SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Ajax StarterKit Plus

    Ajax StarterKit Plus

    Dahua Technology 50m Security Radar

    Dahua Technology 50m Security Radar

    Gallagher Command Centre

    Gallagher Command Centre

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • NAPCO Security Technologies releases cell communicator signal-strength tester tool from StarLink
    • ProdataKey’s “touch io” Bluetooth reader now being shipped
    • Dedrone receives certification from CPNI for its DroneTracker counter-drone technology platform
    • VCA Technology launches VCA Server, an AI video analytics solution, to reduce integration time and improve detection rate
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • MOBOTIX M7 platform provides more flexibility and computing power
    • Trends in banking security include more networks and software
    • Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
    • The intersection of education and fire and security
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    • Intersec Dubai 2020
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

    Third Party & Supply Chain Cyber Security Summit 2020

    Third Party & Supply Chain Cyber Security Summit 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • March Networks Corporation
    • Hanwha Techwin America
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Nine ways to make your retail security system work harder

    Nine ways to make your retail security system work harder

    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
  1. Home
  2. People

Robert Laughlin

Robert Laughlin
Robert Laughlin
President, Galaxy Control Systems

Robert Laughlin is the President at Galaxy Control Systems.

Round table contributions

What is the impact of standards on security systems and technologies?
What is the impact of standards on security systems and technologies?

Industry standards make it possible for systems and technologies to connect and work together. Standards enable today’s integrated systems. But does adherence to standards stifle innovation? Does the necessity to interface using an industry-wide standard slow down the implementation of newer (and possibly not standards-compliant) capabilities? Or do standards eliminate extraneous variables, empower more integration and encourage greater innovation? We asked this week’s Expert Panel Roundtable: How does the use of standards either stifle or jump-start innovation?

What are the security challenges of critical infrastructure facilities?
What are the security challenges of critical infrastructure facilities?

They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?

What security applications are best suited to smartphone apps?
What security applications are best suited to smartphone apps?

How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?  

Articles by Robert Laughlin

How evolving access control solutions will benefit the security industry in 2018
How evolving access control solutions will benefit the security industry in 2018

In 2017, access control solutions evolved and expanded within physical security operations, aligning with the overall industry trend of moving security from a reactive to a more proactive model. Access control serving the industry From increased integration capabilities to mobile applications to predictive analytics, access control served as the platform that enabled this transition in physical and data security. Other steady growth areas included wireless readers, smartphone usage as a credential and more migration to web-based software/hardware solutions. The security industry’s good health invited many changes to the marketplace, including mergers and acquisitions, new players offering low-cost product with reduced margins and more competition for the reseller. These changes, combined with new cloud-based technologies provided ample motivation for system integrators to change their business model by adding hosted/managed cloud-based services such as managed access control. The benefits include a recurring monthly revenue (RMR) and the versatility for accommodating any system or budget and, for end-users, a cost-effective, fully-functional turnkey solution. They were also advantageous for monitoring centres, as they could easily add access control to their portfolio of monitored services, and create a significant competitive advantage. Access control served as the platform that enabled this transition in physical and data security A new era of mobile access Along with hosted/managed cloud-based managed access control, another continuing trend in our industry is the use of mobile technology, and the expanded range of opportunities it presents. These include phone-based credentialing to free users from carrying cards, tokens or ID badges; the ability for management to control their facilities from wherever they are, without needing to be tied to a control room, desk or terminal. Mobile access control also allows systems to be quickly and easily upgraded to add logical credentials and, because phone-based credentials are highly encrypted, they can be more secure and much more difficult to copy or counterfeit than keys, access cards and other physical credentials. We’ve had a tremendous reception to Galaxy Cloud Concierge, our cloud-based, fully-hosted and managed access control and monitoring solution. It’s changing the way access control systems are deployed and used because it reduces the complexity of implementing an integrated access control and security system, making it simpler, easier, and more cost-effective for security professionals.

Growth of cloud-based access control solutions
Growth of cloud-based access control solutions

Predicting where or how security access trends would develop in 2016 was an educated guess at best. We did, however, forecast continued growth in the areas of wireless readers; smartphone usage as a credential; and more migration to web-based software/hardware solutions.In hindsight, we were not so far off the mark. Wireless security systems proved to be a growing option for extending an access control system and a practical solution for retrofits. Smart phone credentials gained popularity by freeing the users from having to carry physical credentials. Web-based software/hardware solutions opened doors for customers who own older systems, allowing them to upgrade in ways that meet their needs and budgets. 2016 in reviewCybercrime aside, government and private corporations were looking for solutions to bolster their physical safety and security, and data and predictive analysis were key to this need. The proliferation of networked platforms and the Internet of Things (IoT) trend provided end users with more data for greater situational awareness and more heightened security. Access control solutions played a critical role in the predictive analysis model by serving as a single platform that allowed users to monitor facilities and share data with other systems. 2017 forecastGrowth sectors for 2017 will most certainly include cloud-based managed access solutions. Whether controlling access for a single door or for an entire enterprise spread out over multiple locations, cloud-based hosted or managed solutions allow security dealers and monitoring companies to provide end users with cost-effective, fully-functional turnkey solutions. Another factor supporting this scenario is that integrators don’t have to take on all product solutions to offer this option. Rather, they can partner with best-in-class providers who offer the solutions and services that make up a robust, fully-functional system.Business overviewEnabling customers to support their security and safety objectives is a primary focus of our business objectives at Galaxy Control Systems, and we have done this through an innovative product portfolio and advanced integration capabilities. Customers are our number one priority and we will continue to make their security needs our main concern so they can focus on their priorities. See the full coverage of 2016/2017 Review and Forecast articles here

10 benefits of cloud access control solutions
10 benefits of cloud access control solutions

The security and safety industry has seen tremendous advances in cloud-based access control recently as cloud computing has opened up a world of possibilities for security and access control. Whether controlling access for a single door or for an entire enterprise spread out over multiple locations, cloud-based hosted or managed solutions allow security dealers and monitoring companies to provide end users with cost-effective, fully-functional turnkey solutions. The benefits are many and growing as outlined below. 1. Professional management Hosted access control eliminates the need for dedicated employees to manage the system, generating additional cost savings. All access information can be stored and managed by highly trained professionals operating from a remote operations centre. System functions, including adding, modifying and deleting users, assigning individual access levels, programming scheduled door locking and unlocking and other vital access control actions can be performed remotely by professional monitoring providers on a 24/7 basis. 2. Timely updates Beyond initial deployment, this model also eliminates many of the ongoing operating expenses associated with access control systems, including the cost of site visits to repair or update system components. For example, software providers regularly release updates that improve the functionality and security of their solutions. Installing these updates manually may require a technician to make a site visit, which can add cost to the system. Hosted access control eliminates the need for dedicated employeesto manage the system, generating additional cost savings Alternately, updating software may depend on the end user to complete the process in house. In these situations, updates often go uninstalled, often for long periods of time, leaving users without valuable new functionality and more susceptible to security breaches, etc. Under a hosted access control model, security professionals manage these updates and other system functions remotely, without disrupting the system’s operation. In addition to handling updates, providers can also ensure that systems are regularly backed up remotely to ensure continuity and the availability of critical audit trail information in the event of a network outage or other disruption. 3. Proactive service Beyond regular system operation, updates and backups, cloud-based access control enables remote system diagnostics allowing dealers and integrators to detect and address potential problems with devices, networks and other system components quickly and often proactively. Many issues, such as rebooting a device, can be addressed from the monitoring centre, eliminating costlier site visits and further contributing to savings. This ensures maximum system uptime and reliability, which are extremely important in any security application. 4. RMR An added bonus is the recurring monthly revenue (RMR) security professionals can generate by providing these services on either a standalone basis or as add-ons to traditional maintenance contracts. Access data is collected and maintained remotely to generate hassle-free reporting of system usage and management of access credentials 5. Improved security Hosted access control systems are monitored constantly, which reduces the potential for access credentials to be shared and eliminates the ability for missing or stolen cards to be used to gain unauthorised entry to a building or sensitive areas within. Should an employee be locked out of a building during non-business hours, the monitoring centre can verify the individual’s identity and remotely lock and unlock doors he or she is authorised to access. 6. Reports Access data is collected and maintained remotely to generate hassle-free reporting of system usage, which is often required for compliance with company, industry or government regulations. These reports can be provided either on a regularly scheduled or on-demand basis. 7. Best-in-breed selections Dealers and integrators don’t have to take on all product solutions to offer this option. Rather, they can partner with best-in-class providers who offer the solutions and services that make up a robust, fully-functional system. Open platforms that enable seamless integration between door hardware, access readers, software and other system components allow dealers and integrators to utilise best-in-breed solutions from providers who specialise and excel in their specific areas, and who are able to focus on what they do best rather than trying to provide an end-to-end solution themselves. Business opportunities continueto flourish for access controlsystems but there are even more possibilities when the system isintegrated  8. Scalability Potential applications for hosted access control are seemingly unlimited given the ease with which cloud-based access control systems can scale, making them appropriate for practically any size customer and application. The flexibility and scalability of these systems allow users to specify the level of control they need now and easily add doors later as needed, ensuring that the system can keep pace with an enterprise’s growth as well. 9. TCO/ROI Taking advantage of the many benefits of the cloud to deliver hosted and managed access control solutions is an innovative way to meet the needs of any end user, particularly those who lack the budget and other resources to host and manage their own localised system. Best of all, by working with trusted partners to deploy, administer and maintain systems, end users are able to devote their time and energy to their core business and operations. 10. Peace of Mind This cost-effective option also provides customers with the peace of mind that their systems are being monitored and managed around the clock, and ensures maximum uptime and reliability without the costs and other limitations associated with traditional systems Business opportunities continue to flourish for access control systems but there are even more possibilities when the system is integrated and made available as a turnkey cloud based managed access solution. Whether it’s the need to reduce costs, improve security or simply to upgrade to new technology, cloud-based managed access control systems, created by industry professionals, answer the need. Save Save

Top 4 indicators that an access control vendor is customer-service-centric
Top 4 indicators that an access control vendor is customer-service-centric

Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organisation’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do they forget your name after the sale is made? Do they just express intentions or do they actually follow through on them? Let’s look at four important indicators that can help reveal an organisation’s true commitment to your customer satisfaction. 1. Flexibility Every customer and every access control installation is different. Inevitably, some aspect of the installation, hardware topography and software programming varies from one location to the next. Customer-focused vendors understand this and will accommodate as best they can whether it’s a system for 20 doors or an enterprise-wide project; hosting the headend or custom designing a system to meet specific budgets and needs. Top access control vendors understand the marketplace and offer access control solutions that have the capability for scalability and backward compatibility. Today’s best-in-breed access control solutions enable legacy systems to be upgraded and/or integrated. By deploying an advanced access control solution, vendors can help facility professionals create custom systems that enhance operational safety and security. As an example, the combination of solidly-built access control hardware and a variety of robust software-based applications allow users to monitor facilities and/or specific areas within facility locations in real time, while sharing data with other systems over a single platform. 2. Expertise in implementing access control systems The overall expertise and experience of the customer-focused organisation can help guide the user in making a better and more confident decision regarding an access control implementation. They can quickly and easily design and install the system, integrate it with existing technology (i.e. video surveillance cameras, intercoms, elevators, etc.) or even offer to host the headend. The organisations usually have close connections between various departments such as sales and engineering which can lead to innovative custom solutions. Technicians and/or installers are usually factory-trained and are knowledgeable on the product – an important factor since simple things like wiring mistakes have the potential to void the warranty.   Access control systems and software require ongoing service and supportto ensure continuous and reliable operation 3. Service support Once a sale is made and a system installed, the customer may need follow up action. Access control systems require ongoing service and support to ensure continuous and reliable operation and having easy access to the vendor, along with their support and understanding of the situation, is paramount. There are many different ways for the customer to contact a vendor including phone, email, chat and social media but none of them are effective if the vendor is not listening or doesn’t follow through. Delays compromise security, so customers deserve a go-to person they can rely on when they need them most – typically when something goes wrong and requires immediate attention. That go-to individual has access to everyone when it comes to helping the customer and no one worries about whose job it is because they understand that helping the customer is everyone’s job. Issues are logged so that trends or patterns can be identified. Whether encountered in the field or over the phone, the information collected can be used to change policies or procedures that can help improve responses. Another practice of a customer-focused organisation is to keep good records of everything installed.  Often, techs go into a facility and there is no record to document what access system was originally installed and how. This creates a tremendous amount of work that can be easily avoided for future upgrades. Good installation records can make staff more efficient by speeding up processes and reducing manpower costs, and the customer can benefit from a portion of the savings passed along to them. 4. Training on new access control techniques After-sales training is as important in the smaller or medium sized project as it is in an enterprise installation. Beyond the training itself, it provides an opportunity for the customer to discuss with the integrator any issues that may be of concern regarding the installation, the product or anything else going forward. Maintaining up to date training on products is equally important for the vendor and helps provide better customer service. New access control technologies – including those that are also backwards compatible – require new techniques to ensure they are properly implemented and utilised to their fullest potential. In past years, training sessions consisted of an agenda of items that manufacturers wanted to convey to a group about the latest products. Along with the benefits derived from gaining information on new features, implementation and installation tips, trained staff often have heightened confidence in their ability to solve a customer problem or be more proficient in installing an access control system and make fewer costly mistakes. When you carefully observe and evaluate these four indicators, you will be able to see clearly whether the vendor’s customer service is a goal or an actual practice.

Why workplace training is essential for business success
Why workplace training is essential for business success

Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships, both large and small, face unique challenges in running their companies, and while there is no magic formula for success, dealerships that invest in training for their staff typically do better than those who don’t.  In fact, good training is a best practice that applies across a broad range of industries and markets, but it is particularly important in technology driven industries that deploy complex solutions such as access control systems, explains Robert Laughlin – President of Galaxy Control Systems. From a professional security dealer’s perspective, the benefits of training can be grouped into three basic categories: immediate, interim and long-range. The immediate benefit is that employees are exposed to new information and techniques that they can apply in practical situations to expedite projects with higher precision. Making employees more efficient can also help to stimulate better work ethic and in the interim, stimulate their desire to learn more. Over the long term, these benefits are synergistic with the potential to generate more productive customer relationships and create higher employee morale, which can effectively enhance a dealer's overall business. In addition to improving a dealers overall technical proficiency, participating in training programs that provide certification can further distinguish one access control dealer from another. Certified dealers also typically have access to tools and support programs provided by manufacturers that can increase efficiency and profitability. Of these support mechanisms, a good training program perhaps provides the most value as it will keep a dealer’s sales and technical personnel up to date on the latest trends and technologies. This information will help ensure that participating dealers’ customers benefit from the best possible access control solutions available. And that’s good for present and future business. Unfortunately, typical training programs offered by manufacturers usually entail the blatant promotion of a product portfolio or new product introduction, along with some sales tips and installation guidelines. Fortunately, there are more advanced training programs available that dive deeper into real world installation issues culled directly from technicians and customers in the field. This practical approach to training typically addresses the most common challenges faced when designing and installing access control systems, and provide field proven solutions that all but guarantee positive outcomes. Sharing experiences with peers at such training sessions is also a great way to expand one’s knowledge base by addressing issues they may not have previously conceived or encountered. Access control dealers can improve their capabilities and improve business by taking advantage of manufacturer sponsored training From a manufacturer’s perspective, well-conceived and executed training programs also help to generate new sales and satisfied customers, which provide a measureable return on investment. As a result, manufacturers like Galaxy Systems offer regularly scheduled training sessions at our headquarters facility that may range from a single day to a full week. Live training is also often taken on the road either directly to a dealership or to a regional location where various groups can participate. On-site customised courses for end users may also be offered by the manufacturer in conjunction with the authorised reseller. Nothing beats hands-on live training programs with real software and products, which is usually conducted by the same highly skilled individuals who handle technical calls from dealers and integrators. However, there are instances where a dealer’s technicians can’t break away, and on-line training programs and webinars provide access to valuable information at virtually any time or day of the week. So there are different options available to meet demanding schedules. The bottom line is that access control dealers can improve their capabilities and enhance business by taking advantage of manufacturer sponsored training. It’s just a matter of selecting the best training programs available to avoid wasting the time and effort of your technicians. Dealers can start by visiting the websites of various access control manufacturers to evaluate their training programs. It’s the first step in the right direction.

Show all

News mentions

How technology contributes to better healthcare facility security
How technology contributes to better healthcare facility security

Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.

Opportunities for security integrators in the healthcare vertical
Opportunities for security integrators in the healthcare vertical

The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.”  Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.

Galaxy Control Systems promotes Rick Caruthers as the new President from his earlier role as a Vice President
Galaxy Control Systems promotes Rick Caruthers as the new President from his earlier role as a Vice President

The Board of Directors of Digital Systems Corporation, the parent company of Galaxy Control Systems, a provider of integrated access control and security solutions, announces the appointment of Rick Caruthers to the position of President at Galaxy Control Systems. Effective immediately, this appointment reflects the company’s long-term planning and succession strategies. “Rick has essentially been working in the capacity as president of Galaxy Control Systems for the past several years, and with this appointment will be able to execute his vision and goals for the company,” said Robert Laughlin, Chairman of Digital Systems Corporation. Extensive experience “After 17 years of proven service and dedication to Galaxy Control Systems, we are most confident that Rick is the person best suited to be at the helm of this organisation moving forward.” Mr. Caruthers’ extensive experience and proven track record in the professional security industry spans over 28 years, where his career was initiated on the integration side of the business then migrated into the manufacturing space. I am extremely honoured with the Board’s decision to entrust me with the continued expansion and growth of Galaxy Control Systems" Over 17 years to date, Mr. Caruthers has risen through the ranks in positions ranging from Regional Sales Manager, Government Sales Director, Vice President of Sales, Executive Vice President, to his current role as President of Galaxy Control Systems. “I am extremely honoured with the Board’s decision to entrust me with the continued expansion and growth of Galaxy Control Systems,” said Rick Caruthers, President, Galaxy Control Systems. Exceptional customer service “There are so many exciting opportunities that lie ahead for Galaxy as we continue to evolve and supplement our portfolio of on-premise based and cloud access control solutions, and expand internationally. And we will maintain our focus on the core values that have propelled Galaxy Control Systems over the years, including exceptional customer service and outstanding quality hardware and software offerings that will remain designed, developed and manufactured in-house in the USA.” The Galaxy Control Systems portfolio is centered on the company’s powerful System Galaxy v11.02 and Cloud Concierge access control platforms, which accommodate the latest reader technologies and technology trends, as well as holistic VMS integration. The versatile offering provides resellers and users with the unique ability to implement the access control solution that best fits their specific needs and budget.

Galaxy Control Systems to demonstrate new enhancements for System Galaxy v10.5.6 at ISC West 2018
Galaxy Control Systems to demonstrate new enhancements for System Galaxy v10.5.6 at ISC West 2018

Galaxy Control Systems, global provider of integrated access control and security solutions, is demonstrating the latest enhancements and integrations for their flagship access control system, System Galaxy, here at ISC West 2018 (booth #5089). New enhancements to System Galaxy v10.5.6 include integrations with LENSEC’s Perspective VMS and Launchpoint App, Invixium biometric readers, and OpenEye’s Apex VMS solutions. The additions of new resident and cloud-based VMS capabilities, enhanced remote capabilities, and advanced biometric authentication solutions further positions System Galaxy as a turnkey solution for centralised physical security management and control applications. These upgrades help ensure that System Galaxy delivers the most comprehensive functionality and compatibility for the most demanding physical security applications" “In addition to continually expanding the performance and functionality of System Galaxy, we work very closely with new and existing technology leaders to integrate the latest physical security solutions,” said Robert Laughlin, President, Galaxy Control Systems. “These upgrades help ensure that System Galaxy delivers the most comprehensive functionality and compatibility for the most demanding physical security applications.” System Galaxy access control system System Galaxy is completely scalable, making it ideal for single or multi-site facilities, remote sites, campus settings, and multi-national organisations System Galaxy is a comprehensive enterprise-level access control and physical security management solution that allows deployment of any combination of access control, alarm/event monitoring, intrusion detection, surveillance, elevator control, identification and credential management, photo imaging and badging, time and attendance, and visitor management along with detailed metrics and reporting. System Galaxy is completely scalable, making it ideal for single or multi-site facilities, remote sites, campus settings, and multi-national organisations, and supports all legacy Galaxy hardware and infrastructure. The latest release of System Galaxy includes integrations with: LENSEC’s Perspective VMS and Launchpoint App, enabling users to view live or recorded video from virtually anywhere via web browser or App; Invixium’s new TITAN multimodal, multifunction biometrics solution, and SENSE, MYCRO, MERGE, and TOUCH series biometric readers; and Open Eye’s cloud-managed Apex VMS solution. Software integrations System Galaxy maintains the highest levels of certification to meet U.S. government requirements Additional recent integrations include: updated support of OnSSI’s Ocularis VMS; ASSA ABLOY’s DSR IP-Enabled Reader which integrate with ASSA ABLOY’s Wi-Fi PoE Access Control Locking Solutions; plus updates for readers from SALTO Systems and Allegion, and Allegion’s NDE/LE lock sets. System Galaxy maintains the highest levels of certification to meet U.S. government requirements including compliance with the United States Department of Defense (DoD) Risk Management Framework (RMF). All Galaxy products and software are developed and made in the USA.

System Galaxy Access Control demonstrates improved key integrations and administration functions at ASIS 2017
System Galaxy Access Control demonstrates improved key integrations and administration functions at ASIS 2017

Galaxy Control Systems, a provider of integrated access control and security solutions, is demonstrating the latest updates and integration support for their flagship access control system, System Galaxy (booth #2241) at ASIS 2017. Additional features for System Galaxy v10.5.1 now include updated support for OnSSI, ASSA ABLOY, Salto Systems and Allegion products, as well as enhancements to reports and security group import functions. “Staying current with our integration partners is critical in order to support our customers with a truly integrated access control solution,” said Robert Laughlin, President, Galaxy Control Systems. “These most recent upgrades help ensure that System Galaxy delivers the most comprehensive and up-to-date access control and management functionality that continues to drive the success and acceptance of our platform.” System Galaxy partner upgrades include: OnSSI Ocularis VMS – Updated support of Ocularis SDK to v5.3.0.863 now ensures integration and availability of the latest features and functions. ASSA ABLOY DSR IP-Enabled Reader – Readers can quickly and efficiently synchronise data with System Galaxy. The reader integrates with ASSA ABLOY’ new Intelligent WiFi PoE Access Control Locking Solutions. SALTO Readers – Office mode feature added, requiring a user-level credential for entry. User can push the interior handle down or present a credential to enable an unlocked or lock state, eliminating the need for a credential to open the door. ALLEGION NDE Reader – Support added for magnetic sensors. With this addition, Galaxy integrates with Allegion’s NDE/LE lock sets. Meeting U.S. government requirements Additionally, authorised card reports for readers now include cards that have access via personalised doors and exclude cardholders and cards that are disabled, not yet activated or expired. System Galaxy maintains the highest levels of certification to meet U.S. government requirements including compliance with the United States Department of Defense (DoD) Risk Management Framework (RMF). All Galaxy products and software are developed and made in the USA. 

Galaxy Control Systems introduces System Galaxy v10.5 at ISC West 2017
Galaxy Control Systems introduces System Galaxy v10.5 at ISC West 2017

The System Galaxy software supports all legacy hardware and infrastructure Galaxy Control Systems, a provider of integrated access control and security solutions, introduced System Galaxy v10.5 at ISC West 2017. New features include integration capability with KONE elevator products and ASSA ABLOY DSR IP-enabled locks as well as updated support for OnSSI’s Ocularis SDK. “Collaboration with these and other manufacturers has emerged as a significant way for Galaxy to provide customers with a more robust and fully integrated access control solution,” said Robert Laughlin, President, Galaxy Control Systems. “We’re excited about leveraging these new opportunities.” Key features System Galaxy features include: KONE Elevator: The integration of System Galaxy with KONE Elevator control systems increases security while improving people flow. Galaxy Control Systems provides the card readers, access control computer and network infrastructure while KONE supplies the elevator group controllers and control panel as well as space for installing card readers. A TCP/IP interface makes installation easy. ASSA ABLOY DSR IP-Enabled Locks: Utilising a Java-based web service called Door Service Router (DSR), locks can quickly and efficiently communicate with System Galaxy for real-time monitoring without the need for additional door controllers. OnSSI Ocularis VMS: Updated support now ensures integration and availability of the latest features and functions. Robust capabilities and unlimited scalability The new integrations and updated support complement the robust capabilities and user features, unlimited scalability and ease of installation that make System Galaxy software the most comprehensive access control and management platform on the market. Galaxy Control Systems’ System Galaxy access control software provides traditional thick client, mobile device applications, and web-based thin client user interfaces on a SQL-based, virtual/host or client/server architecture. The software enables active directory support for real-time identity management, individualised identity-based door access, and audit reports for each screen view or credential holder. Additionally, the software supports all legacy Galaxy hardware and infrastructure, ensuring customers continue to benefit from their investment in legacy solutions.

Joint Commission accreditation impacts healthcare security upgrades
Joint Commission accreditation impacts healthcare security upgrades

 Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21,000 health care organisations and programmes in the United States. Joint Commission accreditation and certification is recognised nationwide as a symbol of quality that reflects an organisation’s commitment to meeting certain performance standards. The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders, by evaluating health care organisations and inspiring them to excel in providing safe and effective care of the highest quality and value. Security systems evaluation But how are security and safety systems a factor in accreditation and certification by The Joint Commission? The Joint Commission does not require an organisation to have a specific type of security system, says John D. Maurer, Engineer, Department of Engineering, Certified Yellow Belt, The Joint Commission. Rather, an organisation is permitted to determine the types of security systems it uses based on the risks it identifies specific to its operations. Once an organisation identifies security risks that may impact operations, the processes put in place to address those risks are evaluated during a Joint Commission survey, including evaluation of the use and functionality of the types of security systems in place. An organisation is permitted to determine the types of security systems it uses based on therisks it identifies specific to itsoperations Based on the processes that are put in place, this evaluation will take into account the actions taken during a security incident in addition to the proper use and maintenance of the equipment specific to the setting and circumstances in which the security measures are implemented, says Maurer. “Organisations should properly evaluate any equipment to determine how well it will serve its needs,” he says. It is recommended that the selection be conducted through a multidisciplinary team, including input from key stakeholders. Included with the selection process, organisations should review the operational needs of the security systems and related equipment so staff can use it properly and effectively. Additionally, the maintenance requirements should be reviewed in order to keep it functioning as it is intended. Of course, both the aforementioned points would involve training, and this could also be reviewed during a survey event to help determine the overall effectiveness of the system in place, according to Maurer. Advantages of ‘Security by Committee’ After participating in a wide range of healthcare security deployments, security equipment manufacturers find that many of the most successful are led by healthcare executives that make use of a broad “security by committee” planning process. “Advisory committees that include representatives of all staff levels, and sometimes interested community volunteers, bring a unique blend of opinions to guide the planning and decision processes,” says Robert Laughlin, President, Galaxy Control Systems. “Over the years of working in this field, we have often heard legitimate staff complaints about systems that were installed without knowing how they would affect the staff,” he adds. “Because staff adoption is key to a successful installation, hearing a range of suggestions helps make these deployments successful." The most critical areas are those in which the wealth of expensive medical equipment and pharmaceutical materials are stored Laughlin says a key challenge of healthcare security is to provide the right balance between, on the one hand, an open, friendly and welcoming facility that supports families and individuals during some of the most difficult situations of their lives; and, on the other hand, protecting the privacy and security of vulnerable people, expensive equipment, and valuable drugs and materials. Round-the-clock operation, a large and complex workforce, and a constant flow of unfamiliar visitors only compound the security challenge. Higher level of access control in areas of critical risk Healthcare campuses are vulnerable to a variety of security risks, but the most critical areas are those in which the wealth of expensive medical equipment and pharmaceutical materials are stored, says Scott Sieracki, CEO, Viscount Systems. These areas need to be heavily protected from theft and contamination 24 hours per day, 7 days per week, which can be exhaustive, expensive and hard to manage if any of these items are in transit. "We are also experiencing higher demand for more and moreintegrations between securitysystems and facilities management systems" Moreover, only employees with the highest security clearance and proper credentials are allowed access to these materials, and clearances can be changed at a moment’s notice within the facility’s main database. However, without real-time communication among card readers, access cards and Active Directory, these minute-to-minute decisions can open up opportunities for potential identity fraud and physical and/or logical security breaches, thus putting vulnerable patients, sensitive data and priceless equipment at risk. Some specific areas of a hospital are especially vulnerable. “We are seeing higher levels of access control deployed in areas such as maternity and psychiatric wards, ICUs, operating rooms and onsite pharmacies that dispense controlled substances,” says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. “We are also experiencing higher demand for more and more integrations between security systems and facilities management systems.” The combinations of the abilities of these devices mean, for example, that bracelets can be used to track physical locations of patients who may be mentally incapacitated or perhaps have Alzheimer’s disease, to make sure they are not in harm’s way. “We even have technology that can alert a nurse when a patient falls out of his or her bed, using the same principles used in infant abduction/infant tracking devices,” says Stankevich. “This technology is even used to track expensive medical equipment in real time in order to reduce theft, and also to track equipment that is in use or is possibly misplaced.” Catch up on our Security in Healthcare series here Save

Galaxy displays access control solutions at ASIS 2016 exhibit
Galaxy displays access control solutions at ASIS 2016 exhibit

Galaxy's access control solution improves organisational security and operational efficiency Galaxy Control Systems’ exhibit at ASIS 2016 (booth # 2527) is proving why they are a leading provider of integrated access control and security solutions. From mobile apps that provide users with greater control to advanced port filtering that helps busy networks manage the growing surge of traffic; and from traditional thick client to web-based thin client operation, their System Galaxy access control solution is designed to improve both organisational security and operational efficiency, benefiting organizations and users alike.“System Galaxy, with its advanced capabilities, enables true control and management for improved security and efficiencies across the organisation,” said Robert Laughlin, President, Galaxy Control Systems. “These strengths make it a key foundation in enabling our customers to support their security objectives.”Display highlights include:The DoorPoint mobile app provides authorised security personnel with the ability to manage a facility’s doors to enhance security. Through the app, users can remotely lock, unlock and pulse doors, view door status and view activity report data from the System Galaxy access control software. In an emergency situation, the app also allows security personnel to activate and reset crisis modes if necessary and to view current crisis mode status. Users can search for cardholders by name, department or other data fields, further enhancing the efficiency and effectiveness of their access control software PersonPoint mobile app allows authorised users to activate and de-activate cardholders remotely, with the added benefit of viewing e-mail activity reports provided by System Galaxy. Users can search for cardholders by name, department or other data fields, further enhancing the efficiency and effectiveness of their access control software.Both DoorPoint and PersonPoint apps are available for download at Android and Apple stores.The new Advanced Port Filtering feature will also be featured. Because there is a media access control address (also known as a MAC address) for every wi-fi-enabled device on the network, the advent of the Internet of Things and the rapid growth of connected devices is causing a tremendous surge to the amount of traffic that is seen by the network. The new Advanced Port Filtering combats this problem, ensuring that not all devices are continuously monitored by the security network.In addition to seeing System Galaxy software in action and learning more about the company’s advanced technologies and access control solutions, visitors to the booth can take their photo alongside Galaxy’s “I’m One” photo wall. Access Control Software Galaxy Control Systems’ System Galaxy Access Control Software provides traditional thick client, mobile device applications, and web-based thin client user interfaces on a SQL-based, virtual/host or client/server architecture. The software enables active directory support for real-time identity management, individualised identity-based door access, and audit reports for each screen view or credential holder. Further enhancing System Galaxy are support for third-party video integration, PoE and wireless lock support, and intelligent elevator control. Additionally, the software supports all legacy Galaxy hardware and infrastructure, ensuring customers continue to benefit from their investment in legacy solutions. Save

Healthcare end users seek more integration of disparate security systems
Healthcare end users seek more integration of disparate security systems

 Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin Wine, Vice President of Marketing, Verint, says healthcare users are looking for systems that are: Open and scalable, and can easily integrate with other systems and sensors; Intuitive to use and manage to help keep the focus on better situation management; Comprehensive and automated to help operators align with standard operating procedures and reporting structures; Intelligence-driven to correlate data with other sources of security and operational data for more accurate and comprehensive risk profile. Enhancing security efforts by the right means Ensuring the safety of patients, staff and visitors is no easy task, and while it is challenging for security officials to predict, prepare for or prevent every incident from occurring on the premises, robust strategies and programmes help these facilities achieve a higher level of situational awareness, says Wine. By improving security efforts with the right technology, protocols and procedures, hospitals are better equipped to ensure safety and security while driving new levels of business intelligence to ensure long-term viability in today’s market. By improving security effortswith the right technology,protocols and procedures,hospitals are better equippedto ensure security Healthcare facilities today seek holistic solutions that address a wide variety of security and business needs, says Wine. Video surveillance is a force multiplier, helping mitigate risks. Video and other security sensors and communication systems (i.e., access control, video analytics, dispatch, nurse call, alarms, RFID, et.al.) also help enable users to realise new levels of prevention – earlier detection is vital to prevent incidents. Situational awareness solutions But all of these valuable data points cannot be fully realised without correlating information from various solutions together, says Wine. Situational awareness solutions help hospitals gain a full picture of a security situation, improve communication among stakeholders, and streamline reporting to allow officials to effectively manage a situation on a more proactive basis. All of these needs are driving healthcare organisations to seek out solutions and programmes that can provide value beyond feature sets, and can help drive new levels of security and business intelligence. Wine contends that, by integrating data from various sources into a single command-and-control platform, true situational awareness can be achieved. This comprehensive approach helps enable faster and more effective response to support a high level of safety to employees, patients, visitors and the overall community. “Situational awareness solutions automatically combine critical data points from multiple systems and sensors, allowing operators to understand what is happening in real-time through one intuitive interface,” says Wine. “We like to think of this approach as a single pane of glass – helping enable officials to quickly and effectively identify risks, manage situations and thoroughly investigate. Bringing all data points into one platform helps allow for early detection of threats, which can also be used to initiate better planning, timely response and better decision-making.“ The healthcare vertical is moving toward a complete solution that integrates nearly any system using a facility’s network Integration: access control and beyond Access control is an important aspect of integration in healthcare settings. Hospitals must support affiliated doctors who need to carry multiple badges for all the locations they visit, for example. Over time, administrators may want to integrate access control with visitor management, or add video surveillance and other technologies. This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities. In contrast, the latest physical access control system (PACS) system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them. “Today’s solutions enable healthcare organisations to achieve a versatile PACS that protects everything from hospital doors and storage areas to the cloud and desktops,” says Sheila Loy, Director Healthcare Strategies, North America, HID Global. “With proper planning, healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they seamlessly add new capabilities in the future,” she says. The result is a fully interoperable, multi-layered and highly adaptable security solution that spans the organisation’s networks, systems and facilities, and has room to grow, evolve and improve over time. Healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they add new capabilities in the future The latest PACS architectures support new applications such as infant protection systems, and biometrics in sensitive areas such as laboratories and research centres. There are also opportunities to “do more with the card,” says Loy. Hospitals can offer physicians, nurses and staff one card for accessing the emergency room and pharmacy, and for visual ID verification, time-and-attendance logging, payroll transactions, and cafeteria purchases. This simplifies life for cardholders while centralising and streamlining management. To protect information, access control systems now also deliver the ability to “tap” in and out of computer applications, eliminating complex passwords and password fatigue where it can require 20 or more logins each day in order to access the hospital’s enterprise data and services. Instead, the user simply taps his or her ID card to a laptop, tablet, phone or other NFC-enabled devices to access network resources, cloud apps and web-based services. It’s easier and more secure than passwords, and faster and more seamless and convenient than dedicated hardware one-time passwords and display cards or other physical devices. Plus, there is the added benefit of using the same card that opens doors to also access data and cloud-based applications. Integration with other systems A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. “At Tyco Security Products, we are offering this kind of holistic approach by integrating our C-CURE 9000 access control platform with video, intrusion, duress notification and infant abduction technologies together and adding license plate recognition, biometric identity management, NFC and BLE, visitor management and home automation interfaces and capabilities,” he says. “All of these systems coming through a single pane-of-glass view give operators more to see and react to. “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. “I think we’ll also see more edge controllers and further development of mobile technology capabilities,” he adds. We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities Complete security integration Infant abduction systems like Elpas and Hugs can now be connected to access control systems, says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. This is significant, and the integration among these systems will no doubt grow, as this makes infant abduction very difficult. A real world example is if an infant is taken without authorisation onto an elevator. If this occurs, an alarm can be sounded, and a hospital-wide alert can be dispatched over radios and over the facility’s public address (PA) system in seconds. “This growing level of automation is one of the things I expect will continue to develop in the future,” says Stankevich. “These systems integrated into the Lynx duress/notification system allow for a wide range of notification options.” "These end users need a way to grant permissions in a way that saves time and energy on manual input, and makes changing permissions easy and efficient" Also, facilities require increased integration with today’s video surveillance and video management systems from their access control solutions, and there’s an additional push toward integrating human resources and other event management and directory software tools as well, adds Stankevich. “These end users need a way to grant permissions in a way that not only saves time and energy on manual input, but also makes changing permissions easy and efficient,” he says. “This is especially paramount for large-scale enterprise organisations, such as a hospital campus, that can span multiple geographic locations.” Access control can be integrated with other systems, too. “The continuing evolution of network technologies and our interconnected world has transformed access control systems from standalone solutions into a vital part of a more robust, highly integrated system that allows users to utilise a single control platform to monitor the status of a facility,” says Robert Laughlin, President, Galaxy Control Systems. “We expect that advanced access control solutions will be integrated with patient information, identity management, video surveillance, medicine storage and distribution, parking and other systems, all of which provide information and intelligence in the form of data that contributes to the emerging model of predictive analytics. The actionable intelligence that will result from this analysis will help move security from a reactive to a more proactive function.” Wider adoption of electronic access control Tighter integration between physical access control systems with specific hospital-based systems such as mother and baby alarms, asset location technologies and robotic vehicle systems are likely advances that we will see adopted more often, agrees Dave Ella, Vice President of Product Marketing, AMAG Technology.  “We are going to see wider adoption of electronic access control onto almost every door in healthcare facilities through the adoption of a new generation of locks that are wire-free and Wi-Fi-based, but that form part of the overall access control system,” says Ella of AMAG. AMAG also sees that frictionless access – in which no physical contact needs to be made with a card or card reader – will assist in the control of healthcare-associated infections. Read Part 11 of our Security in Healthcare series here Save Save Save

Physical security systems enable compliance to HIPAA and other privacy laws
Physical security systems enable compliance to HIPAA and other privacy laws

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions.   The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Internationally, there is a patchwork of health privacy laws around the world, from Argentina to Uruguay, including laws throughout Europe, Central Asia and Australia.   Role of physical security in safeguarding data  Physical security systems can play a big role in helping to keep patient information safe and private, as required by various laws. For example, AMAG has developed new capabilities within its Symmetry family of products that allow healthcare institutes to demonstrate their compliance with HIPAA. Compliance reporting is a key area and has been a focus for AMAG, says Dave Ella, Vice President of Product Marketing, AMAG Technology.  Hospitals and healthcare facilities install AMAG’s Symmetry access control system and Symmetry CompleteView Video Management to manage and control access and provide HIPAA compliance throughout their buildings and campuses. Security plan policies and procedures need to protect a healthcare facility, says Ella. Automatically reviewing access permissions for employees, contractors and visitors on a regular basis is a key aspect of the plan, and AMAG’s Symmetry CONNECT product is designed for that purpose. Also, capabilities within the system make documentation of adds and changes to the security system more straightforward. They include the ability to add drawings, documents and notes to any device within the system.   Demanding regulatory environment Legislation like HIPAA, which establishes U.S. standards for privacy and security, impacts hospital access control policies and procedures, says Sheila Loy, Director Healthcare Strategies, North America, HID Global. In fact, HIPAA is just one element in a demanding regulatory environment. The need to comply is complicated in hospitals by security threats in an environment with high traffic volumes and complex staffing requirements, Loy adds. For instance, in California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines.  Today’s access controlplatforms enable hospitals toimprove risk management andcomply with new legislationor regulatory requirements Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare and Medicaid Services (CMS) that, at times, conflict with state rules and result in fines. Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes; and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery. Today’s access control platforms enable hospitals to improve risk management and comply with new legislation or regulatory requirements. For instance, HIPAA imposes strict requirements for accessing medical records, which may necessitate the use of a smart card to enter secure areas or to access IT networks that store patient information.   HID Global offers comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. The company’s solutions: provide secure access to healthcare facilities and supplies; enable hospitals to identify and manage hospital visitors; provide electronic audit trails to protect patients and staff; ensure HIPAA compliance for patient records; and enable organisations to leverage existing access control cards for additional services to offer convenience and create operational efficiencies.  Need for versatile authentication platform  Health data is at least as valuable as financial data in the online banking industry, where a layered system approach is used to ensure that appropriate risk mitigation levels can be applied, says Loy. Even though patients don’t access healthcare information as frequently as do online banking customers, and aren’t protected by the same regulatory compliance requirements, they can benefit from the same multi-layered authentication mechanisms, both inside and outside the hospital. Healthcare organisations need a versatile authentication platform with real-time threat detection capabilities in order to effectively implement the critical five layers of security including user authentication, device authentication, transaction authentication with pattern-based intelligence, browser protection, and application security, says Loy.     With video surveillance, cameras must be positioned in such a way that they don't violate HIPAA laws Access control systems can be used to help protect access to patient records and other controlled materials, adds Robert Laughlin, President, Galaxy Control Systems. By using higher-security credentials for access control readers, such as biometrics, medical facilities can increase their confidence levels that they are only providing access to authorised individuals and creating an audit trail for reporting or review. Galaxy access control systems can be integrated with a wide range of readers, including high security biometric readers.   Ensuring privacy with video surveillance  Video systems are also impacted by HIPAA in the United States and by similar privacy legislation around the world. When a physical security system is installed in a healthcare environment, patients’ privacy must be protected according to HIPAA’s specific rules, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. A patient’s PII – or personally identifiable information – must be protected. PII is any information that can be used to uniquely identify, contact or locate an individual, or that can be used with other sources to uniquely identify a person.   With video surveillance, cameras must be positioned in such a way that they don’t violate HIPAA laws, says Ouellette. If a camera is pointed to a computer screen or something else that contains a patient’s PII, there must be an option to draw a privacy window within the frame so that a patient’s sensitive information isn’t easily accessed or compromised.  HIPAA and similarrequirements can indirectlyimpact video systems inways not thought of beforethe advent of megapixel surveillance cameras Challenge of megapixel cameras  Furthermore, the use of megapixel cameras can increase the challenge. HIPAA and similar requirements can indirectly impact video systems in ways not thought of before the advent of megapixel surveillance cameras, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. On one hand, video surveillance systems are more effective than ever at protecting medical records storage and access to other confidential information.   On the other hand, it is now equally important to consider the field of view of a high-megapixel camera, says Whitney. A camera placed over a cashier may yield images with discernible credit card numbers of a screen within the field of view, of documents, or of the credit card itself. Medical records may similarly be picked up in detail by a high megapixel camera. Therefore, it is necessary to ensure that the integrator selected to install a video surveillance system understand the objective of each area of coverage, and what should not be included.   Integrated security systems aid faster compliance  Faced with a number of local, state and national regulatory guidelines, security directors within healthcare facilities must be able to improve hospital security and insulate the organisation from potential liability claims, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric. “That means implementing a surveillance system that allows multiagency cooperation and response,” he says. “Keeping all of this in mind, having a video surveillance system that integrates with the necessary emergency and fire alarm systems, access control and other systems can promote an institution’s compliance with regulatory agencies by providing proof that the organisation’s assets are safe and secured.”   Finally, there is the issue of access to video. In today’s regulation-focused market, healthcare organisations must strictly control who has access to video, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Servers and storage are typically easier to secure because these devices are traditionally deployed in controlled locations, sometimes on closed networks and often under the supervision of IT. Client access is more difficult to control – security personnel, management and even first responders need access to video, and their devices are typically unsecured. This can translate into a potential HIPAA violation, especially if data is access by unauthorised people.  Read Part 10 of our Security in Healthcare series here Save Save Save

Access control evolution allows multiple options for healthcare security
Access control evolution allows multiple options for healthcare security

Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week. In particular, integrated systems can allow officials to program various doors and locks to activate at various times and apply rules based on time of day, shift changes, etc. Sensitive materials, such as pharmaceuticals or surgical equipment, demand an entirely different set of access control standards, which means any solution implemented must be easy to use and scalable to fit growing needs. A Security Management System (SMS) can be used to integrate a facility’s access control technologies, digital video and alarm monitoring systems into a single, streamlined solution, says Mitchell Kane, President, Vanderbilt. “One advantage to this type of solution is scalability and flexibility, and its ability to serve multiple sites, which is common in this vertical market,” he says. Meeting each hospital’s unique challenges Every hospital setting has unique challenges. Consider Highlands-Clarksburg Hospital, a 150-bed behavioural psychiatric centre in Clarksburg, West Virginia. It houses patients in a wide range of circumstances, including forensic patients (deemed unfit to stand trial and/or non-restorable), dual-diagnosis substance abuse patients, children and adolescents, and intellectually challenged individuals. Both a card swipe and PIN are required to pass through any controlled doors, to call an elevator, or to cause the elevator to move between floors Because of the nature of the facility, it was determined that a two-step control process was needed to help ensure security and employee safety. Extra security measures were also needed to manage elevator usage, to ensure that high-risk patients are always escorted. To meet the requirement for a two-step security procedure on interior doors, a Galaxy access control system added an additional layer of protection requiring users to input a five-digit PIN code. The same approach was also applied to the elevators controls, taking advantage of the integration between the access control and patient tracking systems. Thus, both a card swipe and PIN are required to pass through any controlled doors, to call an elevator, or to cause the elevator to move between floors. Escorting a patient requires a card swipe, PIN, and the patient tracking reader, or an alarm sounds.In all, the integrator installed 208 readers, 24 power supplies and 20 Galaxy controllers to implement the facility access security system. Sensitive materials, such as pharmaceuticals or surgical equipment, demand an entirely different set of access control standards Securing access to narcotics One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, President, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. “One consequence of this approach is an increased security challenge to protect these distributed locations and the people that have access to them,” he says. “One solution is to combine the use of new wireless cabinet locks for the storage cabinets and carts with RFID panic devices for the staff. Both of these devices can be integrated into the facility access control systems so that the healthcare facility can monitor the operation and respond quickly to any incidents. “ Managing visitors in multiple scenarios A hospital chain in Orlando, Florida, uses STOPware’s PassagePoint visitor management system at 13 of their hospitals. While all of the hospitals use PassagePoint at the main reception desk to process visitors, each facilities uses PassagePoint a little differently. The large city hospitals use PassagePoint 24 hours a day at their reception desks to process visitors and control the number of visitors in patient rooms. The smaller hospitals use PassagePoint after hours to keep track of visitors in the hospital after regular visiting hours and also deploy Patrol Officers to check the patient units to confirm that visitors are still with the patients. A new system enhancement is placing self-service kiosks in the Emergency Department waiting areas. Loved ones are given instructions to self-register at the kiosk A current new system enhancement project for this hospital chain is placing self-service kiosks in the Emergency Department waiting areas. Loved ones who are authorised to visit Emergency Department patients are given instructions to self-register at the kiosk. A key component of the self-registration is the Emergency Department stretcher where the patient is being treated. Only one key family member is allowed to self-register to visitor and/or stay with the patient. The hospital chain is looking forward to adding Health Level-7 (HL-7) patient integration in order to maintain highly accurate patient room locations. Integrated access and identity management Another hospital used HID Global’s iCLASS SE platform, powered by Seos, to implement a major upgrade to a single, integrated access control and identity management system. The hospital is using the system to rebadge thousands of staff, contractors and volunteers, replacing magnetic stripe cards with more secure and versatile ID badges that can support numerous future access control applications. The upgrade was launched during a major corporate re-branding and expansion initiative, and was implemented in stages over a several-year period. To support this multi-phase project, HID Global provided the institutions with multiCLASS SE readers that simultaneously support magnetic stripe, Indala proximity and higher-security 13.56 MHz smart card technology. In the emergency room, 55 percent of nurses are assaulted in some way each year Another HID Global example highlights a non-physical security example. The hospital selected an integrated, government-certified solution from HID Global that empowers them to attach a digital certificate of identity authentication to a FIPS 140.2 certified credential, using IdenTrust as the Certificate Authority for each authorised prescriber. FIPS 140.2 is a U.S. government computer security standard used to accredit cryptographic modules. The HID Global credentials also include one-time password (OTP) functionality that allows EPCS (Electronic Prescriptions for Controlled Substances) authentication using an OTP, without the need of a desktop reader. With HID integration to Epic EHR (Electronic Health Records software), either the digital certificate or the OTP (with PIN) can be accepted within the EPCS module for two-factor authentication. This provides the convenience for the prescribing physician to choose the authentication mode that best fits his or her workflow in a given scenario. The integrated solution includes: ActivID Credential Management System (CMS), ActivID Authentication Server OMNIKEY reader/encoders and FIPS 140.2 contact credentials with an OTP generator and display window FARGO printers and Asure ID software to print customised credentials HID Professional Services for project management, installation, workflow analysis, training and support. Focus beyond patients to include staff too Healthcare security is often centred on the patient and keeping him or her safe, which is absolutely crucial. However, Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products, points out that the safety of hospital staff, particularly nurses, can be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Stankevich says one possible solution would be to use duress/emergency notification technology: staff could carry and wear a “panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. “With Tyco Security Products’ Elpas infant abduction technology and the Lynx duress and notification system, we can pinpoint the alarm down to a six-foot radius, to a specific bed, nurse or location in the facility,” says Stankevich. Read Part 9 of our Security in Healthcare series here

Galaxy Control Systems earns American Institute of Architects approval as CES provider for education courses
Galaxy Control Systems earns American Institute of Architects approval as CES provider for education courses

CES approval allows Galaxy to submit instructor-led courses, which will be featured on AIA’s online list  Galaxy Control Systems, a provider of integrated access control and security solutions, has announced that they have received approval from the American Institute of Architects (AIA) as a provider of education classes under the organisation’s Continuing Education System (CES). Additionally, AIA has also approved the first of Galaxy’s courses, which is available online now (www.aia.org/education).   Access control insight for architects “We are thrilled to receive approval from AIA to offer educational courses that will provide their members with valuable insight into access control technologies and best practices that will help them grow in their profession,” said Robert Laughlin, President, Galaxy Control Systems. “We look forward to developing and delivering courses on a wide range of helpful topics for this important community.” AIA developed its CES to provide architects with access to the continuing education offerings they require to maintain competence, prepare for the future, fulfil requirements for membership and renew state licensure. Approved courses are listed on the AIA website, allowing architects to easily find online offerings that are most relevant and helpful for advancing their careers. Instructor-led courses CES approval allows Galaxy to submit instructor-led courses, which will be featured on AIA’s online list of approved courses that provide AEs with continuing education (CE) credits. Galaxy’s first approved offering is titled “Access 101 – The Basics,” and future courses will range from access control basics to more advanced, in-depth topics.  This presentation will also be given during all remaining Galaxy USA Roadshows. These free technical events will showcase Galaxy Control Systems’ newest services and applications in a full day workshop of product demonstrations and interactive discussions.

Healthcare security systems: Funding remains biggest obstacle to installation
Healthcare security systems: Funding remains biggest obstacle to installation

Part 5 of our Security in Healthcare series It’s difficult for hospital security directors to provide a quantified ROI in an updated security system Several forces are working in favour of greater adoption of hospital security and video surveillance technologies in the healthcare market. “Healthcare facilities and campuses are growing at a rapid rate to accommodate an aging population and the research and development of pharmacology and many different types of medical devices or technology”, says Steve Birkmeier, VP of Sales and Business Development, Arteco. “This boon to the industry also increases the risk of theft, trespassing, vandalism and even active shooter threats to these campuses, putting vulnerable patients and staff in harm’s way,” he says. “Since these characteristics are always in flux, healthcare customers are in the market for flexible solutions that can adapt and scale to the shape and size of individual campuses.” But what factors are standing in the way of greater implementation of video surveillance and security technology? The largest one is lack of funding. “These campuses are constantly under strict budgetary or compliance constraints,” says Birkmeier. “So they are also looking to expand at a low marginal cost without having to sacrifice security measures or forgo regulation.” Looking for ROI in physical security "As long as the security team isable to invest in sound access control,  visitor management andvideo  systems, they are in agood place" Customers investing in security often look for a return on investment (ROI). However, Dave Ella, Vice President of Product Marketing, AMAG Technology, says it’s always tricky for hospital security directors to provide a quantified ROI in an updated security system, and that reality holds back investment. However, Health Insurance Portability and Accountability Act (HIPAA) regulations provide leverage for security managers as there is a benchmark they need to meet or exceed. This can help to justify investment in physical security, Ella says. “Hospital security teams understand the benefits of new technologies,” says Ella. “Financial restrictions hold back investment in some security measures that could be implemented. As long as the security team is able to invest in sound access control, visitor management and video systems, they are in a good place.” Factors obstructing new security installation Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, President, Galaxy Control Systems. “Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. “The difference is that facilities can now be upgraded by replacing only part of a system, rather than the entire system. And, similar developments have resulted in key system functionality being executed in software rather than hardware, which also provides upgrade pathways that do not require wholesale replacement of system elements”, says Laughlin. “Together, these factors have drastically improved the cost and functionality of systems for end users.” Training and education of security practitioners is required to bring awareness of the new surveillance technologies that are available Inertia - a hindrance to adopting healthcare security “Inertia is another challenge. “Do nothing” is the biggest factor in slowing the adoption of new technologies,” says Jeff Whitney, Arecont Vision’s Vice President of Marketing. ”Adoption of technologies in healthcare is frequently driven by opportunity such as a new building or facility, changes in legislation or regulation, or external factors such as incidents, crime, or lawsuit,” he says. Megapixel camera technology, which is Arecont Vision’s focus, has the ability to reduce costs of surveillance while dramatically increasing video quality and coverage, and thus is often selected as part of the solution. “Training and education of security practitioners continues to be required to bring awareness of the new surveillance technologies that are available, what benefits they bring, and how to design and implement such systems in place of legacy analogue surveillance deployments,” says Whitney. Proactive use of video management systems Some healthcare facilities are not harnessing the potential power of their newly improved video management systems, says Ella of AMAG. “The systems need to be made more proactive. Viewing areas and recoding video is not enough. Video is capable of being part of an integrated prevention tool to respond quickly to developing incidents. “ “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available” It’s important for the video system to be integrated directly to the access control and alarm management system, says Ella. Whenever an alarm or event occurs, the security officer must see exactly what has happened within seconds and respond accordingly. By linking – or tagging – video to access control events and alarms, and by building on that with automated triggers and workflows, AMAG customers are able to make their video systems much more responsive and proactive to security incidents. To meet the needs of healthcare facilities and other business sectors with similar issues, AMAG has integrated the Symmetry system to more than 15 different video management systems. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding.” Read Part 6 of our Security in Healthcare series here

Challenges and opportunities in analogue-to-IP video system transition in healthcare facilities
Challenges and opportunities in analogue-to-IP video system transition in healthcare facilities

 Part 2 of our Security in Healthcare series The future is digital, and analogue systems are a thing of the past – or are they? The fact is, in the healthcare vertical at least, we may still have a way to go before the full potential of IP-based systems is realised. Obstacles include a lack of funding and the challenge of sharing IP bandwidth with other healthcare technologies. Bandwidth competition While many hospitals have invested significantly in IP systems, one challenge is bandwidth: Security and video systems often have to compete for bandwidth with other now-IT-driven systems in healthcare facilities, such medical records systems, x-ray systems and magnetic resonance imaging (MRI) systems. Security departments may not be the highest priority when allotting bandwidth, given they are competing with medical devices and systems that generate revenue. As a video company that serves the healthcare vertical, Pelco by Schneider Electric sees progress on the transition from analogue to IP video surveillance devices, but there are still a large number of healthcare facilities that do not have the necessary funds to convert completely to an IP-heavy infrastructure. A big advantage of these facilities making the transition to IP is that users can access real-time video at any time from any computer, anywhere, says Kyle Cusson, Business Development Manager, Healthcare, Pelco. “This is immensely important for information security requirements and disaster recovery,” he says. With analogue, the information gathered is physically tethered to the camera and DVR. However, there are hybrid solutions – such as encoders that convert analogue to IP – that exist and allow facilities to capitalise on existing investments for the time being. IP to gain ground soon “Over the next five years, we will definitely see a massive shift to IP solutions because they are becoming more cost-effective to deploy and are delivering superior video quality and flexibility to users,” says Cusson.  The transition isn’t always all-or-nothing. It is not uncommon for healthcare providers to depend upon outdated, analogue-based video systems with limited capabilities while providing surveillance of a large facility, says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “The transition happens after a major incident or awareness of new risks and challenges that the existing systems cannot address,” he adds. “That’s when surveillance technology is often moved from inadequate analogue systems to IP megapixel surveillance cameras.” A big advantage of healthcare facilities making the transition to IP is easy access ofreal-time video any time from any computer Arecont Vision SurroundVideo Arecont Vision, a provider of video to the healthcare market, delivers megapixel surveillance cameras that reduce the cost of surveillance while increasing video coverage, improving aesthetics, and delivering high-definition (HD) video. Customers are able to continue to get value from their existing analogue systems in some cases, while supplementing them with modern digital network-based video surveillance systems until existing systems reach their end of life, Whitney says. The network-based system can then replace the legacy analogue system fully. Whitney notes that Arecont Vision’s SurroundVideo multi-sensor megapixel cameras replace multiple PTZs and fixed cameras while providing improved video coverage at a lower cost, and the system is less intrusive than the analogue systems they replace. “In new projects, most customers already have chosen to deploy IP network surveillance camera technology and gain all of the benefits and improved security immediately,” says Whitney. Cost-to-benefit analysis  “We have seen the transition from analogue to IP become most complete in regards to display, with digital monitors almost completely replacing analogue monitors,” says Jumbi Edulbehram, Regional President, Americas, Oncam, which provides a broad range of 360-degree fisheye cameras and integration software to the healthcare vertical. “That’s where it really ends.” He says many hospitals and healthcare facilities have found the idea of an IP transition both cost-prohibitive and difficult to deploy. There has been some investment in relatively inexpensive decoders, which convert analogue to IP. “Cost is definitely a factor in the resistance we’re seeing in these facilities, but as the technology is developed further, that will help drive the cost down,” says Edulbehram. New adoptions take time, and there will be a long period when different technologies co-exist, says Robert Laughlin, President, Galaxy Control Systems, which provides access control systems ranging from single-door systems up to multi-site enterprise-level integrated systems. For this reason, it will continue to be essential that new software and systems are backwards-compatible with the existing equipment in place within organisations. Users need to be able to upgrade in a way that fits with both their security needs and their budgetary limitations. Access control systems such as Galaxy’s will continue to be integrated with a range of systems, and there is no one-size-fits-all solution to every access need, Laughlin says. New adoptions take time, and there will be a long period when differenttechnologies co-exist in the healthcare market Networked physical access control system Many healthcare institutions also want a path to IP-based physical access control system (PACS) solutions that are easier to operate, and that simplify expansion, customisation and integration with other solutions that can share the same network, says Sheila Loy, Director Healthcare Strategies, North America, HID Global, provider of comprehensive healthcare security solutions to create a safe, compliant environment for patients and employees. Networked access control simplifies infrastructure enhancements and modifications because hardware platforms aren’t tied to proprietary software, she notes. It’s also easier to add wireless locksets that connect with the online access control system, thus reducing wiring costs and eliminating the problems of easy-to-lose keys while providing near-online and near-real-time control of the opening. IP-based solutions also provide a single, integrated system for combining security, access control, video surveillance and incident response, perimeter detection and alarm monitoring systems. Hospitals can invest in a single, unified IP network, and logically control multiple technologies that previously co-existed only on a physical level. Plus, they can leverage their existing credential investment to seamlessly add logical access control for network log-on, and achieve a full interoperable, multi-layered security solution across company networks, systems and facilities. Analogue or IP debate – a thing of the past? "We will not only continue to seemore security devices on thenetwork, but we will also start tosee more cutting-edge medicaltechnology and equipment thatis network-capable" Other manufacturers see analogue in the healthcare vertical as largely a thing of the past. Camera technology has advanced so far and so fast that the analogue or IP debate is really a thing of the past, says Dave Ella, AMAG Technology’s Vice President of Product Marketing. “The question now is how quickly budgets will allow for the transition to newer technology,” Ella says. Hospitals benefit from higher resolutions (available with IP cameras), which can identify individuals and license plate numbers. Almost all AMAG healthcare customers are integrating their video to their access control system, which vastly speeds up response to security incidents as they unfold. Brandon Reich, Senior Director of Surveillance Solutions, Pivot3, agrees. Today, virtually all new installations are IP, he says. There are a number of organisations that still deploy analogue into large installed bases, though most have converted to IP by this point. In some cases, the rise of HD analogue video has extended the usable life of installed analogue systems, but by 2020, Reich expects the market to be vast majority IP. Pivot3 hyper-converged infrastructure (HCI) solutions for video surveillance provide a high level of protection against liabilities related to lost video. The future belongs to network-capable medical technology “In the security industry, we have seen the transition from analogue to IP systems take place over the course of several years, and it is debatable whether or not that transition is complete,” says Steve Birkmeier, VP of Sales and Business Development, Arteco. “Similarly, within the next few years, we will not only continue to see more security devices on the network, but we will also start to see more cutting-edge medical technology and equipment that is network-capable.” Securing the security devices Birkmeier says this is a burgeoning topic of discussion within the larger conversation about where the internet of Things (IoT) is leading us. However, it also leads to some interesting questions, such as: How will we secure these “wired” devices through the network? Will new compliance standards or regulations have to be put in place? What kind of failover strategy or reliability factors can these life-saving devices guarantee for vulnerable patients if the network goes down? “Taking all these questions into consideration, it is imperative that we continue to invest in IT-centric access control solutions and open up integration opportunities with these technologies to ensure the security of patients, corporate and patient data, hospital staff and equipment,” says Birkmeier.  Read Part 3 of our Security in Healthcare series here

IFSEC 2016: SRI IOM Access Control Tablet integrates with System Galaxy Access Control software
IFSEC 2016: SRI IOM Access Control Tablet integrates with System Galaxy Access Control software

Customers can experience broader IOM Tablet capabilities that can improve access control security increase operational efficiencies SRI Identity™, an SRI International line of business, and Galaxy Control Systems announce that the SRI IOM Access Control Tablet now supports integration with System Galaxy Access Control software. The SRIIOM Access Control Tablet will also now be available through the System Galaxy network of dealers. The integrated capabilities of the IOM Access Control Tablet with System Galaxy Access Control software will be demonstrated at the SRI Identity Stand (# E1250) at IFSEC International 2016 in London. Improved access control with greater efficiency SRI’s IOM Access Control Tablet fuses access control readers, biometrics, keypads, intercoms, cameras and more to establish a new benchmark for cost-effective value and functionality for the security marketplace. This user-friendly product delivers iris recognition, the gold standard of biometric identification, on a flexible Android tablet. By integrating with System Galaxy’s security and building management functions, customers can experience broader IOM Tablet capabilities that can improve access control security and provide greater operational efficiencies. Cost-effective functionality “The ability to integrate the IOM Access Control Tablet with System Galaxy Access Control systems unlocks new opportunities for customers looking beyond today’s access control functionality to new security and operational capabilities,” said Mark Clifton, President, Products and Solutions Division, and Vice President, SRI International. “Together with Galaxy, we are delivering new, cost-effective functionality to the security industry.” “We are excited to expand our extensive list of integrated readers and offer our customers the best possible choices to meet their installation needs,” said Robert Laughlin, President, Galaxy Control Systems. “This integration with SRI Identity gives System Galaxy users the opportunity to implement innovative iris recognition technology for enhanced security in a very cost-effective way when implementing new or expanded access control infrastructure.”

Galaxy Control Systems demonstrates advanced capabilities and integrations of System Galaxy Software at ESX 2016
Galaxy Control Systems demonstrates advanced capabilities and integrations of System Galaxy Software at ESX 2016

System Galaxy Software delivers greater control of systems and enhanced situational awareness Galaxy Control Systems, a provider of integrated access control and security solutions, is highlighting the many advanced features of its popular System Galaxy Software at ESX 2016. Among the capabilities the company is demonstrating in its booth are two mobile apps and a number of advanced integration capabilities designed to provide users with greater control, increased situational awareness and stronger overall physical security. Integrated access control Galaxy’s migration to web-based software and hardware supports the creation and implementation of new access control solutions that offer advantages to both the user and the system integrator. As an open-source technology, access control has the capability to integrate with parking, video, time and attendance, identity management and a wide variety of other data sources and can further provide and share information to strengthen the overall physical security system.  “The advanced capabilities and integrations available with System Galaxy give users a tremendous advantage in meeting the challenges of safety and security, while also delivering time savings, cost-effectiveness and ease of use,” said Robert Laughlin, President, Galaxy Control Systems. “As a result, this powerful, comprehensive access control and management system improves situational awareness and delivers a more proactive solution to help prevent threats and incidents.” System Galaxy software System Galaxy provides traditional thick client, mobile device applications, and web-based thin client user interfaces on a SQL-based, virtual/host or client/server architecture. The software enables active directory support for real-time identity management, individualised identity-based door access, and audit reports for each screen view or credential holder. In addition to support for third-party integrations, System Galaxy is further enhanced by PoE and wireless lock support and intelligent elevator control. Additionally, the software supports all legacy Galaxy hardware and infrastructure, ensuring customers continue to benefit from their investment in legacy solutions. The software supports all legacy Galaxy hardware and infrastructure, ensuring customers continue to benefit from their investment in legacy solutions A recent enhancement that Galaxy is highlighting is the Advanced Port Filtering feature within System Galaxy. Because there is a media access control address (also known as a MAC address) for every Wi-Fi-enabled device on the network, the advent of the Internet of Things and the rapid growth of connected devices is causing a tremendous surge to the amount of traffic that is seen by the network. The new Advanced Port Filtering combats this problem, ensuring that not all devices are continuously monitored by the security network.  Access control mobile apps Also being shown at ESX Galaxy Systems’ two mobile apps that enhance the unique capabilities of System Galaxy and provide users with greater control capabilities for common functions related to facilities and people from anywhere and at any time.  The DoorPoint app provides authorised security personnel with the ability to manage a facility’s doors to enhance security. Through the app, users can remotely lock, unlock and pulse doors, view door status and view activity report data from the System Galaxy access control software. In an emergency situation, the app also allows security personnel to activate and reset crisis modes if necessary and to view current crisis mode status. The PersonPoint allows authorised users to activate and de-activate cardholders remotely, with the added benefit of viewing e-mail activity reports provided by System Galaxy. Users can search for cardholders by name, department or other data fields, further enhancing the efficiency and effectiveness of access control software.

Galaxy Control appoints The Technology Xchange as manufacturer’s representative for western US region
Galaxy Control appoints The Technology Xchange as manufacturer’s representative for western US region

The Technology Xchange will handle sales and support activities for Galaxy’s integrated access control solutions in the Western US markets Galaxy Control Systems, a leading provider of integrated access control, video and security solutions, has partnered with The Technology Xchange to provide manufacturer’s rep services and handle sales and support activities in California, Nevada, Arizona and Hawaii. “When we evaluated manufacturer’s representatives in the Western U.S., The Technology Xchange quickly emerged as an excellent fit to represent Galaxy Control Systems’ solutions,” said Robert Laughlin, President, Galaxy Control Systems. “With their lengthy experience and track record of accomplishments, The Technology Xchange is well positioned for long-term success handling sales and support activities for Galaxy’s integrated access control solutions in the markets they serve.” Founded in 2008, The Technology Xchange is staffed by an expert team with more than 35 years of combined industry experience in integration, manufacturing, distribution and consulting. The firm provides a dynamic range of products and services including manufacturer representation, consulting, design and engineering to the physical security and technology industries. “Our relationship-based approach and professional support services are the basis of our long-term strategic success with our partners,” said Jeff Wetzel, President, The Technology Xchange. “We are proud to be representing Galaxy Control Systems and look forward to bringing their leading-edge integrated access control solutions to our customers.”

Galaxy Control Systems new online Video Learning Library to address dealers’ questions and concerns
Galaxy Control Systems new online Video Learning Library to address dealers’ questions and concerns

Galaxy Control will revisit key topics periodically based on input from dealers and technicians to provide helpful and up-to-date support in future Galaxy Control Systems is developing an online Video Learning Library, a collection of videos to provide its dealer partners with convenient access to information they need to provide their customers with the best experience with Galaxy’s integrated access control, video and security solutions when and where they need it most. Resources for security dealers and technicians “As a company, we pride ourselves on providing the highest levels of service and support possible to our dealer customers. Our new Video Learning Library will build on that commitment by providing the resources they need to address their questions and concerns,” said Robert Laughlin, President, Galaxy Control Systems. “For technicians in the field, time is money, and the ability to access these videos instantly from a job site can save valuable time and expense required for installations or service calls.” The professionally produced videos found in the Video Learning Library will address dealers’ and technicians’ eight most common tech support questions. Galaxy Control Systems will revisit key topics periodically based on input from dealers and technicians to continue to provide the most helpful and up-to-date support in the future. Beyond providing valuable support, these videos can also be used as training tools or as refresher courses to allow installers to maintain their skills and knowledge about the company’s access control hardware and software solutions. The Video Learning Library will be available late Spring 2016.

Galaxy Control highlights advanced features of System Galaxy access control software at ISC West 2016
Galaxy Control highlights advanced features of System Galaxy access control software at ISC West 2016

Among capabilities, Galaxy  demonstrated DoorPoint & PersonPoint mobile apps Galaxy Control Systems, a leading provider of integrated access control and security solutions, is highlighting the many advanced features of its popular System Galaxy Software at ISC West. Among the capabilities the company is demonstrating in its booth (#5089) are new mobile apps that provide users with greater control and advanced port filtering that helps busy networks manage the growing surge of traffic. “As a powerful, comprehensive access control and management solution, System Galaxy delivers streamlined installation, improved user experience, and significantly increased efficiencies,” said Robert Laughlin, President, Galaxy Control Systems. “The addition of two new mobile apps expands upon these strengths by providing anytime, anywhere access control management, while advanced port filtering further contributes to the overall effectiveness of users’ access control solutions.” Greater control capabilities Each of the two new mobile apps is designed to provide users with greater control capabilities for common functions related to facilities and people from anywhere and at any time. The DoorPoint app provides authorised security personnel with the ability to manage a facility’s doors to enhance security. Through the app, users can remotely lock, unlock and pulse doors, view door status and view activity report data from the System Galaxy access control software. In an emergency situation, the app also allows security personnel to activate and reset crisis modes if necessary and to view current crisis mode status. PersonPoint allows authorised users to activate and de-activate cardholders remotely, with the added benefit of viewing e-mail activity reports provided by System Galaxy. Users can search for cardholders by name, department or other data fields, further enhancing the efficiency and effectiveness of access control software. Both DoorPoint and PersonPoint apps are available for download at Android and Apple stores. Continuous monitoring of devices by security network Another new enhancement to System Galaxy is Advanced Port Filtering. Because there is a media access control address (also known as a MAC address) for every Wi-Fi-enabled device on the network, the advent of the Internet of Things and the rapid growth of connected devices is causing a tremendous surge to the amount of traffic that is seen by the network. The new Advanced Port Filtering combats this problem, ensuring that not all devices are continuously monitored by the security network. Galaxy Control Systems’ System Galaxy Access Control Software provides traditional thick client, mobile device applications, and web-based thin client user interfaces on a SQL-based, virtual/host or client/server architecture. The software enables active directory support for real-time identity management, individualised identity-based door access, and audit reports for each screen view or credential holder. Further enhancing System Galaxy is support for third-party video integration, PoE and wireless lock support, and intelligent elevator control. Additionally, the software supports all legacy Galaxy hardware and infrastructure, ensuring customers continue to benefit from their investment in legacy solutions.

ISC West 2016: SRI IOM Access Control Tablet now supports integration with Galaxy Control’s System Galaxy software
ISC West 2016: SRI IOM Access Control Tablet now supports integration with Galaxy Control’s System Galaxy software

By integrating with System Galaxy, customers can experience broader IOM Tablet capabilities SRI Identity™, an SRI International line of business, and Galaxy Control Systems announce that the SRI IOM Access Control Tablet now supports integration with System Galaxy Access Control software. The SRI IOM Access Control Tablet will also now be available through the System Galaxy network of dealers. The integrated capabilities of the IOM Access Control Tablet with System Galaxy Access Control software will be demonstrated at the booths of SRI Identity (# 25014) and Galaxy Control System (# 5089) at ISC West 2016, the largest security industry tradeshow in the U.S. SRI’s IOM Access Control Tablet fuses access control readers, biometrics, keypads, intercoms, cameras and more to establish a new benchmark for cost-effective value and functionality for the security marketplace. This user-friendly product delivers iris recognition, the gold standard of biometric identification, on a flexible Android® tablet. By integrating with System Galaxy’s security and building management functions, customers can experience broader IOM Tablet capabilities that can improve access control security and provide greater operational efficiencies. “The ability to integrate the IOM Access Control Tablet with System Galaxy Access Control systems unlocks new opportunities for customers looking beyond today’s access control functionality to new security and operational capabilities,” said Mark Clifton, President, Products and Solutions Division, and Vice President, SRI International. “Together with Galaxy, we are delivering new, cost-effective functionality to the security industry.” “We are excited to expand our extensive list of integrated readers and offer our customers the best possible choices to meet their installation needs,” said Robert Laughlin, President, Galaxy Control Systems. “This integration with SRI Identity gives System Galaxy users the opportunity to implement innovative iris recognition technology for enhanced security in a very cost-effective way when implementing new or expanded access control infrastructure.”

Experts sections

Dave Poulin
Dave Poulin Dell
Omer Shavit
Omer Shavit ForeScout Technologies
John Krumme
John Krumme Cam-Dex Security Corp.
Steve Gorski
Steve Gorski WESCO Distribution
Tim Shen
Tim Shen Dahua Technology USA Inc.
John Mosebar
John Mosebar Aiphone
Ajay Jain
Ajay Jain Quantum Secure, Inc
Fredrik Nilsson
Fredrik Nilsson Axis Communications
Paul Bodell
Paul Bodell VIZpin Inc.
John Davies
John Davies TDSi
Greg Hamm
Greg Hamm Delta Scientific Corporation
Jana Rankin
Jana Rankin VuTeur
Brenda Koesterman
Brenda Koesterman Convergint Technologies LLC
Todd Piett
Todd Piett Rave Mobile Safety
Alex Johnson
Alex Johnson Verint Systems
Show all
Featured white papers
Nine ways to make your retail security system work harder

Nine ways to make your retail security system work harder

Download
Financial institutions require future-ready physical security technologies

Financial institutions require future-ready physical security technologies

Download
Understanding the trade-off between image resolution and field of view

Understanding the trade-off between image resolution and field of view

Download

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

Profile of Robert Laughlin, President, Galaxy Control Systems, with latest articles & insights contributed. Robert Laughlin is one of over 7198 security industry experts and thought leaders featured on SourceSecurity.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec
Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy