 of our Security in Healthcare series here Save Save Save
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Internationally, there is a patchwork of health privacy laws around the world, from Argentina to Uruguay, including laws throughout Europe, Central Asia and Australia. Role of physical security in safeguarding data Physical security systems can play a big role in helping to keep patient information safe and private, as required by various laws. For example, AMAG has developed new capabilities within its Symmetry family of products that allow healthcare institutes to demonstrate their compliance with HIPAA. Compliance reporting is a key area and has been a focus for AMAG, says Dave Ella, Vice President of Product Marketing, AMAG Technology. Hospitals and healthcare facilities install AMAG’s Symmetry access control system and Symmetry CompleteView Video Management to manage and control access and provide HIPAA compliance throughout their buildings and campuses. Security plan policies and procedures need to protect a healthcare facility, says Ella. Automatically reviewing access permissions for employees, contractors and visitors on a regular basis is a key aspect of the plan, and AMAG’s Symmetry CONNECT product is designed for that purpose. Also, capabilities within the system make documentation of adds and changes to the security system more straightforward. They include the ability to add drawings, documents and notes to any device within the system. Demanding regulatory environment Legislation like HIPAA, which establishes U.S. standards for privacy and security, impacts hospital access control policies and procedures, says Sheila Loy, Director Healthcare Strategies, North America, HID Global. In fact, HIPAA is just one element in a demanding regulatory environment. The need to comply is complicated in hospitals by security threats in an environment with high traffic volumes and complex staffing requirements, Loy adds. For instance, in California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines. Today’s access controlplatforms enable hospitals toimprove risk management andcomply with new legislationor regulatory requirements Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare and Medicaid Services (CMS) that, at times, conflict with state rules and result in fines. Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes; and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery. Today’s access control platforms enable hospitals to improve risk management and comply with new legislation or regulatory requirements. For instance, HIPAA imposes strict requirements for accessing medical records, which may necessitate the use of a smart card to enter secure areas or to access IT networks that store patient information. HID Global offers comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. The company’s solutions: provide secure access to healthcare facilities and supplies; enable hospitals to identify and manage hospital visitors; provide electronic audit trails to protect patients and staff; ensure HIPAA compliance for patient records; and enable organisations to leverage existing access control cards for additional services to offer convenience and create operational efficiencies. Need for versatile authentication platform Health data is at least as valuable as financial data in the online banking industry, where a layered system approach is used to ensure that appropriate risk mitigation levels can be applied, says Loy. Even though patients don’t access healthcare information as frequently as do online banking customers, and aren’t protected by the same regulatory compliance requirements, they can benefit from the same multi-layered authentication mechanisms, both inside and outside the hospital. Healthcare organisations need a versatile authentication platform with real-time threat detection capabilities in order to effectively implement the critical five layers of security including user authentication, device authentication, transaction authentication with pattern-based intelligence, browser protection, and application security, says Loy. With video surveillance, cameras must be positioned in such a way that they don't violate HIPAA laws Access control systems can be used to help protect access to patient records and other controlled materials, adds Robert Laughlin, President, Galaxy Control Systems. By using higher-security credentials for access control readers, such as biometrics, medical facilities can increase their confidence levels that they are only providing access to authorised individuals and creating an audit trail for reporting or review. Galaxy access control systems can be integrated with a wide range of readers, including high security biometric readers. Ensuring privacy with video surveillance Video systems are also impacted by HIPAA in the United States and by similar privacy legislation around the world. When a physical security system is installed in a healthcare environment, patients’ privacy must be protected according to HIPAA’s specific rules, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. A patient’s PII – or personally identifiable information – must be protected. PII is any information that can be used to uniquely identify, contact or locate an individual, or that can be used with other sources to uniquely identify a person. With video surveillance, cameras must be positioned in such a way that they don’t violate HIPAA laws, says Ouellette. If a camera is pointed to a computer screen or something else that contains a patient’s PII, there must be an option to draw a privacy window within the frame so that a patient’s sensitive information isn’t easily accessed or compromised. HIPAA and similarrequirements can indirectlyimpact video systems inways not thought of beforethe advent of megapixel surveillance cameras Challenge of megapixel cameras Furthermore, the use of megapixel cameras can increase the challenge. HIPAA and similar requirements can indirectly impact video systems in ways not thought of before the advent of megapixel surveillance cameras, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. On one hand, video surveillance systems are more effective than ever at protecting medical records storage and access to other confidential information. On the other hand, it is now equally important to consider the field of view of a high-megapixel camera, says Whitney. A camera placed over a cashier may yield images with discernible credit card numbers of a screen within the field of view, of documents, or of the credit card itself. Medical records may similarly be picked up in detail by a high megapixel camera. Therefore, it is necessary to ensure that the integrator selected to install a video surveillance system understand the objective of each area of coverage, and what should not be included. Integrated security systems aid faster compliance Faced with a number of local, state and national regulatory guidelines, security directors within healthcare facilities must be able to improve hospital security and insulate the organisation from potential liability claims, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. “That means implementing a surveillance system that allows multiagency cooperation and response,” he says. “Keeping all of this in mind, having a video surveillance system that integrates with the necessary emergency and fire alarm systems, access control and other systems can promote an institution’s compliance with regulatory agencies by providing proof that the organisation’s assets are safe and secured.” Finally, there is the issue of access to video. In today’s regulation-focused market, healthcare organisations must strictly control who has access to video, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Servers and storage are typically easier to secure because these devices are traditionally deployed in controlled locations, sometimes on closed networks and often under the supervision of IT. Client access is more difficult to control – security personnel, management and even first responders need access to video, and their devices are typically unsecured. This can translate into a potential HIPAA violation, especially if data is access by unauthorised people. Read Part 10 of our Security in Healthcare series here Save Save Save
AMAG's Symmetry Advanced Reporting searches security data to identify anomalies for further investigation, compliance reporting and analysis AMAG Technology, the security solution manufacturer specialising in access control, intrusion detection, video management, policy-based identity solutions and visitor management, announces the release of two new software features that improve the functionality and reporting capabilities in Symmetry™ v8.1 access control software. “Symmetry Control Desk provides a targeted view of all the relevant security devices on one screen, and offers an unrivalled level of unified monitoring and incident response capability,” said Vice President of Product Marketing, AMAG Technology, Dave Ella. “We have also added Symmetry Advanced Reporting which gives users options to analyze and track almost any data, with a new reporting tool and data dictionary. It’s all about providing more information to make informed decisions about security response and business operations.” Symmetry Control Desk monitoring benefits Symmetry Control Desk allows users to group together any combination of security devices, such as card readers, cameras, inputs and outputs, into new Monitor Zones, providing increased visibility to secure areas. Users can monitor the status of the devices in real time and issue commands to control security devices anywhere across the organization. Camera views are fully integrated and will automatically display on screen. Activity and alarms within monitor zones will be displayed and actioned from the Control Desk. Using a new camera links mechanism, live, pre and post alarm recordings can all be automatically reviewed, and if required the Symmetry Alarm Workflow capability can be used to ensure response is in line with the security plan. Symmetry Advanced Reporting convenience Symmetry Advanced Reporting adds the ability to create virtually any report on security data including the production of charts and graphs. A new data dictionary combines relevant data from the full Symmetry database making it straightforward for reports to be developed using the new built-in reporting engine. Symmetry users increasingly need to mine their security data to identify anomalies for further investigation and for compliance reporting. Symmetry Advanced Reporting is designed to allow any required analysis to be carried out. For more advanced compliance reporting requirements, users can work with AMAG’s Professional Services team to generate customised reports. Both Symmetry Control Desk and Symmetry Reporting Services can be added to the current version of Symmetry v8.1, and are available for all versions of Symmetry. Save
Part 5 of our Security in Healthcare series It’s difficult for hospital security directors to provide a quantified ROI in an updated security system Several forces are working in favour of greater adoption of hospital security and video surveillance technologies in the healthcare market. “Healthcare facilities and campuses are growing at a rapid rate to accommodate an aging population and the research and development of pharmacology and many different types of medical devices or technology”, says Steve Birkmeier, VP of Sales and Business Development, Arteco. “This boon to the industry also increases the risk of theft, trespassing, vandalism and even active shooter threats to these campuses, putting vulnerable patients and staff in harm’s way,” he says. “Since these characteristics are always in flux, healthcare customers are in the market for flexible solutions that can adapt and scale to the shape and size of individual campuses.” But what factors are standing in the way of greater implementation of video surveillance and security technology? The largest one is lack of funding. “These campuses are constantly under strict budgetary or compliance constraints,” says Birkmeier. “So they are also looking to expand at a low marginal cost without having to sacrifice security measures or forgo regulation.” Looking for ROI in physical security "As long as the security team isable to invest in sound access control, visitor management andvideo systems, they are in agood place" Customers investing in security often look for a return on investment (ROI). However, Dave Ella, Vice President of Product Marketing, AMAG Technology, says it’s always tricky for hospital security directors to provide a quantified ROI in an updated security system, and that reality holds back investment. However, Health Insurance Portability and Accountability Act (HIPAA) regulations provide leverage for security managers as there is a benchmark they need to meet or exceed. This can help to justify investment in physical security, Ella says. “Hospital security teams understand the benefits of new technologies,” says Ella. “Financial restrictions hold back investment in some security measures that could be implemented. As long as the security team is able to invest in sound access control, visitor management and video systems, they are in a good place.” Factors obstructing new security installation Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, President, Galaxy Control Systems. “Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. “The difference is that facilities can now be upgraded by replacing only part of a system, rather than the entire system. And, similar developments have resulted in key system functionality being executed in software rather than hardware, which also provides upgrade pathways that do not require wholesale replacement of system elements”, says Laughlin. “Together, these factors have drastically improved the cost and functionality of systems for end users.” Training and education of security practitioners is required to bring awareness of the new surveillance technologies that are available Inertia - a hindrance to adopting healthcare security “Inertia is another challenge. “Do nothing” is the biggest factor in slowing the adoption of new technologies,” says Jeff Whitney, Arecont Vision’s Vice President of Marketing. ”Adoption of technologies in healthcare is frequently driven by opportunity such as a new building or facility, changes in legislation or regulation, or external factors such as incidents, crime, or lawsuit,” he says. Megapixel camera technology, which is Arecont Vision’s focus, has the ability to reduce costs of surveillance while dramatically increasing video quality and coverage, and thus is often selected as part of the solution. “Training and education of security practitioners continues to be required to bring awareness of the new surveillance technologies that are available, what benefits they bring, and how to design and implement such systems in place of legacy analogue surveillance deployments,” says Whitney. Proactive use of video management systems Some healthcare facilities are not harnessing the potential power of their newly improved video management systems, says Ella of AMAG. “The systems need to be made more proactive. Viewing areas and recoding video is not enough. Video is capable of being part of an integrated prevention tool to respond quickly to developing incidents. “ “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available” It’s important for the video system to be integrated directly to the access control and alarm management system, says Ella. Whenever an alarm or event occurs, the security officer must see exactly what has happened within seconds and respond accordingly. By linking – or tagging – video to access control events and alarms, and by building on that with automated triggers and workflows, AMAG customers are able to make their video systems much more responsive and proactive to security incidents. To meet the needs of healthcare facilities and other business sectors with similar issues, AMAG has integrated the Symmetry system to more than 15 different video management systems. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding.” Read Part 6 of our Security in Healthcare series here
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. For instance, one children’s hospital recently chose HID Global’s EasyLobby Secure Visitor Management solution to streamline screening/badging using driver’s licenses or other government-issued IDs. Integration with hospital databases enables benefits like accessing real-time patient feeds using Health Level-7 (HL7) standards. All visitor information Is seamlessly passed to the hospital’s access control system to optimise efficiency at nine stations badging more than 160,000 visitors annually. The example shows what technology can do in the area of visitor management. Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or “after hours” An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during “after hours” periods, according to HID Global. Systems should support real-time patient feeds using HL7 integration, which ensures that no visitor is sent to the wrong location or to see a patient who is no longer checked in. Systems should also pre-register approved vendors and temporary employees through Status Blue integration, and support integration with access control systems for the most efficient badging. Barriers to visitor management "Due to financial limitations, many hospitals are trying to make do with older desktop technology, and have not been able to benefit from some of the newer efficient options, such as mobile tablet-based visitor management, "says Paul Terschuren, CEO, STOPware Inc. "And, some hospitals have the mistaken belief that the multiple entrances and complexity of a modern hospital facility pose a barrier to implement visitor management, or that managing visitors more closely will create an unwelcoming culture or environment," says Terschuren. "As a result, some hospitals only implement visitor management after hours, when the number of entrances and visitors is reduced." "However, neither of these ideas should be barriers", says Terschuren –" visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software. And, many hospitals have found that visible security improvements, when they are not overly burdensome, actually improve the feeling of safety and security with patients, visitors and families alike. Some hospitals with limited implementations are already realising this and changing their plans to implement systems hospital-wide." Visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software STOPware PassagePoint visitor registration STOPware specialises in visitor management, a critical element in physical security for hospitals and healthcare facilities. STOPware’s flagship software product, PassagePoint, provides visitor registration and pre-registration, visit approvals, identity confirmation, visit logging, and integration with access systems. STOPware also provides related hardware including self-registration kiosk, mobile registration tablets, credential scanners, and badge printers. As announced in March, PassagePoint software now integrates with HL7 to allow real-time patient location tracking for hospitals and healthcare facilities, as well as integration with more than 20 access control systems to help make the healthcare environment more secure. STOPware takes Health Insurance Portability and Accountability Act (HIPAA) and all privacy regulations very seriously. The PassagePoint HL7 module only uses patient location data, and functions as a “listener;” that is, the data used by the module is not “stored” in PassagePoint. The HL7 integration only makes use of patient location data and does not collect or use any diagnosis information. PassagePoint is also designed to protect visitors’ Personal Identifiable Information – either by not capturing certain data or by encrypting information that is stored. By treating sensitive information of both patients and visitors in this way, STOPware Visitor Management system is designed to help healthcare facilities protect privacy in alignment with the letter and the spirit of their required regulations. Pre-booking and advance approval Tighter control of visitor and contractor management in non-public areas through pre-booking and advance approval are developing areas, says Dave Ella, Vice President of Product Marketing, AMAG Technology. AMAG has developed a new visitor management solution called Symmetry GUEST that allows visitors to be vetted to provide a safer and more secure environment for patients and staff, as well as the use of smartphones as identification and access credentials. "Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation" Staff training and turnaround processes are an often-overlooked element of a security plan in general, and a Visitor Management plan in particular, says Terschuren of STOPware. “It is well and good to put guards and checkpoints in place, but what should those guards do when they find someone that should be denied entry? Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation while minimising the chances of negative impact on the facility. “ STOPware expects that remote reception desk management, which makes use of an operator from another location and/or country who can greet and process visitors efficiently, will continue to grow and improve. Integration of Visitor Management systems with access control and other security-related systems provides for safety and an audit trail in such implementations. “We are also seeing a groundswell of interest in Mobile Visitor Registration and Kiosk Self-Registration and Sign-ins,” says Terschuren. “These systems increase efficiency, empower visitors, and provide for a better visit experience that many facilities find compelling.” Combining identity verification and visitor management “We are also seeing the growing importance of identity verification; and, in particular, the use of biometric methods to verify identity, ranging from fingerprints and facial recognition all the way to higher security iris readers,” Terschuren adds. “Identity verification can tie in with Visitor Management, both in terms of identifying visitors, but also in terms of verifying the authority of hosts and approvers, to improve the security of sensitive areas and facilities in general.” One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Read Part 5 of our Security in Healthcare series here
Part 2 of our Security in Healthcare series The future is digital, and analogue systems are a thing of the past – or are they? The fact is, in the healthcare vertical at least, we may still have a way to go before the full potential of IP-based systems is realised. Obstacles include a lack of funding and the challenge of sharing IP bandwidth with other healthcare technologies. Bandwidth competition While many hospitals have invested significantly in IP systems, one challenge is bandwidth: Security and video systems often have to compete for bandwidth with other now-IT-driven systems in healthcare facilities, such medical records systems, x-ray systems and magnetic resonance imaging (MRI) systems. Security departments may not be the highest priority when allotting bandwidth, given they are competing with medical devices and systems that generate revenue. As a video company that serves the healthcare vertical, Pelco by Schneider Electric sees progress on the transition from analogue to IP video surveillance devices, but there are still a large number of healthcare facilities that do not have the necessary funds to convert completely to an IP-heavy infrastructure. A big advantage of these facilities making the transition to IP is that users can access real-time video at any time from any computer, anywhere, says Kyle Cusson, Business Development Manager, Healthcare, Pelco. “This is immensely important for information security requirements and disaster recovery,” he says. With analogue, the information gathered is physically tethered to the camera and DVR. However, there are hybrid solutions – such as encoders that convert analogue to IP – that exist and allow facilities to capitalise on existing investments for the time being. IP to gain ground soon “Over the next five years, we will definitely see a massive shift to IP solutions because they are becoming more cost-effective to deploy and are delivering superior video quality and flexibility to users,” says Cusson. The transition isn’t always all-or-nothing. It is not uncommon for healthcare providers to depend upon outdated, analogue-based video systems with limited capabilities while providing surveillance of a large facility, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “The transition happens after a major incident or awareness of new risks and challenges that the existing systems cannot address,” he adds. “That’s when surveillance technology is often moved from inadequate analogue systems to IP megapixel surveillance cameras.” A big advantage of healthcare facilities making the transition to IP is easy access ofreal-time video any time from any computer Arecont Vision SurroundVideo Arecont Vision, a provider of video to the healthcare market, delivers megapixel surveillance cameras that reduce the cost of surveillance while increasing video coverage, improving aesthetics, and delivering high-definition (HD) video. Customers are able to continue to get value from their existing analogue systems in some cases, while supplementing them with modern digital network-based video surveillance systems until existing systems reach their end of life, Whitney says. The network-based system can then replace the legacy analogue system fully. Whitney notes that Arecont Vision’s SurroundVideo multi-sensor megapixel cameras replace multiple PTZs and fixed cameras while providing improved video coverage at a lower cost, and the system is less intrusive than the analogue systems they replace. “In new projects, most customers already have chosen to deploy IP network surveillance camera technology and gain all of the benefits and improved security immediately,” says Whitney. Cost-to-benefit analysis “We have seen the transition from analogue to IP become most complete in regards to display, with digital monitors almost completely replacing analogue monitors,” says Jumbi Edulbehram, Regional President, Americas, Oncam, which provides a broad range of 360-degree fisheye cameras and integration software to the healthcare vertical. “That’s where it really ends.” He says many hospitals and healthcare facilities have found the idea of an IP transition both cost-prohibitive and difficult to deploy. There has been some investment in relatively inexpensive decoders, which convert analogue to IP. “Cost is definitely a factor in the resistance we’re seeing in these facilities, but as the technology is developed further, that will help drive the cost down,” says Edulbehram. New adoptions take time, and there will be a long period when different technologies co-exist, says Robert Laughlin, President, Galaxy Control Systems, which provides access control systems ranging from single-door systems up to multi-site enterprise-level integrated systems. For this reason, it will continue to be essential that new software and systems are backwards-compatible with the existing equipment in place within organisations. Users need to be able to upgrade in a way that fits with both their security needs and their budgetary limitations. Access control systems such as Galaxy’s will continue to be integrated with a range of systems, and there is no one-size-fits-all solution to every access need, Laughlin says. New adoptions take time, and there will be a long period when differenttechnologies co-exist in the healthcare market Networked physical access control system Many healthcare institutions also want a path to IP-based physical access control system (PACS) solutions that are easier to operate, and that simplify expansion, customisation and integration with other solutions that can share the same network, says Sheila Loy, Director Healthcare Strategies, North America, HID Global, provider of comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. Networked access control simplifies infrastructure enhancements and modifications because hardware platforms aren’t tied to proprietary software, she notes. It’s also easier to add wireless locksets that connect with the online access control system, thus reducing wiring costs and eliminating the problems of easy-to-lose keys while providing near-online and near-real-time control of the opening. IP-based solutions also provide a single, integrated system for combining security, access control, video surveillance and incident response, perimeter detection and alarm monitoring systems. Hospitals can invest in a single, unified IP network, and logically control multiple technologies that previously co-existed only on a physical level. Plus, they can leverage their existing credential investment to seamlessly add logical access control for network log-on, and achieve a full interoperable, multi-layered security solution across company networks, systems and facilities. Analogue or IP debate – a thing of the past? "We will not only continue to seemore security devices on thenetwork, but we will also start tosee more cutting-edge medicaltechnology and equipment thatis network-capable" Other manufacturers see analogue in the healthcare vertical as largely a thing of the past. Camera technology has advanced so far and so fast that the analogue or IP debate is really a thing of the past, says Dave Ella, AMAG Technology’s Vice President of Product Marketing. “The question now is how quickly budgets will allow for the transition to newer technology,” Ella says. Hospitals benefit from higher resolutions (available with IP cameras), which can identify individuals and license plate numbers. Almost all AMAG healthcare customers are integrating their video to their access control system, which vastly speeds up response to security incidents as they unfold. Brandon Reich, Senior Director of Surveillance Solutions, Pivot3, agrees. Today, virtually all new installations are IP, he says. There are a number of organisations that still deploy analogue into large installed bases, though most have converted to IP by this point. In some cases, the rise of HD analogue video has extended the usable life of installed analogue systems, but by 2020, Reich expects the market to be vast majority IP. Pivot3 hyper-converged infrastructure (HCI) solutions for video surveillance provide a high level of protection against liabilities related to lost video. The future belongs to network-capable medical technology “In the security industry, we have seen the transition from analogue to IP systems take place over the course of several years, and it is debatable whether or not that transition is complete,” says Steve Birkmeier, VP of Sales and Business Development, Arteco. “Similarly, within the next few years, we will not only continue to see more security devices on the network, but we will also start to see more cutting-edge medical technology and equipment that is network-capable.” Securing the security devices Birkmeier says this is a burgeoning topic of discussion within the larger conversation about where the internet of Things (IoT) is leading us. However, it also leads to some interesting questions, such as: How will we secure these “wired” devices through the network? Will new compliance standards or regulations have to be put in place? What kind of failover strategy or reliability factors can these life-saving devices guarantee for vulnerable patients if the network goes down? “Taking all these questions into consideration, it is imperative that we continue to invest in IT-centric access control solutions and open up integration opportunities with these technologies to ensure the security of patients, corporate and patient data, hospital staff and equipment,” says Birkmeier. Read Part 3 of our Security in Healthcare series here
The integrated access control solution enhances security in the most unobtrusive way AMAG Technology, an integrated security provider of access control, video management and identity management solutions, is pleased to welcome Stone Lock Global as a certified member of AMAG’s Symmetry Preferred Partner Programme. As a certified partner, Stone Lock Global’s Facial Recognition device integrates with AMAG’s latest Symmetry V8 Access Control System. AMAG Technology and Stone Lock Global cooperatively tested and certified this integration. Complete access control integration “Adding Stone Lock Global to the Symmetry Preferred Partner Programme delivers end users with full access control integration for forward thinking companies who desire a facial recognition programme for their security management system,” said AMAG Technology, Vice President of Product Marketing, Dave Ella. “We are pleased to offer this technology integration to our current and future customers, and look forward to a long partnership with Stone Lock.” “Superior security, unrivalled convenience, and respect for identity privacy are cornerstones of Stone Lock Pro’s success,” said Jeff Sebek, Vice President, Business Development for Stone Lock Global. “We are excited to partner with AMAG to provide customers with a powerful integrated solution that enhances security in the most unobtrusive way. In fact, the access control process happens so quickly and accurately, the users barely notice any difference in their routine.” Rapid identity confirmation Stone Lock® Pro is a secure, frictionless facial recognition device for access control that provides rapid confirmation of identity – even in total darkness and with superior reliability. Users simply approach the Stone Lock Pro device which will detect and measure over 2,000 points of reflectivity on the user’s face – all in less than a second. Stone Lock’s industry-leading accuracy (less than 0.0004% False Acceptance Rate) makes it ideal for customers who recognize the inherent weaknesses of standalone access badges or PINs that can get lost, stolen, or shared. Stone Lock® Pro is a secure, frictionless facial recognition device for access control that provides rapid confirmation of identity The robust integration with AMAG allows users to create a Stone Lock Pro user and pair it with personnel and credential record from Symmetry, applying schedules and permissions to any Stone Lock device on the network. The integrated solution supports single, dual or three factor authentication methods in a single device and is critical when security is non-negotiable. Stone Lock Global, Inc. is a leading developer of facial recognition solutions for highly secure access control applications. The company operates globally, partnering with industry leaders to provide best-in-class integrations, deployment and installation, and consulting worldwide to meet the stringent requirements of some of the most security-intensive applications.
SureView Systems, a leading provider of commercial central station and enterprise command center software for the security industry, announced recently a new integration for its Immix® platform with Symmetry™ access control software from AMAG Technology. The integration expands the capabilities of both platforms, allowing customers to benefit from the close integration of Immix Central Station (CS) and Command Center (CC) with AMAG’s Symmetry access control to gain a high level of situational awareness and correlated data points to enhance security, ensure compliance and streamline investigations. The integration supports relays and door control, alarms, GetConfig and site syncing specifically. “Both SureView and AMAG offer opportunities to expand platform functionality and provide more value to security integrators and enterprise-class end users,” said Dave Ella, Vice President – Product Marketing, AMAG Technology. “SureView’s participation in AMAG’s Symmetry Extended Business Solutions program ensures partners and end users can build a sophisticated solution that is cost-effective and able to expand easily as user needs grow.” Built on a cloud-based, open architecture, Immix delivers a platform to process and manage security events generated from any system or device, and is quickly becoming one of the most popular central management software platforms on the market. Its Web-based interface and minimal bandwidth requirements allow users to benefit from ease of deployment and management while experiencing immediate and long-term return-on-investment. Furthermore, Immix supports the largest integration library in the industry, and is built upon proven, secure, scalable technology. “SureView’s integration with AMAG provides greater value to SureView customers and end users,” said Rob Hile, Director of Strategic Accounts, SureView Systems. “The integration of AMAG’s Symmetry system provides more flexibility to incorporate access control and intrusion detection into the Immix platform, which allows a comprehensive view of security and business operations from a single, Web-based interface.”
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload