Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce server infrastructure and maintenance costs with greater business continuity options. Physical security operations Beyond IT modernisation and cost management, organisations are approaching cloud adoption strategies through the lens of broader enterprise business efficiency and growth objectives. Companies are aggressively moving to the cloud to maximise their IT spend" As organisations identify and migrate critical application workloads to the cloud, physical security operations are able to increase C•CURE 9000 application availability by leveraging redundancy and disaster recovery infrastructure that geographically extends well beyond their on-premise constraints. “Companies are aggressively moving to the cloud to maximise their IT spend while improving their agility to respond to business needs and market changes,” said Jason Ouellette, general manager of Enterprise Access & Video Solutions, Building Technologies & Solutions, Johnson Controls. Artificial intelligence “When moving infrastructure to the cloud, learning how to provision the right type and size of resources required for customer specific environments is critical to optimise performance and cost. Customers who take this approach in their C•CURE 9000 cloud migration planning can easily avoid overspending while maintaining flexibility to quickly scale resources based on actual need.” To assist customers seeking C•CURE 9000 cloud deployment support, the Software House Professional Services organisation provides a broad range of consulting and implementation services, including technical guidance on best practices and system architecture considerations regarding customer specific cloud strategies. Cloud solutions are an integral part of the strategic focus of the Tyco Access Control and Video Solutions unit of Johnson Controls, along with artificial intelligence, unification and cybersecurity, comprising of four key technology pillars.
The PSIA will show continued momentum for its Physical Logical Access interoperability (PLAI) spec at ISC West 2019. “In past demos we were able to show some exchange of records between PACS systems, but this year we will have five vendors, and demonstrate existing employee identity data sets, which can be passed to other systems in the security environment beyond having just a clean start,” said David Bunzel, Executive Director of the PSIA. Physical security systems Biometrics, an important component of enterprise physical security systems, will also be featured in the demo. Princeton Identity has previously demonstrated its PLAI adapter and at ISC West 2019 we will be showing new adapters from EyeLock and IDEMIA. Two of the major physical access control (PACS) vendors, Johnson Controls and LenelS2, will show their new commercial PLAI adapters at the demo “Having the ability to transfer employee credential data so that associated biometric identifiers can be constructed and utilised with existing access control systems will be a valuable feature for our customers,” said Consuelo Bangs, Senior Program Manager, IDEMIA Identity & Security USA LLC. “This will save time and money by eliminating redundant record creation.” Two of the major physical access control (PACS) vendors, Johnson Controls and LenelS2, will show their new commercial PLAI adapters at the demo. Critical components “Our enterprise customers have complex environments with high costs for integrations and identity synchronisation today, and as a result these customers have been looking for solutions. PLAI provides an effective means to support these industry needs,” said Jason Ouellette, Product General Manager- Access Control, for Johnson Controls. One of the critical components is the introduction of an independent commercial PLAI Agent by Cruatech of Dublin, Ireland. This Agent acts as a central hub, to allow interchange between disparate PACS and biometric vendors. “The introduction of the Cruatech Agent offers the means to effectively provide solutions to enterprise customers, solving an important problem in the industry–finding a method to have a single trusted source in an enterprise environment,” said Bruno Desrochers of Tech Systems Inc.
Johnson Controls introduces the Iris ID IrisAccess iCAM 7S Series multifactor biometric readers offering superior performance and easy integration with Software House’s C•CURE 9000 security and event management platform. The IrisAccess iCAM 7S Series readers are part of the new 5th generation IrisAccess platform, whose global, multi-market deployments number in the millions. When used with C•CURE 9000, the readers become part of a powerful security management system that can monitor events, manage personnel, create reports and operate as a unified security management system when integrated with video, intrusion, fire, real-time location and other security devices and platforms. C•CURE 9000 uses a 64-bit operating system and multiple CPU cores to make it one of the fastest and most secure security solutions in the market Amalgamation of powerful technologies C•CURE 9000 uses a 64-bit operating system and multiple CPU cores to make it one of the fastest and most secure security solutions in the market. The platform can also be deployed across multiple sites and managed from a single user interface. “Iris ID has been a leader in iris recognition technology for the last 15 years, and its reputation is built on high quality focus, high performance results, and device security,” said Jason Ouellette, Global Product General Manager, Access Control, Building Technologies & Solutions, Johnson Controls. “The integration of the Iris ID IrisAccess iCAM 7S Series readers with the C•CURE 9000 security and event management platform brings together two powerful and highly flexible technologies that can be used with multiple brands and platforms in new deployments or with an already existing infrastructure.” Built-in high- and low-frequency card readers and an optional touch screen LCD keypad provide single, double and triple authentication options Multiple biometric authentication options The IrisAccess iCAM 7S Series with C•CURE 9000 feature fast, fully automatic dual iris capture and a non-contact, hygienic reader offering high accuracy, excellent throughput and flexibility in integration. An intuitive user interface employs audio and visual cues to facilitate fast user enrolment from the edge. Built-in high- and low-frequency card readers and an optional touch screen LCD keypad provide single, double and triple authentication options. Security features built into the iCAM hardware and Entry Access Control (EAC) software help prevent tampering. High resolution, high standards-based image quality makes the readers ideal for use in high security deployments. Large database capacity In addition, each reader has the database capability of 100,000 credentials with biometric data and a transaction log capacity of up to one million transactions per reader, making the iCAM 7S Series readers suitable for high traffic areas. IrisAccess iCAM 7S Series readers are compatible with the IrisAccess 4000 and 7000 Iris Recognition platforms, in addition to the C•CURE 9000 security and event management platform integration.
A critical issue for security officers today is how to make sure temporary or permanent employees are removed from the employee directory system when they are no longer working for the company. This situation arises especially in large enterprises, which may have different Physical Access Control Systems (PACS) supporting different offices or company operations. It is not uncommon for a company to make an acquisition and have two or more incompatible PACS systems. The simple way to address this is to issue a separate card to the employee to support a different PACS system. While this might be slightly inconvenient for the worker, it is often a simple solution that many companies use. Updating employee information, must be done on each system separately and often manually There are several problems with this solution. There is no central control of identities and they can exist in multiple locations of a company. Updating employee information, for example increasing access to reflect an employee’s new responsibilities, must be done on each system separately and often manually. Unless the company has a strong procedure to support this, the records outside of the main system, may not be updated and errors can occur. This may not be a significant problem if an employee is working for the company, but, if the employee is terminated, he or she may continue to have access to company facilities and systems, potentially compromising security. Physical Logical Access Interoperability - PLAI The Physical Security Interoperability Alliance has addressed this with its Physical Logical Access Interoperability (PLAI) specification. PLAI allows disparate PACS systems to normalise employee identity information and relies on a single trusted source to make changes to employee access and then synchronises it across disparate PACS systems. The same holds true for a terminated employee. A central trusted source eliminates access, and this is instantaneously reflected in all PACS systems. PLAI offers a simple and cost-effective way to enhance a company’s access control system, providing a more robust security environment. Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI” PLAI demo at ISC West 2018 A commercial version of the PLAI Agent will be demonstrated by the PSIA at ISC West 2018 on April 12 in Las Vegas. Johnson Controls (Software House), Kastle Systems, and Princeton Identity will show the interoperability and exchange of identity information between disparate systems. “Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI,” said David Bunzel, Executive Director of the PSIA. “It will enable Physical Access Control System (PACS) vendors to have an effective solution for bridging otherwise incompatible systems, saving considerable time in integration, and costs to enterprise customers.” The PLAI Agent was developed jointly by Johnson Controls and Dublin, Ireland-based Cruatech, a new member of the PSIA. It will be available to vendors from either company prior to ISC West. “As an integrator, we are often challenged with client acquisitions and the need to quickly establish a unified security ecosystem.” said Mike Mathes, Executive Vice President of Convergint Technologies and Chairman of the PSIA. “PLAI offers a means to quickly support disparate systems in a robust and reliable manner.” The PSIA has seen growing momentum for commercial implementations of PLAI Identity management As identity becomes a more critical feature of security systems, finding ways to manage credentials, permissions, limit duplication of records, and eliminating “orphans” left over when an employee leaves a company is essential. PLAI is an elegant means to address many of these issues. “PLAI provides an effective option to reduce problems related to integration compatibility, upgrades, and synchronisation which plague the industry today. This is good for both the customer as well as the manufacturers,” notes Jason Ouellette, General Manager of Access Control for Johnson Controls. “Further, PLAI reduces the impact of conflict inherent to the replication of personnel and credential data, while giving an authoritative control of records which can span PACS systems and other integrations to reduce risks in activities such as off boarding.” The PSIA has seen growing momentum for commercial implementations of PLAI. Already the U.S. Department of Justice, The Washington Post, and Corporate Executive Board (CEB) have utilised PLAI. In addition, Microsoft is planning to incorporate PLAI into their security ecosystem. There is a growing list of other organisations which are planning PLAI implementations in the government, financial services, electronics, industrial, and bottling industries.
A commercial version of the PLAI Agent will be demonstrated by the PSIA at ISC West 2018 in Las Vegas. Johnson Controls (Software House), Kastle Systems, and Princeton Identity will show the interoperability and exchange of identity information between disparate systems. “Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI,” said David Bunzel, Executive Director of the PSIA. “It will enable Physical Access Control System (PACS) vendors to have an effective solution for bridging otherwise incompatible systems, saving considerable time in integration, and costs to enterprise customers.” The PLAI Agent was developed jointly by Johnson Controls and Dublin, Ireland-based Cruatech, a new member of the PSIA. It will be available to vendors from either company prior to ISC West. “As an integrator, we are often challenged with client acquisitions and the need to quickly establish a unified security ecosystem.” said Mike Mathes, Executive Vice President of Convergint Technologies and Chairman of the PSIA. “PLAI offers a means to quickly support disparate systems in a robust and reliable manner.” Effective identity management As identity becomes a more critical feature of security systems, finding ways to manage credentials, permissions, limit duplication of records, and eliminating ‘orphans’ left over when an employee leaves a company is essential. PLAI is an elegant means to address many of these issues. “PLAI provides an effective option to reduce problems related to integration compatibility, upgrades, and synchronisation which plague the industry today. This is good for both the customer as well as the manufacturers,” notes Jason Ouellette, General Manager of Access Control for Johnson Controls. “Further, PLAI reduces the impact of conflict inherent to the replication of personnel and credential data, while giving an authoritative control of records which can span PACS systems and other integrations to reduce risks in activities such as off boarding.” The PSIA has seen growing momentum for commercial implementations of PLAI. Already the U.S. Department of Justice, The Washington Post, and Corporate Executive Board (CEB) have utilised PLAI. In addition, Microsoft is planning to incorporate PLAI into their security ecosystem. There is a growing list of other organisations which are planning PLAI implementations in the government, financial services, electronics, industrial, and bottling industries.
Johnson Controls has announced that Florida Atlantic University, based in Boca Raton, Fla., has selected the Software House C•CURE 9000 security and event management platform to secure a new building that is part of the Charles E. Schmidt College of Medicine, a facility which houses research, administration, and a medical clinic. Florida Atlantic University is one of 12 schools that is part of the state’s university system. The Boca Raton campus boasts 3,200 faculty and staff, providing educational services and support to 4,000 students. The College of Medicine, though small with 373 students, required a robust access control system that enabled the integration of video surveillance and the ability to partition access to specific areas of the facility. Florida Atlantic University is one of 12 schools that is part of the state’s university system Student access management With C•CURE 9000, Florida Atlantic University can easily manage student access to classrooms and laboratories, which can range from 24-hour access to the building to limited facility access during examination time. In addition, the university needed to restrict access to medical record rooms, the pharmacy and other sensitive areas. The access control system is also part of the Florida Atlantic University’s Schmidt Biomedical building, with C•CURE 9000 providing coverage for all exterior entrances, research labs and elevators leading to animal research floors and the anatomy labs. With C•CURE 9000, Florida Atlantic University can easily manage student access to classrooms and laboratories Building security According to Patrick Garmon, Director of Security Technology for Florida Atlantic University, it was important to implement a system that enabled the university to manage student access to buildings by floor and room, not just to restrict overall building access. “Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management,” said Jason Ouellette, global product general manager, Access Control, Building Technologies & Solutions, Johnson Controls. “Whether managing access to laboratories, the pharmacy or medical records, C•CURE 9000 provides flexibility to easily manage and adjust the system based on current needs.” Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management C•CURE Go mobile application In the future, Florida Atlantic University plans to use the C•CURE Go mobile application, which will enable security personnel and its on-staff technician to change access status or remotely monitor the system using an iOS or Android mobile device.
The Physical Security Interoperability Alliance (PSIA) has announced it has elected Mike Mathes, Executive Vice President of Convergint Technologies, as its Chairman, and Jason Ouellette, Product General Manager–Access Control for Johnson Controls, as its Vice Chairman. The PSIA membership develops specifications for enabling standards-based sharing of digital data and intelligence throughout the physical security and enterprise ecosystems. “Mike and Jason bring us strong technology, commercial and industry leadership skills,” said David Bunzel, executive director, the PSIA. “They will be powerful evangelists for how standards-based physical security systems can help the industry create new opportunities for systems integration and data sharing while solving cost and complexity challenges.” Promoting PSIA open standards As PSIA Chairman, Mathes will work closely with the PSIA board to identify industry needs for new and enhanced PSIA specifications. “Mike has been a strong advocate for open standards and his relations with leaders in the industry will be very valuable as PLAI, the PSIA’s identity management initiative, gains momentum.” He will be responsible for expanding the member base and help companies determine migration strategies needed to specify and/or adopt and implement PSIA specifications. “With an expanded membership base, we’ll see further adoption of open standards, which will drive down the cost of system integration for the end user,” said Mathes. Reducing integration time and cost Ouellette’s role as PSIA Vice Chairman will include defining the technical aspects of PLAI necessary to make this an effective commercial standard. This will include enhancing and promoting a robust set of test tools to assure industry compliance and interoperability for PLAI. “The PSIA specifications make it easier for integrators to offer high-quality solutions with less integration time and lower total cost of ownership,” said Ouellette. “PSIA open standards can solve real enterprise problems for customers in a way that is not possible through standard integrations. I am looking forward to working with Mike, David and the rest of board to help the industry understand our use cases and encourage rapid adoption of PSIA specifications, in particular through the development of PLIA adaptors by manufacturers.” At Convergint, Mathes leads the Advanced Solutions Group. He obtained his B.S. in Electrical Engineering at University of Manitoba. At Johnson Controls, Ouellette is responsible for the global access control businesses, specific to program management, product management, and engineering functions. Peter Boriskin, Vice President Product Management at ASSA ABLOY Americas, will continue as the PSIA’s treasurer.
Johnson Controls introduces comprehensive and automated visitor management as a core component of the C•CURE 9000 security and event management platform with a new self-service Kiosk Application and optional stand offerings that connect through the C•CURE Portal. The new release provides auto-generation and assignment of temporary credentials for visitors, and customisable access control workflows for more efficient management of access credential requests. Visitor management for iOS The latest version of the multi-integrative, highly flexible flagship C•CURE 9000 platform allows visitors to self-register using the new visitor management Kiosk Application for iOS iPad devices. Visitors can look up their appointments by entering their name or email address and host name into specific fields through the Kiosk Application. Once the visit is confirmed by C•CURE 9000 and a credential is created, a temporary identification label or card can be printed from the C•CURE 9000 client. An email notification of the visitor’s arrival is promptly sent to the host. “The visitor management capabilities provided by the C•CURE 900 Visitor Management kiosk and access management workflows, all from the C•CURE Portal, streamline and simplify everyday operations,” said Jason Ouellette, product general manager, Global, Access Control, Building Technologies & Solutions, Johnson Controls. “Visits are effectively managed by the kiosk even when front desk security personnel are unavailable. Security personnel can use the Web-based, customisable access management workflows to automate and distribute the management of access requests and the initiation of changes to clearances.” Documenting all access approvals and requests Using access management workflows, personnel records can be assigned as requestor and/or approver roles and process clearance requests using customised rules and workflows. Clearance requests can be approved or denied by assigned approvers without the need for adding operator accounts to C•CURE 9000, moving administrative tasks from security officers to individuals within the building for operational efficiency. Specific doors also can be configured to automatically initiate an Access Clearance Request Workflow based on how many times a card is rejected at the door. The C•CURE Portal creates an audit trail that documents all access approvals and requests, which is key for compliance controls.
Tyco's Cheetah paves the way for full FIPS-201 deployments, allowing customers to set authentication factors to match the threat Tyco Security Products, part of Johnson Controls, announced that its Innometriks Cheetah high assurance physical access reader has achieved UL 294 certification and the complete Innometriks Infinitas FICAM solution is now listed on the General Services Administration (GSA) Approved Product List (APL). These are two important designations for government agencies that need to deploy a secure and interoperable access control solution for high security areas. Standards for Safety UL is the gold standard worldwide for product safety certification and compliance solutions. UL has developed several thousand Standards for Safety, which are vital to ensuring public safety and improving quality of products and services. The UL 294 standard applies to the construction, performance, and operation of access control systems and equipment. In addition, as part of the GSA APL, Innometriks’ Infinitas Federal Identity, Credential, and Access Management (FICAM) solution has met requirements to comply with FIPS-201 (Federal Information Processing Standard Publication 201) and has been certified as an end-to-end solution for Federal customers and suppliers. Innometrik Cheetah access reader Innometriks’ Cheetah high assurance physical access reader, which is now UL 294 certified, is revolutionary in the industry. Its advanced architecture allows seamless integration into existing PACS and network environments, while its unique design encourages phased PIV implementations. Cheetah paves the way for full FIPS-201 deployments, allowing customers to set authentication factors to match the threat. When elevated to a different security threat level, the reader changes to the corresponding authentication mode. "We see this as part of our continuing effort to provide forward thinking high assurance solutions to our Federal clients" Infinitas is a credential validation, registration and authentication suite that offers a turnkey approach to PIV, CAC, and TWIC card validation and registration of the three different personal identity cards that are being issued by the Federal Government and are HSPD-12 compliant. It is the first FICAM solution to embed the authentication module directly on the iSTAR Ultra rather than a separate, slower “bolt on” system. It offers a wide range of card and biometric authentication modes on a secure platform that can be used at remote enrollment stations or fixed locations. High security requirements "The Federal Government turns to us as a resource for proven products and solutions for many of their high security requirements," says John Cassise, Senior Product Manager, Tyco Security Products. “Achieving UL 294 certification and GSA APL listing for our Cheetah high assurance reader is an important milestone in providing them with a product that has the highest security and safety standards that are FICAM-compliant.” “We see this as part of our continuing effort to provide forward thinking high assurance solutions to our Federal clients,” said Jason Ouellette, Product Line Director, Access Control, for Tyco Security Products. “By achieving industry certifications and implementing open standards approach to FICAM, we help the Federal Government be both more safe and secure while providing flexibility to their needs.”
Both companies have been active in the development of PLAI and have seen market demand for its features Physical Access Control System (PACS) vendors Lenel (UTC) and Software House (Tyco Security Products) have made a strong endorsement for the PSIA's Physical Logical Access Interoperability (PLAI) specification, by including it as a native implementation in their OnGuard and C•CURE products, respectively. OnGuard PLAI adapter Each of these companies has been active in the development of PLAI and has seen demand from the market for this specification and its features. Lenel will be demonstrating the features of the prototype OnGuard PLAI adapter, which allows OnGuard to exchange cardholder information with PLAI-compatible systems via the PLAI Agent. Microsoft, a company with significant security requirements has been working closely with Lenel to integrate PLAI into their security ecosystem. "Being able to make an acquisition of a company with a different PACS system and having the ability to quickly integrate and synchronise with our existing system is critical to our security operations," said Mike Faddis, Director of Global Security for Microsoft. Software House access control Software House has demonstrated access control capabilities of the PSIA's specifications in previous demos, but made the decision earlier this year to do a native integration of PLAI. "In the large enterprise space, it is common for our customers to potentially have multiple PACS systems and visitor management solutions. We recognize that PLAI provides a standards-based way to accomplish the coordination of personnel and credentials in a quick and cost-effective manner to meet enterprise needs," said Jason Ouellette, Senior Product Line Director, Tyco Security Products. The PSIA will be demonstrating PLAI and its capabilities related to synchronisation of PACS systems, biometrics and mobile credentials at ISC West, on Thursday April 6th 2017 from 10:00 AM to 11:00 AM PDT. In addition to Tyco Security Products (Software House) and UTC (Lenel), Kastle Systems, EyeLock, Princeton Identity and Allegion will all be part of the demonstration.
C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation Tyco Security Products, part of Johnson Controls, introduces the newest version of its C•CURE 9000 security and event management platform that offers new functionalities for enhanced compliance controls and increased operational efficiency Advanced access control policy enforcement C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation, after-hours reader groups, expiring clearances and other notable features, as well as increased operational efficiency. This latest version of the C•CURE 9000 security and event management platform also supports IPV6 address protocols for the iSTAR Ultra door controller and introduces a new C•CURE 9000 Web Client user interface. The usability enhancements to the C•CURE 9000 v2.60 platform give end users the power to configure the platform to create a new event after a number of consecutive rejections. With this feature, end users can define the threshold for event creation by configuring the number of consecutive retries allowed within a given time period. Funneling access through central entry The platform’s after-hours reader groups allow security officers to funnel access through a central entry point, for example when disabling all but a single, central entry point in an office building after 5 p.m. Once the cardholder has passed through the central entry point and has been visually identified by the security officer, the cardholder can access specific areas within the building according to his/her access privileges, ensuring that only those with special clearances gain access to specific areas after normal hours. The platform’s after-hours reader groups allow security officers to funnel access through a central entry point “The newest version of the C•CURE 9000 includes features that are invaluable to airports, government buildings and other large-scale facilities because they automate processes, and provide process and procedure accountability for meeting compliance standards,” said Jason Ouellette, Global Product Line Director, Access Control, Tyco Security Products. “The v2.60 release can also improve operational efficiency by moving administrative tasks, such as adding new card holders, to specific individuals who can use their mobile devices to access the system.” Automating process Expiring clearances allow end users to assign clearances with expiration dates to individuals for multiple doors/readers, while random screening automates screening selection for airports and other high security areas. Additionally, the two-person and team rule for entry occupancy feature, which is ideal for R&D and government facilities, restricts access to sensitive areas to specific combinations of card holders and local time zone awareness for monitoring and reporting. Included in the latest version of C•CURE 9000 is a new version of the C•CURE 9000 Web Client that provides remote access to C•CURE 9000 directly from a computer with an Internet browser. The new web client is based on the RESTful protocol and true web services, and includes a new look GUI and new installation process.
Kantech has always ensured streamlined user experience and intuitive installations for its installers Tyco Security Products is proud to announce that the Kantech access control product line is celebrating its 30th year, marking a history of innovation, integrity, and usability, to make it one of the most well-known and respected access control brands in the market currently. From its first KT-100 and KT-200 door controllers to its integrated INTEVO, its complete security solution, and KT-1 door controller with single button enrolment, Kantech has redefined the user experience for small to medium-sized businesses globally by offering innovative and technologically progressive solutions that are easy to deploy, configure, and manage.Evolution of Kantech access controlSince its beginnings in 1986, Kantech has incorporated the latest technological innovations into security applications that are intuitive for the user regardless of their security expertise. As access control has evolved from a standalone security application into an important business tool for many organisations, Kantech focused on providing full-featured solutions that maintain a streamlined user experience and intuitive installation for its installers.“As a systems integrator who has been in business for more than 25 years, I can attest that Kantech has mastered the art of taking a new technology and reinterpreting it in a way that makes it accessible and easy to use,” said Jean Rho, owner and founder of systems integrators Technilogic Technical Consultants, Inc., based in Montreal. “At the same time, the company has developed a reputation for product integrity. I still support customers using the KT-200 door controller, which was released 25 years ago. That’s a real testament to Kantech’s products’ quality.” Remote security "Kantech has mastered the art of taking a new technology and reinterpreting it in a way that makes it accessible and easy to use" Applications such as EntraPass Web and EntraPass Go mobile app enable security operators and managed service providers to manage security remotely. Innovations such as INTEVO, a preconfigured, out-of-the-box solution that integrates Kantech’s EntraPass software and exacqVision video management software, and supports DSC intrusion alarm panel integration, is easy to configure and features a customised dashboard for comprehensive system management.For its partners, Kantech has streamlined set-up and installation and reduced costs for its partners by pioneering Access Control Starter Kits to include all of the components needed to deploy a system. Through Tyco Security Products’ Connected Partner Program, systems integrators and distributors are also able to integrate technologies from third-party partners.“Kantech has always been known for its innovative spirit, adaptability, and loyal dealer network and that tradition continues,” said Jason Ouellette, Product Line Director, Access Control, for Tyco Security Products. “Kantech’s current product line brings the latest and best that the industry has to offer to the SMB market, including an integrative, complete security solution that typically is only offered to enterprise sized businesses.” "Kantech has always been known for its innovative spirit, adaptability, and loyal dealer network and that tradition continues" Exemplary customer serviceIn addition to its ingenuity in incorporating new technologies through integrations, the team behind the Kantech brand has a long history of exemplary customer service, with hands-on trouble-shooting support. This team solicits feedback from dealers for use in product development and updates, and has recently launched the Kantech hattrix Five Diamond Program, a new cloud-based access control partnership program for managed service providers (MSPs) who are active in or interested in offering hosted or managed access control services.Technical support and research & development units are located at the Tyco Security Products site in Montreal, which is a Tyco Global Centre of Excellence (GCoE). The centre serves as a single point of contact for all global security needs, developing standards, technical specifications and detailed work plans that enable consistent security installations globally. It also provides customers with remote system audit services to verify functionality and compliance to corporate standards.
Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin Wine, Vice President of Marketing, Verint, says healthcare users are looking for systems that are: Open and scalable, and can easily integrate with other systems and sensors; Intuitive to use and manage to help keep the focus on better situation management; Comprehensive and automated to help operators align with standard operating procedures and reporting structures; Intelligence-driven to correlate data with other sources of security and operational data for more accurate and comprehensive risk profile. Enhancing security efforts by the right means Ensuring the safety of patients, staff and visitors is no easy task, and while it is challenging for security officials to predict, prepare for or prevent every incident from occurring on the premises, robust strategies and programmes help these facilities achieve a higher level of situational awareness, says Wine. By improving security efforts with the right technology, protocols and procedures, hospitals are better equipped to ensure safety and security while driving new levels of business intelligence to ensure long-term viability in today’s market. By improving security effortswith the right technology,protocols and procedures,hospitals are better equippedto ensure security Healthcare facilities today seek holistic solutions that address a wide variety of security and business needs, says Wine. Video surveillance is a force multiplier, helping mitigate risks. Video and other security sensors and communication systems (i.e., access control, video analytics, dispatch, nurse call, alarms, RFID, et.al.) also help enable users to realise new levels of prevention – earlier detection is vital to prevent incidents. Situational awareness solutions But all of these valuable data points cannot be fully realised without correlating information from various solutions together, says Wine. Situational awareness solutions help hospitals gain a full picture of a security situation, improve communication among stakeholders, and streamline reporting to allow officials to effectively manage a situation on a more proactive basis. All of these needs are driving healthcare organisations to seek out solutions and programmes that can provide value beyond feature sets, and can help drive new levels of security and business intelligence. Wine contends that, by integrating data from various sources into a single command-and-control platform, true situational awareness can be achieved. This comprehensive approach helps enable faster and more effective response to support a high level of safety to employees, patients, visitors and the overall community. “Situational awareness solutions automatically combine critical data points from multiple systems and sensors, allowing operators to understand what is happening in real-time through one intuitive interface,” says Wine. “We like to think of this approach as a single pane of glass – helping enable officials to quickly and effectively identify risks, manage situations and thoroughly investigate. Bringing all data points into one platform helps allow for early detection of threats, which can also be used to initiate better planning, timely response and better decision-making.“ The healthcare vertical is moving toward a complete solution that integrates nearly any system using a facility’s network Integration: access control and beyond Access control is an important aspect of integration in healthcare settings. Hospitals must support affiliated doctors who need to carry multiple badges for all the locations they visit, for example. Over time, administrators may want to integrate access control with visitor management, or add video surveillance and other technologies. This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities. In contrast, the latest physical access control system (PACS) system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them. “Today’s solutions enable healthcare organisations to achieve a versatile PACS that protects everything from hospital doors and storage areas to the cloud and desktops,” says Sheila Loy, Director Healthcare Strategies, North America, HID Global. “With proper planning, healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they seamlessly add new capabilities in the future,” she says. The result is a fully interoperable, multi-layered and highly adaptable security solution that spans the organisation’s networks, systems and facilities, and has room to grow, evolve and improve over time. Healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they add new capabilities in the future The latest PACS architectures support new applications such as infant protection systems, and biometrics in sensitive areas such as laboratories and research centres. There are also opportunities to “do more with the card,” says Loy. Hospitals can offer physicians, nurses and staff one card for accessing the emergency room and pharmacy, and for visual ID verification, time-and-attendance logging, payroll transactions, and cafeteria purchases. This simplifies life for cardholders while centralising and streamlining management. To protect information, access control systems now also deliver the ability to “tap” in and out of computer applications, eliminating complex passwords and password fatigue where it can require 20 or more logins each day in order to access the hospital’s enterprise data and services. Instead, the user simply taps his or her ID card to a laptop, tablet, phone or other NFC-enabled devices to access network resources, cloud apps and web-based services. It’s easier and more secure than passwords, and faster and more seamless and convenient than dedicated hardware one-time passwords and display cards or other physical devices. Plus, there is the added benefit of using the same card that opens doors to also access data and cloud-based applications. Integration with other systems A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “At Tyco Security Products, we are offering this kind of holistic approach by integrating our C-CURE 9000 access control platform with video, intrusion, duress notification and infant abduction technologies together and adding license plate recognition, biometric identity management, NFC and BLE, visitor management and home automation interfaces and capabilities,” he says. “All of these systems coming through a single pane-of-glass view give operators more to see and react to. “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. “I think we’ll also see more edge controllers and further development of mobile technology capabilities,” he adds. We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities Complete security integration Infant abduction systems like Elpas and Hugs can now be connected to access control systems, says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. This is significant, and the integration among these systems will no doubt grow, as this makes infant abduction very difficult. A real world example is if an infant is taken without authorisation onto an elevator. If this occurs, an alarm can be sounded, and a hospital-wide alert can be dispatched over radios and over the facility’s public address (PA) system in seconds. “This growing level of automation is one of the things I expect will continue to develop in the future,” says Stankevich. “These systems integrated into the Lynx duress/notification system allow for a wide range of notification options.” "These end users need a way to grant permissions in a way that saves time and energy on manual input, and makes changing permissions easy and efficient" Also, facilities require increased integration with today’s video surveillance and video management systems from their access control solutions, and there’s an additional push toward integrating human resources and other event management and directory software tools as well, adds Stankevich. “These end users need a way to grant permissions in a way that not only saves time and energy on manual input, but also makes changing permissions easy and efficient,” he says. “This is especially paramount for large-scale enterprise organisations, such as a hospital campus, that can span multiple geographic locations.” Access control can be integrated with other systems, too. “The continuing evolution of network technologies and our interconnected world has transformed access control systems from standalone solutions into a vital part of a more robust, highly integrated system that allows users to utilise a single control platform to monitor the status of a facility,” says Robert Laughlin, President, Galaxy Control Systems. “We expect that advanced access control solutions will be integrated with patient information, identity management, video surveillance, medicine storage and distribution, parking and other systems, all of which provide information and intelligence in the form of data that contributes to the emerging model of predictive analytics. The actionable intelligence that will result from this analysis will help move security from a reactive to a more proactive function.” Wider adoption of electronic access control Tighter integration between physical access control systems with specific hospital-based systems such as mother and baby alarms, asset location technologies and robotic vehicle systems are likely advances that we will see adopted more often, agrees Dave Ella, Vice President of Product Marketing, AMAG Technology. “We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities through the adoption of a new generation of locks that are wire-free and Wi-Fi-based, but that form part of the overall access control system,” says Ella of AMAG. AMAG also sees that frictionless access – in which no physical contact needs to be made with a card or card reader – will assist in the control of healthcare-associated infections. Read Part 11 of our Security in Healthcare series here Save Save Save
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Internationally, there is a patchwork of health privacy laws around the world, from Argentina to Uruguay, including laws throughout Europe, Central Asia and Australia. Role of physical security in safeguarding data Physical security systems can play a big role in helping to keep patient information safe and private, as required by various laws. For example, AMAG has developed new capabilities within its Symmetry family of products that allow healthcare institutes to demonstrate their compliance with HIPAA. Compliance reporting is a key area and has been a focus for AMAG, says Dave Ella, Vice President of Product Marketing, AMAG Technology. Hospitals and healthcare facilities install AMAG’s Symmetry access control system and Symmetry CompleteView Video Management to manage and control access and provide HIPAA compliance throughout their buildings and campuses. Security plan policies and procedures need to protect a healthcare facility, says Ella. Automatically reviewing access permissions for employees, contractors and visitors on a regular basis is a key aspect of the plan, and AMAG’s Symmetry CONNECT product is designed for that purpose. Also, capabilities within the system make documentation of adds and changes to the security system more straightforward. They include the ability to add drawings, documents and notes to any device within the system. Demanding regulatory environment Legislation like HIPAA, which establishes U.S. standards for privacy and security, impacts hospital access control policies and procedures, says Sheila Loy, Director Healthcare Strategies, North America, HID Global. In fact, HIPAA is just one element in a demanding regulatory environment. The need to comply is complicated in hospitals by security threats in an environment with high traffic volumes and complex staffing requirements, Loy adds. For instance, in California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines. Today’s access controlplatforms enable hospitals toimprove risk management andcomply with new legislationor regulatory requirements Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare and Medicaid Services (CMS) that, at times, conflict with state rules and result in fines. Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes; and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery. Today’s access control platforms enable hospitals to improve risk management and comply with new legislation or regulatory requirements. For instance, HIPAA imposes strict requirements for accessing medical records, which may necessitate the use of a smart card to enter secure areas or to access IT networks that store patient information. HID Global offers comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. The company’s solutions: provide secure access to healthcare facilities and supplies; enable hospitals to identify and manage hospital visitors; provide electronic audit trails to protect patients and staff; ensure HIPAA compliance for patient records; and enable organisations to leverage existing access control cards for additional services to offer convenience and create operational efficiencies. Need for versatile authentication platform Health data is at least as valuable as financial data in the online banking industry, where a layered system approach is used to ensure that appropriate risk mitigation levels can be applied, says Loy. Even though patients don’t access healthcare information as frequently as do online banking customers, and aren’t protected by the same regulatory compliance requirements, they can benefit from the same multi-layered authentication mechanisms, both inside and outside the hospital. Healthcare organisations need a versatile authentication platform with real-time threat detection capabilities in order to effectively implement the critical five layers of security including user authentication, device authentication, transaction authentication with pattern-based intelligence, browser protection, and application security, says Loy. With video surveillance, cameras must be positioned in such a way that they don't violate HIPAA laws Access control systems can be used to help protect access to patient records and other controlled materials, adds Robert Laughlin, President, Galaxy Control Systems. By using higher-security credentials for access control readers, such as biometrics, medical facilities can increase their confidence levels that they are only providing access to authorised individuals and creating an audit trail for reporting or review. Galaxy access control systems can be integrated with a wide range of readers, including high security biometric readers. Ensuring privacy with video surveillance Video systems are also impacted by HIPAA in the United States and by similar privacy legislation around the world. When a physical security system is installed in a healthcare environment, patients’ privacy must be protected according to HIPAA’s specific rules, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. A patient’s PII – or personally identifiable information – must be protected. PII is any information that can be used to uniquely identify, contact or locate an individual, or that can be used with other sources to uniquely identify a person. With video surveillance, cameras must be positioned in such a way that they don’t violate HIPAA laws, says Ouellette. If a camera is pointed to a computer screen or something else that contains a patient’s PII, there must be an option to draw a privacy window within the frame so that a patient’s sensitive information isn’t easily accessed or compromised. HIPAA and similarrequirements can indirectlyimpact video systems inways not thought of beforethe advent of megapixel surveillance cameras Challenge of megapixel cameras Furthermore, the use of megapixel cameras can increase the challenge. HIPAA and similar requirements can indirectly impact video systems in ways not thought of before the advent of megapixel surveillance cameras, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. On one hand, video surveillance systems are more effective than ever at protecting medical records storage and access to other confidential information. On the other hand, it is now equally important to consider the field of view of a high-megapixel camera, says Whitney. A camera placed over a cashier may yield images with discernible credit card numbers of a screen within the field of view, of documents, or of the credit card itself. Medical records may similarly be picked up in detail by a high megapixel camera. Therefore, it is necessary to ensure that the integrator selected to install a video surveillance system understand the objective of each area of coverage, and what should not be included. Integrated security systems aid faster compliance Faced with a number of local, state and national regulatory guidelines, security directors within healthcare facilities must be able to improve hospital security and insulate the organisation from potential liability claims, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. “That means implementing a surveillance system that allows multiagency cooperation and response,” he says. “Keeping all of this in mind, having a video surveillance system that integrates with the necessary emergency and fire alarm systems, access control and other systems can promote an institution’s compliance with regulatory agencies by providing proof that the organisation’s assets are safe and secured.” Finally, there is the issue of access to video. In today’s regulation-focused market, healthcare organisations must strictly control who has access to video, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Servers and storage are typically easier to secure because these devices are traditionally deployed in controlled locations, sometimes on closed networks and often under the supervision of IT. Client access is more difficult to control – security personnel, management and even first responders need access to video, and their devices are typically unsecured. This can translate into a potential HIPAA violation, especially if data is access by unauthorised people. Read Part 10 of our Security in Healthcare series here Save Save Save
Kantech EntraPass Go free mobile application decreases installation time and lowers the total cost of ownership Tyco Security Products introduces Kantech EntraPass Go Install, a free mobile application that uses intuitive QR code technology, pre-populated fields and a simplified commissioning process to significantly decrease installation time and lower the total cost of ownership. The application can be associated with other security devices, such as cameras managed by exacqVision, zones managed by DSC PowerSeries Neo intrusion panels and Kantech card readers to provide a Complete Security Solution. Kantech EntraPass Go Install Kantech EntraPass Go Install allows system integrators and end users to connect to their Kantech EntraPass servers by selecting from a list of existing servers or adding one manually and to configure Kantech KT-1 and KT-400 door controllers. Configuration is done by scanning a QR code that contains the controller’s MAC address and serial number, enabling remote configuration of controller as well as doors without a desktop computer. EntraPass Go Install’s Express Setup includes pre-populated fields for doors that can be modified and labeled with easy to identify user-friendly names, like ‘Staff Exit Door’ and ‘Front Lobby Door.’ Test activities include activating buzzers, card swipes and locking/unlocking doors among many others KT-1 & KT-400 door controller configuration EntraPass Go Install also makes configuration of KT-1 and KT-400 door controllers easier and quicker with app-based test activities that generate commissioning reports once all tests are completed. Test activities include activating buzzers, card swipes and locking/unlocking doors among many others. Once testing is complete, the commissioning report can be saved with corroborating system photos that verify all tests have been passed. The completed commissioning report provides setup verification to system integrators, end users and technicians who support the system so that they know the system has been deployed correctly and limits call backs significantly. Ease of use “Kantech has always focused on delivering reliable and user-friendly products that focus on smoother installation and configuration,” said Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “You’ll see Kantech’s signature pairing of ease of use and product quality with EntraPass Go Install, plus powerful device associations that integrate access control, video and intrusion together for a total security solution.” The mobile app lets you associate other security devices – Kantech doors, relays, inputs, Exacq video and DSC PowerSeries Neo zones with one-button ease. All of these labor-saving features deliver lower installation costs to customers and quicker installation for integrators. Save
Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety of video applications Arecont Vision is seeing a growing number of video applications for healthcare providers. Commonly protected with Arecont Vision megapixel surveillance cameras, integrated with a video management system or a network video recorder of the customer’s choice, is coverage of: Entrances and exists to buildings, grounds, parking structures, car parks, and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, operating rooms, morgues, patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits, and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient, and staff safety Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities. “Due to the resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results,” says Paul M. Sarnese, System Safety Direct, Virtua Health in New Jersey. “The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua.” Addressing accountability Sacred Health Health System, Pensacola, Florida, uses Arecont Vision megapixel cameras as part of a video surveillance system to look for recorded video of suspicious persons after a description is given, says Michael J. Matroni, Emergency Preparedness and Security Manager, “We are also using it to review slip-and-fall complaints, and to address issues of employee accountability.” “Arecont Vision cameras more than satisfy our requirements for image quality,” says Lai Voon Hon, General Director of Hoa Lam-Sangri-La, a high-tech healthcare park in Vietnam. “The system is working very well for us.” The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. “Our new video surveillance system is an important element of that environment,” says Lai Voon Hon. Hospitals and healthcare facilities that have multiple sites and locations can benefit from centralising all video on a single platform Centralising video onto a single platform One Pelco customer is the University of Arizona Medical Center – South Campus (UAMC South Campus). When adding a new behavioural health hospital tower, UAMC South Campus sought to migrate and expand its existing analogue video surveillance system to an IP system that would allow the capabilities of multisite monitoring. Using Pelco’s Endura IP video management system (VMS) with NSM5200 network video recorders, the hospital system was able to centralised all video onto a single platform while allowing several operators to simultaneously look for and view video of daily events. In addition, more than 150 Sarix and Sarix with SureVision technology IP cameras were deployed throughout the new tower, emergency room and most entrances and exits. The open platform concept that Pelco offers can help ensure that existing technology can be incorporated when adding onto existing infrastructure Other hospitals and healthcare facilities that have multiple sites and locations can benefit from the kind of technology used at UAMC South Campus – especially using the latest VMS technology VideoXpert and Pelco’s latest IP camera technology, Optera, which offers 180-, 270- and 360-degree views. Additionally, the open platform concept that Pelco offers can help ensure that existing technology can be incorporated when building a new building or adding onto existing infrastructure. Pelco by Schneider Electric is focused on the development of video surveillance and security solutions for enterprise-class organisations that allow users to make real-time, business-enabling decisions. Pelco offers video management platforms, industry-leading IP cameras and accessories, and other video security products and open platform systems that healthcare facilities require to bring multiple sites and locations together into a single, holistic approach to security. Multi-sensor panoramic view cameras When Arecont Vision pioneered multi-sensor megapixel cameras with their first offerings in 2006, they were alone in the market in presenting these in place of pan-tilt-zooms (PTZs) and multiple individual cameras Over the past year, the industry has seen many legacy camera vendors offer their own 180- or 360- multi-sensor cameras to try and gain market traction. “Competition is always good, and our own fifth generation SurroundVideo cameras will get even better as a result,” says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analogue cameras and PTZs as in the past, and understanding of the benefits of multi-sensor cameras will accelerate. PTZs are a legacy technology just as analogue cameras and fisheye lenses are in many situations.” "Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analogue cameras and PTZs as in the past" Multi-sensor megapixel camera technology is the way of the future to keep costs down, reduce the numbers of cameras required, shrink maintenance costs, and improve quality and video coverage for healthcare, says Whitney. Pelco is also seeing an increase in use of 180-, 270- and 360-degree camera technology to cover a larger area, such as a large waiting room or corridor, or a parking garage. The technology in these cameras allow users to pan, tilt and zoom virtually within the picture to pinpoint an incident in real-time or retrospectively. Additionally, there is a significant uptick in violence within healthcare facilities, so it’s imperative that a comprehensive video surveillance system is in place to help identify potential problem areas or threats to the safety and security of patients, healthcare workers, visitors and staff of these large facilities. This can be done through open platform technology that works seamlessly with other cameras, video management systems, alarm monitoring systems and access control, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. 360-degree analytics Jumbi Edulbehram, Regional President, Americas, Oncam, also expects 360-degree cameras to expand their uses in the healthcare realm. “Another major development will be the use of analytics, built into the 360-degree cameras, being used to help monitor traffic patterns, streamline hospital operations, increase response times and provide overall, general business intelligence for hospital administrators on ways they can improve operations and management of these facilities,” says Edulbehram. “Using analytics, the possibilities are nearly endless for how patients, staff and visitors can be better served.” A role that is sometimes overlooked is the growing importance of mobility for security officers in the healthcare vertical. “These facilities – more than ever – need to find ways to deploy effective, yet cost-aware, solutions to protect critical assets, staff, visitors and patients,” says Edulbehram. “Remote monitoring has become mainstream, and mobile applications are growing in popularity because they enable users to fully experience surveillance through 360 degrees, in full high definition from a smartphone or tablet.” The ability of officers to remain mobile while also accessing video on the go offers new flexibility that is critical to the success of any security solution, he says. There is a wealth of untapped information within the departments and offices of hospital perimeters that can be analysed to improve security strategy Expanding how video is used in healthcare With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Additionally, IT innovations will drive continued technology investment – hyperconvergence and virtual desktop infrastructure (VDI) deliver new levels of cost saving and opportunities for efficiencies, he says. For example, a VDI environment can automatically lock users out of a device after three minutes of inactivity or if they have swiped into a different workstation. Additionally, VDI drives mobility, allowing medical staff to roam from environment to environment to improve patient care and hospital operations. Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims As in hospitals and healthcare facilities, the world of video analytics is gaining ground in vertical markets such as retail, government and corporate enterprise applications, says Steve Birkmeier, VP of Sales and Business Development, Arteco. “There is a wealth of untapped information within the many departments and offices of hospital perimeters that can be analysed to improve security strategy in the future,” he says. Video event management software Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare as well, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. “At Tyco Security Products, we are making smart solutions that use native analytics and intelligence to help security operators determine when they need to record video and have that top quality image. It’s a cost-effective way to use high-resolution imaging,” he says. Read Part 4 of our Security in Healthcare series here
EyeLock nano NXT uses video, rather than still pictures, to capture eye images at 20 frames per second Tyco Security Products introduces the integration of EyeLock nano NXT® advanced dual iris authentication technology with Software House’s C•CURE 9000 security and event management solution. Eye image video capture An ideal solution for business, government and other applications, EyeLock nano NXT uses video, rather than still pictures, to capture eye images at 20 frames per second. EyeLock’s technology converts the unique characteristics of each iris into encrypted code, creating a high level of security with a false accept rate during authentication of 1 in 1.5 million for a single eye. The biometric identifier can authenticate up to 20 people per minute while in-motion and at-a-distance of 12 inches. “Tyco Security Products continues to build its biometric integration portfolio, offering customers the latest and most accurate technologies available,” said Jason Ouellette, Product Line Director, Access Control, Tyco Security Products. “The availability of EyeLock nano NXT for use with C•CURE 9000 presents end users with expanded options for a highly secure access control solution.” EyeLock nano NXT features The EyeLock nano NXT can be deployed within a networked C•CURE 9000 platform and can serve as part of a two-factor authentication process. The compact EyeLock nano NXT, which measures just 8 inches by 5 inches, offers an on-board memory of up to 20,000 unique users. Additional features of EyeLock nano NXT include tamper detection and a web configuration tool. Customisation is available through an optional SDK.
Using Tyco Security Products' new technology, C•CURE 9000 Security and Event Management platforms can deliver contactless access control Tyco Security Products introduces the Safran MorphoAccess SIGMA Series access control high speed biometric and card reader featuring the world’s number one performance-ranked fingerprint technology and the world’s only single hand movement capture and match reader, the MorphoWave Tower. Using this technology, C•CURE 9000 Security and Event Management platforms are now able to deliver contactless access control. Accurate fingerprint technology The new MorphoAccess (MA) SIGMA Series readers employ state of the art fingerprint technology that is ranked the most accurate in the world by the United States National Institute of Standards and Technology (NIST). The optical biometric sensor used in the readers also meets the Federal Bureau of Investigation’s standards for Personal Identity Verification and Image Quality Specifications. The MA SIGMA Lite Series readers, designed for narrow mounting surfaces such as turnstiles or server rack doors, deliver a durable design making them ideal for a wide array of indoor and outdoor deployments. Ease of use MA SIGMA Series readers feature an easy to use color touchscreen and buzzer for advanced interactivity, and can be used with any electronic device that has Web access, including laptops, PCs, tablets and smart phones. The readers support Prox, iCLASS, MIFARE, MIFARE Plus, DESFire and NFC cards. An embedded server enables on-device enrollment, transaction log retrieval and terminal configuration, as well as user ID, BioPIN and PIN management. Durability and performance "The MorphoWave Tower is the first touchless biometric access reader able to capture and match four fingerprints with a single hand movement" “The MorphoAccess SIGMA Series reader is considered one of the best fingerprint readers in the world, pairing toughness and durability with superb performance, advanced anti-fraud capabilities and mobile access features. The MorphoWave Tower is the first touchless biometric access reader able to capture and match four fingerprints with a single hand movement,” said Jason Ouellette, Product Line Director, Access Control, Tyco Security Products. “Both are the best performing and most innovative in their class, an indication of the high value that Tyco Security Products places on bringing cutting edge, high-performing innovations to our customers’ doorsteps.” MorphoWave Tower reader applications MorphoWave Tower readers are ideal for busy, high traffic and high security applications. The readers use patented, contactless four-finger ‘on the fly’ capture technology that is the only of its kind in the world, providing high accuracy even when presented with wet/dry fingers and latent fingerprints, a problem posed by some conventional touch readers. The contactless capability of the MorphoWave allows an end user to keep moving without breaking his/her stride when passing through a control point, so that the flow in high-traffic areas is continual. MorphoWave Tower readers can be deployed as standalone integrations or in line with turnstiles, offering extensive customisation capabilities and time and attendance features, including programmable function keys, real-time employee notifications and job code management.
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload