SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers

Check out our special report on casino security

Get it now!

What are the security challenges of healthcare facilities?

What are the security challenges of healthcare facilities?
27 Jun 2017

Editor Introduction

Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?


Card image cap
Corey Tyriver Security 101

The scope and diversity of their activities make hospitals one of the security industry’s biggest challenges. It’s somewhat like protecting a small city with thousands of people coming and going 24/7. Valuable assets and sensitive personal data need protection. And like a city, a hospital can never fully close. Many areas – such as nurseries, pharmacies, labs and computer rooms – require strict access control. One of the most dangerous areas is the emergency department. While lobby doors must remain open, doors to triage and treatment areas should be locked. Visitor management systems help monitor patients and visitors. Tracking patients and portable medical systems is critical. Real-time location systems (RTLS) use RFID chips to track newborns, patients prone to wandering, drug carts and other medical devices. There’s much more involved in securing a hospital, so always work with an experienced integrator to create or update a security plan.

Card image cap
Joe Oliveri Johnson Controls, Inc.

Hospitals face an array of unique challenges in creating a safe environment for patients, staff and visitors while abiding by the strict standards and requirements established by key regulatory organisations including the NFPA (National Fire Protection Association), The Joint Commission, HIPAA (Health Insurance Portability and Accountability Act) and the FDA (Food and Drug Administration). It can be difficult for hospitals to offer an inviting care environment while working to keep up with the constantly changing codes and providing maximum safety. The sheer number of staff in a hospital pose a challenge as well, complicating universal communication in the event of an emergency. Technologies that enable tailored and targeted communications, like a display board that provides message alerts or addressable speakers that deliver a specific message to a precise location within a facility, can be highly beneficial in healthcare environments.

Card image cap
Todd Piett Rave Mobile Safety

There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the new CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. On Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. At its core, the new rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary.

Card image cap
Bruce Czerwinski Zenitel

A major hospital presents security challenges unlike other facilities. People enter day and night. Sick, elderly and newborn patients must be protected. Valuable equipment, supplies, pharmaceuticals and computer centres must be secured. Accomplishing this task required layers of security, primarily access control and video surveillance. Access control should include lobby-based visitor management systems to maintain lists of visitors. Card readers and keypads protect surgical suites and supply rooms, while highly secure areas such as nurseries, pharmacies and executive offices benefit from video intercoms that allow staff to see and communicate with visitors before unlocking a door. Areas such as infectious disease labs may employ biometrics – iris or fingerprint readers – for enhanced identity verification. In order to keep visitors, staff and patients protected, it is important to remember perimeters and parking garages. Video surveillance provide guards with live views of remote areas, and intercom-equipped emergency stations are in contact with security.

Card image cap
Paul Baratta Axis Communications

Protection of network security “closets” is often overlooked in the healthcare environment. Installing access control and video surveillance will help provide security. A simple vulnerability risk assessment can help administrators understand the current security risk in areas where critical information is stored. When securing servers, other devices and HIPAA information, administrators should consider policies that limit physical access, securing machines in locked rooms, managing physical keys, and restricting the ability to remove devices from a secure area. An effective security plan will provide deterrence, detection, delay and response.

Card image cap
Jana Rankin VuTeur

Hospitals and healthcare facilities are posed with a unique security challenge because of the constant flux of people coming and going, the 24/7/365 nature of the enterprise, and the need to secure multiple locations within a facility at various levels. These organisations have to ensure they have a solution in place that manages incidents, provides access control across the board, can streamline emergency response and is able to coordinate on asset protection. All these elements are critical to the safety of patients, visitors, staff and the expensive assets that are often housed within these facilities. Utilising real-time location system (RTLS) software can help streamline security efforts, while allowing for both emergency and day-to-day communications, which can make the use of this technology a business continuity tool.

Card image cap
Mitchell Kane Vanderbilt Industries

Physical security for hospitals and healthcare facilities must encompass an integrated approach, combining video surveillance, video management, emergency management, fire and intrusion alarms, and access control into an overall security plan. Access control, in particular, requires a unique approach, as these systems encompass not only main entrances and exits, but many internal doors that must be programmed with multiple levels of access. Security officials working in this sector also require the ability to control access remotely, through mobile applications, to confirm identity quickly and easily, and to program varying levels of access for visitors, patients, doctors, and staff. These facilities also require oversight 24 hours a day, seven days a week, which can be a challenge for security directors, and also require that the implemented technology work seamlessly while offering maximum uptime.

Card image cap
Jumbi Edulbehram NVIDIA

Video surveillance is integral to meeting the security challenges of hospitals and healthcare facilities. There are many healthcare facilities that are still running older analogue technology because they see transitioning to IP as both costly and difficult to deploy. This can be a problem when integrating new technology as it becomes available, as it is critical for security systems to integrate seamlessly to better deliver a security platform that enables streamlined responses to security events. Hospitals also have vast amounts of space that needs to be covered, which can make the transition from IP to analogue costly if strictly using traditional IP cameras; this can be solved by the implementation of 360-degree panoramic video coverage that can replace between four and five of these traditional cameras.

Card image cap
Sheila Stromberg HID

Institutions must keep pace with physical security threats by employing an open and expandable physical access control system (PACS) infrastructure that supports ongoing improvements while enabling users to do more than simply open doors with their ID cards. Today’s solutions support applications—ranging from secure access to doors and other locations to accessing IT resources--and enable administrators to adopt new ways of thinking about how to use trusted identities across the healthcare continuum.  Trusted identities transform how institutions operate and manage access to patients, data and equipment, and how they protect patient privacy without compromising the quality of care. Through a single convenient and cost-effective integrated solution, healthcare organisations can deploy a combination of strong authentication and new IoT applications that address today’s security challenges while simplifying all aspects of healthcare operations, from opening hospital doors, accessing healthcare records and e-prescribing to how healthcare professionals interact with patients and log their activities.

Card image cap
Brandon Reich Pivot3, Inc.

Healthcare providers face security risks including theft, fraud, cyber threats, violence and missing persons. In the 2016 Hospital Security Survey conducted by Health Facilities Management and the American Society for Healthcare Engineering (ASHE), 75 percent of respondents said that maintaining security has become more challenging over the past two years. Hospitals look to supplement training programs, cyber threat detection and security plans with technology systems and sensors that seek to identify and prevent issues from occurring. Video surveillance, in particular, is often used to improve overall situational awareness. Increasingly, video analytics are a valuable addition to aid help achieve early risk detection. Downtime can lead to compliance issues and potential operational interruptions. Because of this, video storage becomes an even more important piece of the video surveillance infrastructure, and today’s advanced organisations are looking at new innovations for storage and data management, specifically advancements proven in the IT market.

Card image cap
Kevin Wine Verint Systems

Video surveillance and other security sensors and networked systems (i.e. access control, video analytics, dispatch, nurse call, alarms, RFID, et.al) help users realise new levels of awareness; but the value of data derived from these systems cannot be fully understood without correlating information from these platforms together. The ability to fuse multiple data sources (even traditional security, IT and cyber) into one intuitive system will help healthcare facilities realise new levels of situational awareness. Often, hospital security teams must manually combine information from multiple systems to try to gain information on a particular event or trend. This process is time-consuming but necessary to understand the full context of what is happening. Situational awareness solutions combine critical data points from multiple systems and sensors. We like to think of this approach as a single pane of glass—helping enable officials to swiftly and efficiently identify risks, manage situations and thoroughly investigate.


Editor Summary

As environments that require the best the physical security industry has to offer, hospitals and healthcare facilities are large, ever-changing, unrelenting and unforgiving. By definition, hospitals are life-and-death environments that must function at optimal levels without being plagued by security concerns or threats that can interfere with their mission – and become life-and-death situations, too. Healthcare is also a mature market whose security and safety requirements are well defined, well understood, and in many cases, regulated. It’s fortunate that there are, as our Expert Panelists point out, many effective solutions to meet the panorama of challenges.

  • Related links
  • ACT Access control systems & kits
  • ACT Audio, video or keypad entry
  • Aiphone Audio, video or keypad entry
  • Aiphone Access control systems & kits
  • Axis Communications Intruder detectors
  • Axis Communications Analogue Transmission
  • Axis Communications Audio, video or keypad entry
  • Johnson Controls Limited Access control systems & kits
  • Oncam CCTV cameras
  • Verint Analogue Transmission
  • ACT Electronic locking devices
  • ACT Access control readers
  • Aiphone Access control readers
  • Aiphone Electronic locking devices
  • Axis Communications Access control readers
  • Axis Communications IP cameras
  • Axis Communications Video servers (IP transmission)
  • HID Access control readers
  • Johnson Controls Limited Access control readers
  • Oncam IP cameras
  • Pivot3 Video servers (IP transmission)
  • Verint Video servers (IP transmission)
  • Verint IP cameras
  • ACT Access control cards/ tags/ fobs
  • Aiphone Access control cards/ tags/ fobs
  • HID Access control cards/ tags/ fobs
  • Related categories
  • Access control systems & kits
  • Audio, video or keypad entry
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • CCTV cameras
  • Analogue Transmission
  • Electronic locking devices
  • IP cameras
  • Video servers (IP transmission)
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
Monitoring traffic flow: Everywhere, all the time

Monitoring traffic flow: Everywhere, all the time

Download
The critical importance of Trusted Execution Environment in access control

The critical importance of Trusted Execution Environment in access control

Download
How to ramp up perimeter security with license plate reader technology

How to ramp up perimeter security with license plate reader technology

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Counter terror
  4. News
  5. Round table discussions
About this page

Explore top security challenges faced by healthcare facilities, such as patient safety and data protection, plus crucial industry solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec