Articles by Jason Ouellette
As businesses, schools, hospitals and sporting venues look to safely reopen in a COVID-19 world, thermal imaging systems will play a critical role in helping to detect and distinguish skin temperature variations in people. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, is now being deployed to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. In the coming weeks and months, the security industry will look to implement thermal camera solutions for customers, yet many questions remain as to the differences between different system types and how to properly install thermal imaging cameras. In this Q&A, Jason Ouellette, Head of Technology Business Development for Johnson Controls, answers several of these questions. Q: What are some of the different thermal imaging solutions available in the market to detect an elevated temperature in a person? For the general market, there are three types of these thermographic screenings. There is the handheld device, which is typically lower cost, very portable, and very easy to use. Typically, this is a point and shoot type of device, but it requires you to be three feet or less from the person that you're screening, which, in today's world, means the user needs to wear protective personal equipment. For the general market, there are three types of these thermographic screenings The second type of solution would best be described as a thermal camera and kiosk. The advantage of this system over a handheld device is this can be self-service. An individual would go up to and engage with the kiosk on their own. But many of these kiosk type solutions have some integration capability, so they can provide some type of output, for either turnstiles, or physical access control, but not video management systems (VMS). Some of the downside of this type of system is that it’s less accurate than a thermographic solution because it does not have a blackbody temperature calibration device and the readings are influenced by the surrounding ambient temperature, called thermal drift. So instead of being able to achieve a ±0.3ºC accuracy rating, this system probably provides closer to ±0.5ºC at best. Some of these devices may be classed as a clinical thermometer with a higher degree of one time accuracy, but do not offer the speed and endurance of the thermographic solution for adjunctive use. And then there are thermal imaging camera systems with a blackbody temperature calibration device. These types of systems include a dual sensor camera, that has a visual sensor and a thermal sensor built right into the camera, along with a separate blackbody device. This provides the highest degree of ongoing accuracy, because of the blackbody and its ability to provide continuous calibration. These systems can provide much more flexibility and can offer integrations with multiple VMS platforms and access control devices. Q: When installing a thermal imaging camera system what is the most important element to consider? Camera placement is critical to ensure the system works as expected, however the placement of the blackbody device which verifies the correct calibration is in place is equally as important. If the customer wants to follow FDA medical device recommendations for camera placement, both the height of the camera and the blackbody as well as the distance between these devices should comply with the product installation instructions. This takes into account the device focal range and calibration parameters in addressing the distance from the person undergoing the scan. Also, integrators should minimise camera detection angles to ensure optimal accuracy and install cameras parallel with the face as much as possible, and again in compliance with installation instructions. Integrators should minimise camera detection angles to ensure optimal accuracy The blackbody should be placed outside of the area where people could block the device and located more towards the edges of the field-of-view of the camera. You need to keep in mind the minimum resolution for effective thermographic readings which is 320 by 240 pixels as defined by the standards. To achieve this, you would need to follow medical electrical equipment performance standards driven by IEC 80601-2-59:2017 for human temperature scanning and FDA guidelines. Within that measurement, the face needs to fill 240 x 180 pixels of the thermal sensor resolution, which is close to or just over 50 percent of the sensor’s viewing area typically, meaning a single person scanned at a time in compliance with the standards for accuracy. Along with height and distance placement considerations, the actual placement in terms of the location of the system is key. For example, an expansive glass entryway may impact accuracy due to sunlight exposure. Installations should be focused on ensuring that they are away from airflow, heating and cooling sources, located approximately 16 feet from entry ways and in as consistent of an ambient temperature as possible between 50°F and 95°F. Q: Once a thermal imaging camera system is installed, how do you monitor the device? There are several choices for system monitoring, depending on whether the solution is used as standalone or integrated with other technologies, such as intrusion detection, access control or video systems. For standalone systems, the ability to receive system alerts is typically configured through the camera’s webpage interface, and the cameras include abilities such as the live web page, LED display for alerting, audio alerts and physical relay outputs. When done right, these features will all follow cybersecurity best practices which is important for any network solution today, including changing default passwords and establishing authentication methods. The ability to receive system alerts is typically configured through the camera’s webpage interface These types of thermal cameras can also integrate with turnstile systems, VMS platforms and access control systems. This is typically done through the integration of a relay output, activated by a triggered temperature anomaly event on a thermal imaging camera which can then be used for activities such as locking a turnstile, or through access control and video systems to send an email or provide an automated contagion report for contact tracing. These capabilities and integrations extend the monitoring capability above that of the standalone solution. The camera can be configured to monitor a specific range of low and high alerts. Users can determine the actions that should be taken when that alert exceeds the preset low or high threshold. These actions include things like a bright and easy-to-see LED can provide visual notification through pulsing and flashing lights as an example. Q: What about system maintenance? Does a thermal imaging camera require regular service in order to operate accurately? First it’s important to make sure the system is calibrated. This can be done after the unit stabilises for at least 30 minutes to establish the initial reference temperature source known as the blackbody. Calibrations conducted before this warm up and stability time period can throw off accuracy. Also, as part of your system maintenance schedule you will want to perform a calibration check of the blackbody device every 12 months, along with following recommendations of the FDA and IEC. If you install the solution and don’t perform maintenance and the blackbody calibration certificate expires, over time there’s a risk that the device will experience drift and a less accurate reading will result. There’s a risk that the device will experience drift and a less accurate reading will result Q: What final pieces of advice do you have for either an integrator who plans to install a thermal imaging camera system or an end user who plans to invest in this solution? Before you buy a thermal imaging camera check to see if the manufacturer ships the camera with a calibration certificate. Also, become familiar with FDA’s guidance released in April 2020, Enforcement Policy for Telethermographic Systems During the Coronavirus Disease 2019 (COVID-19) Public Health Emergency. This document places thermal/fever products for adjunctive use under the category of a Class I medical devices and subject to its regulatory control. Driven by these regulations and categorisation, users need to understand specifically what is required to meet the required level of accuracy for successful detection. While thermal imaging camera systems are more complex than traditional surveillance cameras, they can prove to be a valuable resource when set up, configured and maintained properly.
The Physical Security Interoperability Alliance (PSIA) has announced that it has elected Jason Ouellette, as its Chairman and Ewa Pigna, the Chief Technology Officer for LenelS2, a part of Carrier Global Corporation, as its Vice Chairman. Standards-based digital data In addition, Peter Boriskin, the Chief Technology Officer for ASSA ABLOY Opening Solutions Americas, will continue in his role as the organisation’s Treasurer. The PSIA membership develops specifications for enabling standards-based sharing of digital data and intelligence throughout the physical security and enterprise ecosystems. “Jason and Ewa are long-standing Board members with strong technology, commercial, and industry leadership skills,” said David Bunzel, Executive Director at the PSIA, adding “They and their companies have been important advocates for open standards in the physical security industry and also active proponents for the PSIA’s access control specification - PLAI.” Identifying new and enhanced PSIA specifications Open standards are critical to large scale deployments and solving complex enterprise problems" As PSIA Chairman, Jason Ouellette will work closely with the PSIA board to expand membership, commercialise its specifications, and identify industry needs for new and enhanced PSIA specifications. “Open standards are critical to large scale deployments and solving complex enterprise problems,” noted Jason. He adds, “With that in mind, I truly see the value that PSIA and PLAI bring to the security industry where multiple Physical Access Control Systems, Biometric solutions, and other integrations exist in the market. The PLAI specification provides a means for reducing complexity and cost in these environments with the application of open standards which provide a method to share personnel, credentials, and biometrics in a way that respects PII and security concerns.” Defining the technical aspects of PLAI Ewa Pigna’s role as PSIA Vice Chairman will include defining the technical aspects of PLAI necessary to make this an effective commercial standard. This will include enhancing and promoting the PLAI specification in order to assure industry compliance and interoperability. “My involvement with PSIA and promotion of physical security standards is focused on delivering solutions to our customers that derive value from integration and interoperability,” said Ewa Pigna, adding “Our mission is to simplify the complex world of disparate systems and enable technical information sharing for more holistic decision making.” Access and video security products expert At Johnson Controls, Jason Ouellette serves as the Lead of Technology Business Development, for its access and video security products group. He is based at the company’s Westford, Massachusetts office. Ouellette, joined Tyco International in April 1999, and has served as a Customer Support Specialist, Software Engineer, Engineering Manager, Director of R&D for the American Dynamics Intellex products and Software House access control products, and as Director of Product Management for the global access control business. In 2017, after Tyco merged with Johnson Controls, Jason was promoted to Product General Manager for access control. In 2019, he served as General Manager for direct to channel access & video products. U.S. Air Force veteran Pigna held senior management positions at GE Security, prior to her current role at LenelS2 Prior to this, he served in the U.S. Air Force, from 1989 to 1996, as a Medical Laboratory Specialist and later as a Computer Implementation Specialist. Ouellette also held positions at CDSI, and SAIC in development and network roles, before coming to Tyco International. At LenelS2, Ewa Pigna serves as the Chief Technology Officer. She started her career at IBM in Boca Raton, Florida, where she was a Software Engineer in the robotics group. Pigna held senior management positions at GE Security, prior to her current role at LenelS2. She holds a BS degree in computer science and mathematics from UCLA. Security technology and enterprise security expert At ASSA ABLOY Opening Solutions, Peter Boriskin, is the Chief Technology Officer, leading the Americas innovation team. He has over twenty years’ experience working with security technology and enterprise security. In his previous roles, he was the Product Management Leader for UTC Fire & Security in their Lenel business and the Vice President of Product Management for Tyco International’s access control and video systems division. Prior to joining Tyco International, Peter founded a networking company, where he was Owner and President. He is regularly quoted in industry publications and has authored numerous articles on physical security. He holds a BA degree from Brandeis University.
The Physical Security Interoperability Alliance (PSIA) announced it has elected Jason Ouellette, as its Chairman and Ewa Pigna, the Chief Technology Officer for LenelS2, a part of Carrier Global Corporation, as its Vice Chairman. In addition, Peter Boriskin, the Chief Technology Officer for ASSA ABLOY Opening Solutions Americas, will continue in his role as the organization’s treasurer. The PSIA membership develops specifications for enabling standards-based sharing of digital data and intelligence throughout the physical security and enterprise ecosystems. Leadership skills “Jason and Ewa are long-standing Board members with strong technology, commercial, and industry leadership skills,” said David Bunzel, Executive Director, the PSIA. “They and their companies have been important advocates for open standards in the physical security industry and also active proponents for the PSIA’s access control specification–PLAI.” As PSIA Chairman, Ouellette will work closely with the PSIA board to expand membership, commercialize its specifications, and identify industry needs for new and enhanced PSIA specifications. “Open standards are critical to large scale deployments and solving complex enterprise problems,” noted Ouellette. “With that in mind, I truly see the value that PSIA and PLAI bring to the security industry where multiple Physical Access Control Systems, Biometric solutions, and other integrations exist in the market. The PLAI specification provides a means for reducing complexity and cost in these environments with the application of open standards which provide a method to share personnel, credentials, and biometrics in a way that respects PII and security concerns. ” Assure industry compliance Pigna’s role as PSIA Vice Chairman will include defining the technical aspects of PLAI necessary to make this an effective commercial standard. This will include enhancing and promoting the PLAI specification in order to assure industry compliance and interoperability. “My involvement with PSIA and promotion of physical security standards is focused on delivering solutions to our customers that derive value from integration and interoperability,” said Pigna. “Our mission is to simplify the complex world of disparate systems and enable technical information sharing for more holistic decision making.” Access control At Johnson Controls, Ouellette leads Technology Business Development, for its Access and Video Security Products Group. He is based at the company’s Westford, Massachusetts office. Ouellette, joined Tyco International in April 1999, and has served as a customer support specialist, software engineer, engineering manager, director of R&D for the American Dynamics Intellex products and Software House Access Control products, Director of Product Management for the global access control business. In 2017, after Tyco merged with Johnson Controls, Ouellette was promoted to Product General Manager for Access Control. In 2019, General Manager for Direct to Channel Access & Video Products. Senior management positions Prior to this, he served in the U.S. Air Force from 1989 to 1996 as a medical laboratory specialist and later as a computer implementation specialist. Ouellette also held positions at CDSI, and SAIC in development and network roles before coming to Tyco. At LenelS2, Pigna is the Chief Technology Officer. She started her career at IBM in Boca Raton, Florida, where she was a software engineer in the robotics group. Pigna held senior management positions at GE Security before her current role at LenelS2. She has a BS in computer science and mathematics from UCLA. Security technology and enterprise security At ASSA ABLOY Americas, Boriskin, is the Chief Technology Officer, leading the Americas innovation team. He has over twenty years’ experience working with security technology and enterprise security. In his previous roles, he was the Product Management Leader for UTC Fire & Security in their Lenel business and the Vice President of Product Management for Tyco International’s Access Control and Video Systems division. Prior to joining Tyco, Peter founded a networking company where he was owner and President. He is regularly quoted in industry publications and has authored numerous articles on physical security. Peter holds a BA from Brandeis University.
Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader interview to discover the future of safe, healthy and innovative buildings. Global Security Exchange Plus (GSX+) Our experts are excited to share how data-driven digital solutions help them create more intelligent buildings" “The industry leaders who are attending GSX+ are currently faced with not only reacting to the COVID-19 crisis, but also continuing to innovate for a smarter future,” said John Hudson, Vice President and General Manager of Security at Johnson Controls. John adds, “Our experts are excited to share how data-driven digital solutions allow them to do both, protect occupants during a pandemic and create more intelligent buildings. From infection control to employee screening, this technology provides the flexibility they need to create safer, more resilient environments, no matter what.” Digital security solutions on display Johnson Controls experts will be at the virtual marketplace throughout the conference, showcasing digital security solutions that better protect occupants and employees while streamlining daily operations, including: OpenBlue: It is an open digital platform that transforms how occupants interact with their buildings. This comprehensive suite of solutions and services creates dynamic and intelligent spaces. Leveraging AI and data-powered capabilities, OpenBlue accelerates building reopening by maximising the health and safety of environments through a connected combination of hardware and software. OpenBlue includes solutions to re-enter, reoccupy and reimagine, including contact tracing, social distancing monitoring, thermal cameras, infection control, clean air solutions and more. Smart Elevated Skin Temperature Scanning Solution: Leveraging Tyco Illustra Pro thermal cameras, this contactless and frictionless solution rapidly scans groups of individuals for elevated body temperatures quickly, accurately and reliably. Advanced technology instantly alerts users to an elevated temperature, enabling them to leverage thermal imaging to identify the individual for a swift staff response. This thermal solution can be integrated with additional security systems such as access control and video management systems. Emergency Preparedness and Response: From gunshot and weapons detection, to mass notification systems (MNS), to AI analysis, Johnson Controls emergency preparedness and response portfolio ensures buildings can be safeguarded from the unexpected and help deliver successful emergency outcomes. Insights on biggest security themes and trends As a GSX+ sponsor, Johnson Controls thought leaders will participate and host sessions throughout the conference, to provide insight on the biggest security themes and trends of 2020 and beyond: Thought Leader Interviews, including: Digital Security and Open Blue, presented by Mike Ellis, Executive Vice President, Chief Customer and Digital Officer, Johnson Controls. Tuesday, Sept. 22, 11:30 – 11:50 a.m. EDT. Cyber and Physical Security, presented by Jason Christman, Vice President, Chief Product Security Officer, Johnson Controls. Wednesday, Sept. 23, 11:30 – 11:50 a.m. EDT. Gamer Changer session, HR and Travel Security Issues After COVID-19 Lockdowns, hosted by Hank Monaco, Vice President, Marketing, Johnson Controls, Building Solutions for North America. Tuesday, Sept. 22, 10:15 – 11:05 a.m. EDT. Featuring: Eduard Emde, Head of the health, safety and security section ESA/ESTEC at ESA European Space Agency, ESTEC Radek Havlis, Director CEE and Central Asia at PricewaterhouseCoopers Geert Coremans, Director, corporate safety & security at The Radisson Hotel Group Nicole McDargh, regional security and H&S director at Richemont Product demos, including: Thermal Cameras and Access Control Frictional Solutions, which will be hosted by Jason Ouellette, ACVS technology, Business Development, Global and George Grammer, Strategic Product Manager, access control and integrated systems, Johnson Controls. Wednesday, Sept. 23, 1:30 p.m. EDT. Emergency Preparedness and Response, hosted by Alka Khungar, Senior Portfolio Manager, Johnson Controls Building Solutions. Tuesday, Sept. 22, 11:30 a.m. EDT. Making buildings more secure and intelligent “Our experts have years of experience reimagining buildings to be more secure and intelligent,” said Hank Monaco, Vice President of marketing at Johnson Controls, Building Solutions North America. Hank adds, “Now, we are leveraging that experience to create environments that can not only safely reopen, but also remain resilient for years to come. Our team is excited to share our vision of this future at GSX+, and the solutions that will help us get there. We are more committed than ever to powering our customers’ missions for a safe and healthy world.”
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce server infrastructure and maintenance costs with greater business continuity options. Physical security operations Beyond IT modernisation and cost management, organisations are approaching cloud adoption strategies through the lens of broader enterprise business efficiency and growth objectives. Companies are aggressively moving to the cloud to maximise their IT spend" As organisations identify and migrate critical application workloads to the cloud, physical security operations are able to increase C•CURE 9000 application availability by leveraging redundancy and disaster recovery infrastructure that geographically extends well beyond their on-premise constraints. “Companies are aggressively moving to the cloud to maximise their IT spend while improving their agility to respond to business needs and market changes,” said Jason Ouellette, general manager of Enterprise Access & Video Solutions, Building Technologies & Solutions, Johnson Controls. Artificial intelligence “When moving infrastructure to the cloud, learning how to provision the right type and size of resources required for customer specific environments is critical to optimise performance and cost. Customers who take this approach in their C•CURE 9000 cloud migration planning can easily avoid overspending while maintaining flexibility to quickly scale resources based on actual need.” To assist customers seeking C•CURE 9000 cloud deployment support, the Software House Professional Services organisation provides a broad range of consulting and implementation services, including technical guidance on best practices and system architecture considerations regarding customer specific cloud strategies. Cloud solutions are an integral part of the strategic focus of the Tyco Access Control and Video Solutions unit of Johnson Controls, along with artificial intelligence, unification and cybersecurity, comprising of four key technology pillars.
The PSIA will show continued momentum for its Physical Logical Access interoperability (PLAI) spec at ISC West 2019. “In past demos we were able to show some exchange of records between PACS systems, but this year we will have five vendors, and demonstrate existing employee identity data sets, which can be passed to other systems in the security environment beyond having just a clean start,” said David Bunzel, Executive Director of the PSIA. Physical security systems Biometrics, an important component of enterprise physical security systems, will also be featured in the demo. Princeton Identity has previously demonstrated its PLAI adapter and at ISC West 2019 we will be showing new adapters from EyeLock and IDEMIA. Two of the major physical access control (PACS) vendors, Johnson Controls and LenelS2, will show their new commercial PLAI adapters at the demo “Having the ability to transfer employee credential data so that associated biometric identifiers can be constructed and utilised with existing access control systems will be a valuable feature for our customers,” said Consuelo Bangs, Senior Program Manager, IDEMIA Identity & Security USA LLC. “This will save time and money by eliminating redundant record creation.” Two of the major physical access control (PACS) vendors, Johnson Controls and LenelS2, will show their new commercial PLAI adapters at the demo. Critical components “Our enterprise customers have complex environments with high costs for integrations and identity synchronisation today, and as a result these customers have been looking for solutions. PLAI provides an effective means to support these industry needs,” said Jason Ouellette, Product General Manager- Access Control, for Johnson Controls. One of the critical components is the introduction of an independent commercial PLAI Agent by Cruatech of Dublin, Ireland. This Agent acts as a central hub, to allow interchange between disparate PACS and biometric vendors. “The introduction of the Cruatech Agent offers the means to effectively provide solutions to enterprise customers, solving an important problem in the industry–finding a method to have a single trusted source in an enterprise environment,” said Bruno Desrochers of Tech Systems Inc.
Johnson Controls introduces the Iris ID IrisAccess iCAM 7S Series multifactor biometric readers offering superior performance and easy integration with Software House’s C•CURE 9000 security and event management platform. The IrisAccess iCAM 7S Series readers are part of the new 5th generation IrisAccess platform, whose global, multi-market deployments number in the millions. When used with C•CURE 9000, the readers become part of a powerful security management system that can monitor events, manage personnel, create reports and operate as a unified security management system when integrated with video, intrusion, fire, real-time location and other security devices and platforms. C•CURE 9000 uses a 64-bit operating system and multiple CPU cores to make it one of the fastest and most secure security solutions in the market Amalgamation of powerful technologies C•CURE 9000 uses a 64-bit operating system and multiple CPU cores to make it one of the fastest and most secure security solutions in the market. The platform can also be deployed across multiple sites and managed from a single user interface. “Iris ID has been a leader in iris recognition technology for the last 15 years, and its reputation is built on high quality focus, high performance results, and device security,” said Jason Ouellette, Global Product General Manager, Access Control, Building Technologies & Solutions, Johnson Controls. “The integration of the Iris ID IrisAccess iCAM 7S Series readers with the C•CURE 9000 security and event management platform brings together two powerful and highly flexible technologies that can be used with multiple brands and platforms in new deployments or with an already existing infrastructure.” Built-in high- and low-frequency card readers and an optional touch screen LCD keypad provide single, double and triple authentication options Multiple biometric authentication options The IrisAccess iCAM 7S Series with C•CURE 9000 feature fast, fully automatic dual iris capture and a non-contact, hygienic reader offering high accuracy, excellent throughput and flexibility in integration. An intuitive user interface employs audio and visual cues to facilitate fast user enrolment from the edge. Built-in high- and low-frequency card readers and an optional touch screen LCD keypad provide single, double and triple authentication options. Security features built into the iCAM hardware and Entry Access Control (EAC) software help prevent tampering. High resolution, high standards-based image quality makes the readers ideal for use in high security deployments. Large database capacity In addition, each reader has the database capability of 100,000 credentials with biometric data and a transaction log capacity of up to one million transactions per reader, making the iCAM 7S Series readers suitable for high traffic areas. IrisAccess iCAM 7S Series readers are compatible with the IrisAccess 4000 and 7000 Iris Recognition platforms, in addition to the C•CURE 9000 security and event management platform integration.
A critical issue for security officers today is how to make sure temporary or permanent employees are removed from the employee directory system when they are no longer working for the company. This situation arises especially in large enterprises, which may have different Physical Access Control Systems (PACS) supporting different offices or company operations. It is not uncommon for a company to make an acquisition and have two or more incompatible PACS systems. The simple way to address this is to issue a separate card to the employee to support a different PACS system. While this might be slightly inconvenient for the worker, it is often a simple solution that many companies use. Updating employee information, must be done on each system separately and often manually There are several problems with this solution. There is no central control of identities and they can exist in multiple locations of a company. Updating employee information, for example increasing access to reflect an employee’s new responsibilities, must be done on each system separately and often manually. Unless the company has a strong procedure to support this, the records outside of the main system, may not be updated and errors can occur. This may not be a significant problem if an employee is working for the company, but, if the employee is terminated, he or she may continue to have access to company facilities and systems, potentially compromising security. Physical Logical Access Interoperability - PLAI The Physical Security Interoperability Alliance has addressed this with its Physical Logical Access Interoperability (PLAI) specification. PLAI allows disparate PACS systems to normalise employee identity information and relies on a single trusted source to make changes to employee access and then synchronises it across disparate PACS systems. The same holds true for a terminated employee. A central trusted source eliminates access, and this is instantaneously reflected in all PACS systems. PLAI offers a simple and cost-effective way to enhance a company’s access control system, providing a more robust security environment. Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI” PLAI demo at ISC West 2018 A commercial version of the PLAI Agent will be demonstrated by the PSIA at ISC West 2018 on April 12 in Las Vegas. Johnson Controls (Software House), Kastle Systems, and Princeton Identity will show the interoperability and exchange of identity information between disparate systems. “Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI,” said David Bunzel, Executive Director of the PSIA. “It will enable Physical Access Control System (PACS) vendors to have an effective solution for bridging otherwise incompatible systems, saving considerable time in integration, and costs to enterprise customers.” The PLAI Agent was developed jointly by Johnson Controls and Dublin, Ireland-based Cruatech, a new member of the PSIA. It will be available to vendors from either company prior to ISC West. “As an integrator, we are often challenged with client acquisitions and the need to quickly establish a unified security ecosystem.” said Mike Mathes, Executive Vice President of Convergint Technologies and Chairman of the PSIA. “PLAI offers a means to quickly support disparate systems in a robust and reliable manner.” The PSIA has seen growing momentum for commercial implementations of PLAI Identity management As identity becomes a more critical feature of security systems, finding ways to manage credentials, permissions, limit duplication of records, and eliminating “orphans” left over when an employee leaves a company is essential. PLAI is an elegant means to address many of these issues. “PLAI provides an effective option to reduce problems related to integration compatibility, upgrades, and synchronisation which plague the industry today. This is good for both the customer as well as the manufacturers,” notes Jason Ouellette, General Manager of Access Control for Johnson Controls. “Further, PLAI reduces the impact of conflict inherent to the replication of personnel and credential data, while giving an authoritative control of records which can span PACS systems and other integrations to reduce risks in activities such as off boarding.” The PSIA has seen growing momentum for commercial implementations of PLAI. Already the U.S. Department of Justice, The Washington Post, and Corporate Executive Board (CEB) have utilised PLAI. In addition, Microsoft is planning to incorporate PLAI into their security ecosystem. There is a growing list of other organisations which are planning PLAI implementations in the government, financial services, electronics, industrial, and bottling industries.
A commercial version of the PLAI Agent will be demonstrated by the PSIA at ISC West 2018 in Las Vegas. Johnson Controls (Software House), Kastle Systems, and Princeton Identity will show the interoperability and exchange of identity information between disparate systems. “Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI,” said David Bunzel, Executive Director of the PSIA. “It will enable Physical Access Control System (PACS) vendors to have an effective solution for bridging otherwise incompatible systems, saving considerable time in integration, and costs to enterprise customers.” The PLAI Agent was developed jointly by Johnson Controls and Dublin, Ireland-based Cruatech, a new member of the PSIA. It will be available to vendors from either company prior to ISC West. “As an integrator, we are often challenged with client acquisitions and the need to quickly establish a unified security ecosystem.” said Mike Mathes, Executive Vice President of Convergint Technologies and Chairman of the PSIA. “PLAI offers a means to quickly support disparate systems in a robust and reliable manner.” Effective identity management As identity becomes a more critical feature of security systems, finding ways to manage credentials, permissions, limit duplication of records, and eliminating ‘orphans’ left over when an employee leaves a company is essential. PLAI is an elegant means to address many of these issues. “PLAI provides an effective option to reduce problems related to integration compatibility, upgrades, and synchronisation which plague the industry today. This is good for both the customer as well as the manufacturers,” notes Jason Ouellette, General Manager of Access Control for Johnson Controls. “Further, PLAI reduces the impact of conflict inherent to the replication of personnel and credential data, while giving an authoritative control of records which can span PACS systems and other integrations to reduce risks in activities such as off boarding.” The PSIA has seen growing momentum for commercial implementations of PLAI. Already the U.S. Department of Justice, The Washington Post, and Corporate Executive Board (CEB) have utilised PLAI. In addition, Microsoft is planning to incorporate PLAI into their security ecosystem. There is a growing list of other organisations which are planning PLAI implementations in the government, financial services, electronics, industrial, and bottling industries.
Johnson Controls has announced that Florida Atlantic University, based in Boca Raton, Fla., has selected the Software House C•CURE 9000 security and event management platform to secure a new building that is part of the Charles E. Schmidt College of Medicine, a facility which houses research, administration, and a medical clinic. Florida Atlantic University is one of 12 schools that is part of the state’s university system. The Boca Raton campus boasts 3,200 faculty and staff, providing educational services and support to 4,000 students. The College of Medicine, though small with 373 students, required a robust access control system that enabled the integration of video surveillance and the ability to partition access to specific areas of the facility. Florida Atlantic University is one of 12 schools that is part of the state’s university system Student access management With C•CURE 9000, Florida Atlantic University can easily manage student access to classrooms and laboratories, which can range from 24-hour access to the building to limited facility access during examination time. In addition, the university needed to restrict access to medical record rooms, the pharmacy and other sensitive areas. The access control system is also part of the Florida Atlantic University’s Schmidt Biomedical building, with C•CURE 9000 providing coverage for all exterior entrances, research labs and elevators leading to animal research floors and the anatomy labs. With C•CURE 9000, Florida Atlantic University can easily manage student access to classrooms and laboratories Building security According to Patrick Garmon, Director of Security Technology for Florida Atlantic University, it was important to implement a system that enabled the university to manage student access to buildings by floor and room, not just to restrict overall building access. “Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management,” said Jason Ouellette, global product general manager, Access Control, Building Technologies & Solutions, Johnson Controls. “Whether managing access to laboratories, the pharmacy or medical records, C•CURE 9000 provides flexibility to easily manage and adjust the system based on current needs.” Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management C•CURE Go mobile application In the future, Florida Atlantic University plans to use the C•CURE Go mobile application, which will enable security personnel and its on-staff technician to change access status or remotely monitor the system using an iOS or Android mobile device.
The Physical Security Interoperability Alliance (PSIA) has announced it has elected Mike Mathes, Executive Vice President of Convergint Technologies, as its Chairman, and Jason Ouellette, Product General Manager–Access Control for Johnson Controls, as its Vice Chairman. The PSIA membership develops specifications for enabling standards-based sharing of digital data and intelligence throughout the physical security and enterprise ecosystems. “Mike and Jason bring us strong technology, commercial and industry leadership skills,” said David Bunzel, executive director, the PSIA. “They will be powerful evangelists for how standards-based physical security systems can help the industry create new opportunities for systems integration and data sharing while solving cost and complexity challenges.” Promoting PSIA open standards As PSIA Chairman, Mathes will work closely with the PSIA board to identify industry needs for new and enhanced PSIA specifications. “Mike has been a strong advocate for open standards and his relations with leaders in the industry will be very valuable as PLAI, the PSIA’s identity management initiative, gains momentum.” He will be responsible for expanding the member base and help companies determine migration strategies needed to specify and/or adopt and implement PSIA specifications. “With an expanded membership base, we’ll see further adoption of open standards, which will drive down the cost of system integration for the end user,” said Mathes. Reducing integration time and cost Ouellette’s role as PSIA Vice Chairman will include defining the technical aspects of PLAI necessary to make this an effective commercial standard. This will include enhancing and promoting a robust set of test tools to assure industry compliance and interoperability for PLAI. “The PSIA specifications make it easier for integrators to offer high-quality solutions with less integration time and lower total cost of ownership,” said Ouellette. “PSIA open standards can solve real enterprise problems for customers in a way that is not possible through standard integrations. I am looking forward to working with Mike, David and the rest of board to help the industry understand our use cases and encourage rapid adoption of PSIA specifications, in particular through the development of PLIA adaptors by manufacturers.” At Convergint, Mathes leads the Advanced Solutions Group. He obtained his B.S. in Electrical Engineering at University of Manitoba. At Johnson Controls, Ouellette is responsible for the global access control businesses, specific to program management, product management, and engineering functions. Peter Boriskin, Vice President Product Management at ASSA ABLOY Americas, will continue as the PSIA’s treasurer.
Johnson Controls introduces comprehensive and automated visitor management as a core component of the C•CURE 9000 security and event management platform with a new self-service Kiosk Application and optional stand offerings that connect through the C•CURE Portal. The new release provides auto-generation and assignment of temporary credentials for visitors, and customisable access control workflows for more efficient management of access credential requests. Visitor management for iOS The latest version of the multi-integrative, highly flexible flagship C•CURE 9000 platform allows visitors to self-register using the new visitor management Kiosk Application for iOS iPad devices. Visitors can look up their appointments by entering their name or email address and host name into specific fields through the Kiosk Application. Once the visit is confirmed by C•CURE 9000 and a credential is created, a temporary identification label or card can be printed from the C•CURE 9000 client. An email notification of the visitor’s arrival is promptly sent to the host. “The visitor management capabilities provided by the C•CURE 900 Visitor Management kiosk and access management workflows, all from the C•CURE Portal, streamline and simplify everyday operations,” said Jason Ouellette, product general manager, Global, Access Control, Building Technologies & Solutions, Johnson Controls. “Visits are effectively managed by the kiosk even when front desk security personnel are unavailable. Security personnel can use the Web-based, customisable access management workflows to automate and distribute the management of access requests and the initiation of changes to clearances.” Documenting all access approvals and requests Using access management workflows, personnel records can be assigned as requestor and/or approver roles and process clearance requests using customised rules and workflows. Clearance requests can be approved or denied by assigned approvers without the need for adding operator accounts to C•CURE 9000, moving administrative tasks from security officers to individuals within the building for operational efficiency. Specific doors also can be configured to automatically initiate an Access Clearance Request Workflow based on how many times a card is rejected at the door. The C•CURE Portal creates an audit trail that documents all access approvals and requests, which is key for compliance controls.
Tyco's Cheetah paves the way for full FIPS-201 deployments, allowing customers to set authentication factors to match the threat Tyco Security Products, part of Johnson Controls, announced that its Innometriks Cheetah high assurance physical access reader has achieved UL 294 certification and the complete Innometriks Infinitas FICAM solution is now listed on the General Services Administration (GSA) Approved Product List (APL). These are two important designations for government agencies that need to deploy a secure and interoperable access control solution for high security areas. Standards for Safety UL is the gold standard worldwide for product safety certification and compliance solutions. UL has developed several thousand Standards for Safety, which are vital to ensuring public safety and improving quality of products and services. The UL 294 standard applies to the construction, performance, and operation of access control systems and equipment. In addition, as part of the GSA APL, Innometriks’ Infinitas Federal Identity, Credential, and Access Management (FICAM) solution has met requirements to comply with FIPS-201 (Federal Information Processing Standard Publication 201) and has been certified as an end-to-end solution for Federal customers and suppliers. Innometrik Cheetah access reader Innometriks’ Cheetah high assurance physical access reader, which is now UL 294 certified, is revolutionary in the industry. Its advanced architecture allows seamless integration into existing PACS and network environments, while its unique design encourages phased PIV implementations. Cheetah paves the way for full FIPS-201 deployments, allowing customers to set authentication factors to match the threat. When elevated to a different security threat level, the reader changes to the corresponding authentication mode. "We see this as part of our continuing effort to provide forward thinking high assurance solutions to our Federal clients" Infinitas is a credential validation, registration and authentication suite that offers a turnkey approach to PIV, CAC, and TWIC card validation and registration of the three different personal identity cards that are being issued by the Federal Government and are HSPD-12 compliant. It is the first FICAM solution to embed the authentication module directly on the iSTAR Ultra rather than a separate, slower “bolt on” system. It offers a wide range of card and biometric authentication modes on a secure platform that can be used at remote enrollment stations or fixed locations. High security requirements "The Federal Government turns to us as a resource for proven products and solutions for many of their high security requirements," says John Cassise, Senior Product Manager, Tyco Security Products. “Achieving UL 294 certification and GSA APL listing for our Cheetah high assurance reader is an important milestone in providing them with a product that has the highest security and safety standards that are FICAM-compliant.” “We see this as part of our continuing effort to provide forward thinking high assurance solutions to our Federal clients,” said Jason Ouellette, Product Line Director, Access Control, for Tyco Security Products. “By achieving industry certifications and implementing open standards approach to FICAM, we help the Federal Government be both more safe and secure while providing flexibility to their needs.”
Both companies have been active in the development of PLAI and have seen market demand for its features Physical Access Control System (PACS) vendors Lenel (UTC) and Software House (Tyco Security Products) have made a strong endorsement for the PSIA's Physical Logical Access Interoperability (PLAI) specification, by including it as a native implementation in their OnGuard and C•CURE products, respectively. OnGuard PLAI adapter Each of these companies has been active in the development of PLAI and has seen demand from the market for this specification and its features. Lenel will be demonstrating the features of the prototype OnGuard PLAI adapter, which allows OnGuard to exchange cardholder information with PLAI-compatible systems via the PLAI Agent. Microsoft, a company with significant security requirements has been working closely with Lenel to integrate PLAI into their security ecosystem. "Being able to make an acquisition of a company with a different PACS system and having the ability to quickly integrate and synchronise with our existing system is critical to our security operations," said Mike Faddis, Director of Global Security for Microsoft. Software House access control Software House has demonstrated access control capabilities of the PSIA's specifications in previous demos, but made the decision earlier this year to do a native integration of PLAI. "In the large enterprise space, it is common for our customers to potentially have multiple PACS systems and visitor management solutions. We recognize that PLAI provides a standards-based way to accomplish the coordination of personnel and credentials in a quick and cost-effective manner to meet enterprise needs," said Jason Ouellette, Senior Product Line Director, Tyco Security Products. The PSIA will be demonstrating PLAI and its capabilities related to synchronisation of PACS systems, biometrics and mobile credentials at ISC West, on Thursday April 6th 2017 from 10:00 AM to 11:00 AM PDT. In addition to Tyco Security Products (Software House) and UTC (Lenel), Kastle Systems, EyeLock, Princeton Identity and Allegion will all be part of the demonstration.
C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation Tyco Security Products, part of Johnson Controls, introduces the newest version of its C•CURE 9000 security and event management platform that offers new functionalities for enhanced compliance controls and increased operational efficiency Advanced access control policy enforcement C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation, after-hours reader groups, expiring clearances and other notable features, as well as increased operational efficiency. This latest version of the C•CURE 9000 security and event management platform also supports IPV6 address protocols for the iSTAR Ultra door controller and introduces a new C•CURE 9000 Web Client user interface. The usability enhancements to the C•CURE 9000 v2.60 platform give end users the power to configure the platform to create a new event after a number of consecutive rejections. With this feature, end users can define the threshold for event creation by configuring the number of consecutive retries allowed within a given time period. Funneling access through central entry The platform’s after-hours reader groups allow security officers to funnel access through a central entry point, for example when disabling all but a single, central entry point in an office building after 5 p.m. Once the cardholder has passed through the central entry point and has been visually identified by the security officer, the cardholder can access specific areas within the building according to his/her access privileges, ensuring that only those with special clearances gain access to specific areas after normal hours. The platform’s after-hours reader groups allow security officers to funnel access through a central entry point “The newest version of the C•CURE 9000 includes features that are invaluable to airports, government buildings and other large-scale facilities because they automate processes, and provide process and procedure accountability for meeting compliance standards,” said Jason Ouellette, Global Product Line Director, Access Control, Tyco Security Products. “The v2.60 release can also improve operational efficiency by moving administrative tasks, such as adding new card holders, to specific individuals who can use their mobile devices to access the system.” Automating process Expiring clearances allow end users to assign clearances with expiration dates to individuals for multiple doors/readers, while random screening automates screening selection for airports and other high security areas. Additionally, the two-person and team rule for entry occupancy feature, which is ideal for R&D and government facilities, restricts access to sensitive areas to specific combinations of card holders and local time zone awareness for monitoring and reporting. Included in the latest version of C•CURE 9000 is a new version of the C•CURE 9000 Web Client that provides remote access to C•CURE 9000 directly from a computer with an Internet browser. The new web client is based on the RESTful protocol and true web services, and includes a new look GUI and new installation process.
Kantech has always ensured streamlined user experience and intuitive installations for its installers Tyco Security Products is proud to announce that the Kantech access control product line is celebrating its 30th year, marking a history of innovation, integrity, and usability, to make it one of the most well-known and respected access control brands in the market currently. From its first KT-100 and KT-200 door controllers to its integrated INTEVO, its complete security solution, and KT-1 door controller with single button enrolment, Kantech has redefined the user experience for small to medium-sized businesses globally by offering innovative and technologically progressive solutions that are easy to deploy, configure, and manage.Evolution of Kantech access controlSince its beginnings in 1986, Kantech has incorporated the latest technological innovations into security applications that are intuitive for the user regardless of their security expertise. As access control has evolved from a standalone security application into an important business tool for many organisations, Kantech focused on providing full-featured solutions that maintain a streamlined user experience and intuitive installation for its installers.“As a systems integrator who has been in business for more than 25 years, I can attest that Kantech has mastered the art of taking a new technology and reinterpreting it in a way that makes it accessible and easy to use,” said Jean Rho, owner and founder of systems integrators Technilogic Technical Consultants, Inc., based in Montreal. “At the same time, the company has developed a reputation for product integrity. I still support customers using the KT-200 door controller, which was released 25 years ago. That’s a real testament to Kantech’s products’ quality.” Remote security "Kantech has mastered the art of taking a new technology and reinterpreting it in a way that makes it accessible and easy to use" Applications such as EntraPass Web and EntraPass Go mobile app enable security operators and managed service providers to manage security remotely. Innovations such as INTEVO, a preconfigured, out-of-the-box solution that integrates Kantech’s EntraPass software and exacqVision video management software, and supports DSC intrusion alarm panel integration, is easy to configure and features a customised dashboard for comprehensive system management.For its partners, Kantech has streamlined set-up and installation and reduced costs for its partners by pioneering Access Control Starter Kits to include all of the components needed to deploy a system. Through Tyco Security Products’ Connected Partner Program, systems integrators and distributors are also able to integrate technologies from third-party partners.“Kantech has always been known for its innovative spirit, adaptability, and loyal dealer network and that tradition continues,” said Jason Ouellette, Product Line Director, Access Control, for Tyco Security Products. “Kantech’s current product line brings the latest and best that the industry has to offer to the SMB market, including an integrative, complete security solution that typically is only offered to enterprise sized businesses.” "Kantech has always been known for its innovative spirit, adaptability, and loyal dealer network and that tradition continues" Exemplary customer serviceIn addition to its ingenuity in incorporating new technologies through integrations, the team behind the Kantech brand has a long history of exemplary customer service, with hands-on trouble-shooting support. This team solicits feedback from dealers for use in product development and updates, and has recently launched the Kantech hattrix Five Diamond Program, a new cloud-based access control partnership program for managed service providers (MSPs) who are active in or interested in offering hosted or managed access control services.Technical support and research & development units are located at the Tyco Security Products site in Montreal, which is a Tyco Global Centre of Excellence (GCoE). The centre serves as a single point of contact for all global security needs, developing standards, technical specifications and detailed work plans that enable consistent security installations globally. It also provides customers with remote system audit services to verify functionality and compliance to corporate standards.
Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin Wine, Vice President of Marketing, Verint, says healthcare users are looking for systems that are: Open and scalable, and can easily integrate with other systems and sensors; Intuitive to use and manage to help keep the focus on better situation management; Comprehensive and automated to help operators align with standard operating procedures and reporting structures; Intelligence-driven to correlate data with other sources of security and operational data for more accurate and comprehensive risk profile. Enhancing security efforts by the right means Ensuring the safety of patients, staff and visitors is no easy task, and while it is challenging for security officials to predict, prepare for or prevent every incident from occurring on the premises, robust strategies and programmes help these facilities achieve a higher level of situational awareness, says Wine. By improving security efforts with the right technology, protocols and procedures, hospitals are better equipped to ensure safety and security while driving new levels of business intelligence to ensure long-term viability in today’s market. By improving security effortswith the right technology,protocols and procedures,hospitals are better equippedto ensure security Healthcare facilities today seek holistic solutions that address a wide variety of security and business needs, says Wine. Video surveillance is a force multiplier, helping mitigate risks. Video and other security sensors and communication systems (i.e., access control, video analytics, dispatch, nurse call, alarms, RFID, et.al.) also help enable users to realise new levels of prevention – earlier detection is vital to prevent incidents. Situational awareness solutions But all of these valuable data points cannot be fully realised without correlating information from various solutions together, says Wine. Situational awareness solutions help hospitals gain a full picture of a security situation, improve communication among stakeholders, and streamline reporting to allow officials to effectively manage a situation on a more proactive basis. All of these needs are driving healthcare organisations to seek out solutions and programmes that can provide value beyond feature sets, and can help drive new levels of security and business intelligence. Wine contends that, by integrating data from various sources into a single command-and-control platform, true situational awareness can be achieved. This comprehensive approach helps enable faster and more effective response to support a high level of safety to employees, patients, visitors and the overall community. “Situational awareness solutions automatically combine critical data points from multiple systems and sensors, allowing operators to understand what is happening in real-time through one intuitive interface,” says Wine. “We like to think of this approach as a single pane of glass – helping enable officials to quickly and effectively identify risks, manage situations and thoroughly investigate. Bringing all data points into one platform helps allow for early detection of threats, which can also be used to initiate better planning, timely response and better decision-making.“ The healthcare vertical is moving toward a complete solution that integrates nearly any system using a facility’s network Integration: access control and beyond Access control is an important aspect of integration in healthcare settings. Hospitals must support affiliated doctors who need to carry multiple badges for all the locations they visit, for example. Over time, administrators may want to integrate access control with visitor management, or add video surveillance and other technologies. This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities. In contrast, the latest physical access control system (PACS) system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them. “Today’s solutions enable healthcare organisations to achieve a versatile PACS that protects everything from hospital doors and storage areas to the cloud and desktops,” says Sheila Loy, Director Healthcare Strategies, North America, HID Global. “With proper planning, healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they seamlessly add new capabilities in the future,” she says. The result is a fully interoperable, multi-layered and highly adaptable security solution that spans the organisation’s networks, systems and facilities, and has room to grow, evolve and improve over time. Healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they add new capabilities in the future The latest PACS architectures support new applications such as infant protection systems, and biometrics in sensitive areas such as laboratories and research centres. There are also opportunities to “do more with the card,” says Loy. Hospitals can offer physicians, nurses and staff one card for accessing the emergency room and pharmacy, and for visual ID verification, time-and-attendance logging, payroll transactions, and cafeteria purchases. This simplifies life for cardholders while centralising and streamlining management. To protect information, access control systems now also deliver the ability to “tap” in and out of computer applications, eliminating complex passwords and password fatigue where it can require 20 or more logins each day in order to access the hospital’s enterprise data and services. Instead, the user simply taps his or her ID card to a laptop, tablet, phone or other NFC-enabled devices to access network resources, cloud apps and web-based services. It’s easier and more secure than passwords, and faster and more seamless and convenient than dedicated hardware one-time passwords and display cards or other physical devices. Plus, there is the added benefit of using the same card that opens doors to also access data and cloud-based applications. Integration with other systems A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “At Tyco Security Products, we are offering this kind of holistic approach by integrating our C-CURE 9000 access control platform with video, intrusion, duress notification and infant abduction technologies together and adding license plate recognition, biometric identity management, NFC and BLE, visitor management and home automation interfaces and capabilities,” he says. “All of these systems coming through a single pane-of-glass view give operators more to see and react to. “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. “I think we’ll also see more edge controllers and further development of mobile technology capabilities,” he adds. We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities Complete security integration Infant abduction systems like Elpas and Hugs can now be connected to access control systems, says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. This is significant, and the integration among these systems will no doubt grow, as this makes infant abduction very difficult. A real world example is if an infant is taken without authorisation onto an elevator. If this occurs, an alarm can be sounded, and a hospital-wide alert can be dispatched over radios and over the facility’s public address (PA) system in seconds. “This growing level of automation is one of the things I expect will continue to develop in the future,” says Stankevich. “These systems integrated into the Lynx duress/notification system allow for a wide range of notification options.” "These end users need a way to grant permissions in a way that saves time and energy on manual input, and makes changing permissions easy and efficient" Also, facilities require increased integration with today’s video surveillance and video management systems from their access control solutions, and there’s an additional push toward integrating human resources and other event management and directory software tools as well, adds Stankevich. “These end users need a way to grant permissions in a way that not only saves time and energy on manual input, but also makes changing permissions easy and efficient,” he says. “This is especially paramount for large-scale enterprise organisations, such as a hospital campus, that can span multiple geographic locations.” Access control can be integrated with other systems, too. “The continuing evolution of network technologies and our interconnected world has transformed access control systems from standalone solutions into a vital part of a more robust, highly integrated system that allows users to utilise a single control platform to monitor the status of a facility,” says Robert Laughlin, President, Galaxy Control Systems. “We expect that advanced access control solutions will be integrated with patient information, identity management, video surveillance, medicine storage and distribution, parking and other systems, all of which provide information and intelligence in the form of data that contributes to the emerging model of predictive analytics. The actionable intelligence that will result from this analysis will help move security from a reactive to a more proactive function.” Wider adoption of electronic access control Tighter integration between physical access control systems with specific hospital-based systems such as mother and baby alarms, asset location technologies and robotic vehicle systems are likely advances that we will see adopted more often, agrees Dave Ella, Vice President of Product Marketing, AMAG Technology. “We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities through the adoption of a new generation of locks that are wire-free and Wi-Fi-based, but that form part of the overall access control system,” says Ella of AMAG. AMAG also sees that frictionless access – in which no physical contact needs to be made with a card or card reader – will assist in the control of healthcare-associated infections. Read Part 11 of our Security in Healthcare series here Save Save Save
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Internationally, there is a patchwork of health privacy laws around the world, from Argentina to Uruguay, including laws throughout Europe, Central Asia and Australia. Role of physical security in safeguarding data Physical security systems can play a big role in helping to keep patient information safe and private, as required by various laws. For example, AMAG has developed new capabilities within its Symmetry family of products that allow healthcare institutes to demonstrate their compliance with HIPAA. Compliance reporting is a key area and has been a focus for AMAG, says Dave Ella, Vice President of Product Marketing, AMAG Technology. Hospitals and healthcare facilities install AMAG’s Symmetry access control system and Symmetry CompleteView Video Management to manage and control access and provide HIPAA compliance throughout their buildings and campuses. Security plan policies and procedures need to protect a healthcare facility, says Ella. Automatically reviewing access permissions for employees, contractors and visitors on a regular basis is a key aspect of the plan, and AMAG’s Symmetry CONNECT product is designed for that purpose. Also, capabilities within the system make documentation of adds and changes to the security system more straightforward. They include the ability to add drawings, documents and notes to any device within the system. Demanding regulatory environment Legislation like HIPAA, which establishes U.S. standards for privacy and security, impacts hospital access control policies and procedures, says Sheila Loy, Director Healthcare Strategies, North America, HID Global. In fact, HIPAA is just one element in a demanding regulatory environment. The need to comply is complicated in hospitals by security threats in an environment with high traffic volumes and complex staffing requirements, Loy adds. For instance, in California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines. Today’s access controlplatforms enable hospitals toimprove risk management andcomply with new legislationor regulatory requirements Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare and Medicaid Services (CMS) that, at times, conflict with state rules and result in fines. Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes; and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery. Today’s access control platforms enable hospitals to improve risk management and comply with new legislation or regulatory requirements. For instance, HIPAA imposes strict requirements for accessing medical records, which may necessitate the use of a smart card to enter secure areas or to access IT networks that store patient information. HID Global offers comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. The company’s solutions: provide secure access to healthcare facilities and supplies; enable hospitals to identify and manage hospital visitors; provide electronic audit trails to protect patients and staff; ensure HIPAA compliance for patient records; and enable organisations to leverage existing access control cards for additional services to offer convenience and create operational efficiencies. Need for versatile authentication platform Health data is at least as valuable as financial data in the online banking industry, where a layered system approach is used to ensure that appropriate risk mitigation levels can be applied, says Loy. Even though patients don’t access healthcare information as frequently as do online banking customers, and aren’t protected by the same regulatory compliance requirements, they can benefit from the same multi-layered authentication mechanisms, both inside and outside the hospital. Healthcare organisations need a versatile authentication platform with real-time threat detection capabilities in order to effectively implement the critical five layers of security including user authentication, device authentication, transaction authentication with pattern-based intelligence, browser protection, and application security, says Loy. With video surveillance, cameras must be positioned in such a way that they don't violate HIPAA laws Access control systems can be used to help protect access to patient records and other controlled materials, adds Robert Laughlin, President, Galaxy Control Systems. By using higher-security credentials for access control readers, such as biometrics, medical facilities can increase their confidence levels that they are only providing access to authorised individuals and creating an audit trail for reporting or review. Galaxy access control systems can be integrated with a wide range of readers, including high security biometric readers. Ensuring privacy with video surveillance Video systems are also impacted by HIPAA in the United States and by similar privacy legislation around the world. When a physical security system is installed in a healthcare environment, patients’ privacy must be protected according to HIPAA’s specific rules, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. A patient’s PII – or personally identifiable information – must be protected. PII is any information that can be used to uniquely identify, contact or locate an individual, or that can be used with other sources to uniquely identify a person. With video surveillance, cameras must be positioned in such a way that they don’t violate HIPAA laws, says Ouellette. If a camera is pointed to a computer screen or something else that contains a patient’s PII, there must be an option to draw a privacy window within the frame so that a patient’s sensitive information isn’t easily accessed or compromised. HIPAA and similarrequirements can indirectlyimpact video systems inways not thought of beforethe advent of megapixel surveillance cameras Challenge of megapixel cameras Furthermore, the use of megapixel cameras can increase the challenge. HIPAA and similar requirements can indirectly impact video systems in ways not thought of before the advent of megapixel surveillance cameras, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. On one hand, video surveillance systems are more effective than ever at protecting medical records storage and access to other confidential information. On the other hand, it is now equally important to consider the field of view of a high-megapixel camera, says Whitney. A camera placed over a cashier may yield images with discernible credit card numbers of a screen within the field of view, of documents, or of the credit card itself. Medical records may similarly be picked up in detail by a high megapixel camera. Therefore, it is necessary to ensure that the integrator selected to install a video surveillance system understand the objective of each area of coverage, and what should not be included. Integrated security systems aid faster compliance Faced with a number of local, state and national regulatory guidelines, security directors within healthcare facilities must be able to improve hospital security and insulate the organisation from potential liability claims, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. “That means implementing a surveillance system that allows multiagency cooperation and response,” he says. “Keeping all of this in mind, having a video surveillance system that integrates with the necessary emergency and fire alarm systems, access control and other systems can promote an institution’s compliance with regulatory agencies by providing proof that the organisation’s assets are safe and secured.” Finally, there is the issue of access to video. In today’s regulation-focused market, healthcare organisations must strictly control who has access to video, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Servers and storage are typically easier to secure because these devices are traditionally deployed in controlled locations, sometimes on closed networks and often under the supervision of IT. Client access is more difficult to control – security personnel, management and even first responders need access to video, and their devices are typically unsecured. This can translate into a potential HIPAA violation, especially if data is access by unauthorised people. Read Part 10 of our Security in Healthcare series here Save Save Save
Kantech EntraPass Go free mobile application decreases installation time and lowers the total cost of ownership Tyco Security Products introduces Kantech EntraPass Go Install, a free mobile application that uses intuitive QR code technology, pre-populated fields and a simplified commissioning process to significantly decrease installation time and lower the total cost of ownership. The application can be associated with other security devices, such as cameras managed by exacqVision, zones managed by DSC PowerSeries Neo intrusion panels and Kantech card readers to provide a Complete Security Solution. Kantech EntraPass Go Install Kantech EntraPass Go Install allows system integrators and end users to connect to their Kantech EntraPass servers by selecting from a list of existing servers or adding one manually and to configure Kantech KT-1 and KT-400 door controllers. Configuration is done by scanning a QR code that contains the controller’s MAC address and serial number, enabling remote configuration of controller as well as doors without a desktop computer. EntraPass Go Install’s Express Setup includes pre-populated fields for doors that can be modified and labeled with easy to identify user-friendly names, like ‘Staff Exit Door’ and ‘Front Lobby Door.’ Test activities include activating buzzers, card swipes and locking/unlocking doors among many others KT-1 & KT-400 door controller configuration EntraPass Go Install also makes configuration of KT-1 and KT-400 door controllers easier and quicker with app-based test activities that generate commissioning reports once all tests are completed. Test activities include activating buzzers, card swipes and locking/unlocking doors among many others. Once testing is complete, the commissioning report can be saved with corroborating system photos that verify all tests have been passed. The completed commissioning report provides setup verification to system integrators, end users and technicians who support the system so that they know the system has been deployed correctly and limits call backs significantly. Ease of use “Kantech has always focused on delivering reliable and user-friendly products that focus on smoother installation and configuration,” said Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “You’ll see Kantech’s signature pairing of ease of use and product quality with EntraPass Go Install, plus powerful device associations that integrate access control, video and intrusion together for a total security solution.” The mobile app lets you associate other security devices – Kantech doors, relays, inputs, Exacq video and DSC PowerSeries Neo zones with one-button ease. All of these labor-saving features deliver lower installation costs to customers and quicker installation for integrators. Save