SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

JDWNRH trusts Matrix time-attendance and access control solutions

JDWNRH trusts Matrix time-attendance and access control solutions
Contact company
Contact Matrix Comsec Private Limited
icon Add as a preferred source Download PDF version
Related Links
  • How is the role of the security installer/integrator changing?
  • Ganesh Jivani, CEO, Matrix Comsec, receives the GESIA’s 'Industry Stalwart' award
  • How can security systems be more proactive?
  • Matrix Comsec unveils its state-of-the-art telecom and security products at Matrix Partner Connect - Kolkata

The Jigme Dorji Wangchuck National Referral Hospital is one of the top most renowned institutions in Bhutan delivering healthcare services. The hospital caters to the population of Thimphu and neighbouring districts.

The hospital not only functions as the National Referral Hospital for the entire country but also functions as a Regional Referral Hospital for the Western District, a District Hospital for Thimphu District, a Human resources pool and technical backup for District Hospitals, a Clinical training centre for the Royal Institute of Health Sciences (RIHS) and Technical support to the Public Health Programmes. 

JDWNRH's challenges

As the hospital works round the clock, one of the major concerns was to manage complex shifts of employees. Elevator control, where only users with access rights can call the elevator, was another challenge the hospital wanted to meet.

Furthermore, the customer also wanted a solution, with the help of which the admin could assign entry and exit points for patients, visitors, and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined time and rooms of the hospital for better visitor management.

Matrix's solution offered

Around 206 devices were installed in the hospital that are used in controlling access to rooms and elevators

Matrix pitched its Access Control, Time-Attendance, and Visitor Management Solution along with the different variants of biometric devices, which fulfills every requirement of this renowned Hospital.

Around 206 devices were installed in the hospital that are used in controlling access to rooms and elevators. Devices were installed at the Main Entrance, Ward Rooms, Server Rooms, Outside Elevators, and at Ramps on every floor to restrict access. So, no individual in the building is not enrolled in the system.

Multiple shift management

As the Hospital works 24 hours, there are multiple shifts in which the employees work. Through this, the Hospital could manage multiple shifts of employees.

Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter, and a pre-defined route of access. Also, the crowd at the elevator was controlled by restricting the use to only users with elevator access rights. 

JDWNRH

Results

JDWNRH fulfilled its requirement with Matrix People Mobility Solution and achieved the following results:

  • Improved security by restricting unauthorised entry using an access control solution.
  • Reduced complexity of shifts by time-attendance solution.
  • Crowd control through elevator access control.
  • Time-based and zone-based entry restrictions for visitors and patients.

Products with the quantity used

  • COSEC VEGA FAX (47) - Fingerprint and Card-based Door Controller for Time-Attendance and Access Control Application.
  • COSEC VEGA CAX (65) - Card-based Door Controller for Time-Attendance and Access Control Application. 
  • COSEC PATH DCFE (28) - Fingerprint and Card-based Door Controller with IP65.
  • COSEC PATH RDCE (66) - Card-based Exit Reader with IP65.
  • COSEC ENROLL CARD (1) - Card Enrolment Station.
  • COSEC ENROLL FINGER (1) - Finger Enrolment Station. 
  • COSEC VEGA CPM EM PROX (112) - EM Proximity Card Personality Reader Module for VEGA Series Door Controller.
  • COSEC CPM EM PROX (1) - EM Proximity Card Personality Reader Module.
  • COSEC CENTRA LE (1) - Application Server Platform with 1,000 Users and Expandable up to One Million Users for Basic Access Control and Raw Event Data.
  • COSEC LE TAM (1) - Time-Attendance Module for COSEC CENTRA LE Users.
  • COSEC LE ACM (1) - Access Control Software Module for COSEC CENTRA LE Users.
  • COSEC LE VMM (1) - Visitor Management Module for COSEC CENTRA LE Users.
  • COSEC USER100 (5) - User licence for 100 users.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Electronic security systems
  • Residential security systems
  • Office security systems
  • Application security
  • Physical security
  • Industrial security
  • Remote security
  • Hospital security
  • Commercial security
  • Healthcare security
  • Private sector security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Network monitoring
  • Video analytics
  • Remote video monitoring
  • Electronic door locks
  • Electronic access control
  • Identity management
  • Building security
  • Institute security
  • Public security
  • Industrial security systems
  • License plate recognition
  • Door security
  • Door access control
  • Security software
  • IP Surveillance
  • Security service
  • Industrial surveillance
  • Mobile surveillance
  • Near Field Communication
  • Visitor management systems
  • Indoor surveillance
  • Day/Night surveillance
  • IP security solutions
  • Security communication
  • Testing & Approvals
  • Integration software
  • Cyber security
  • Mobile communications
  • Crowd Management
  • Corporate Security
  • Indoor Security
  • Central Monitoring
  • Data Security
  • Warning Devices
  • IP transmission
  • Incident Management
  • Cloud security
  • Mobile access
  • Mergers & Acquisitions
  • Related links
  • Card Access control cards/ tags/ fobs
  • Access Control Software Access control software
  • Self Contained - External Intruder warning devices
  • Networkable Access control readers
  • Biometric Access control software
  • PC-based Access control readers
  • Card Access control software
  • Control Software CCTV software
  • Self Contained - Internal Intruder warning devices
  • Biometric Access control readers
  • Detection Software CCTV software
  • Proximity Access control cards/ tags/ fobs
  • Card Swipe Access control readers
  • Standalone Access control readers
  • Contact Access control software
  • Tag Access control cards/ tags/ fobs
  • Smart Card Access control cards/ tags/ fobs
  • Contact Access control readers
  • Proximity Access control software
  • Infrared Access control readers
  • IP Surveillance Software CCTV software
  • Smart Card Access control software
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Centrally managed access solution Access control software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Door Monitoring Option Access control software
  • Smart Card Access control readers
  • ID Badging Software License Access control software
  • User tool for control panel Access control software
  • Version Upgrade Access control software
  • Related categories
  • CCTV software
  • Access control software
  • Intruder warning devices
  • Access control readers
  • Electronic locking devices
  • Access control cards/ tags/ fobs
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Enhancing physical access control using a self-service model

Enhancing physical access control using a self-service model

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Healthcare
About this page

"Ensure hospital security with Matrix time-attendance and access control solutions, offering shift management, restricted access and visitor control to enhance healthcare service delivery at JDWNRH."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec