SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Access control evolution allows multiple options for healthcare security

Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Access control advancements enable remote monitoring, mobile apps for healthcare facility security.
  • Two-step control with cards and PIN ensures security at Highlands-Clarksburg Hospital.
  • Hospitals enhance security with RFID locks and integrated identity management systems.
Related Links
  • Challenges and opportunities in analogue-to-IP video system transition in healthcare facilities
  • Healthcare security systems: Funding remains biggest obstacle to installation
  • Healthcare facilities’ diverse security requirements provide opportunities for systems integrators

Part 8 of our healthcare series

A Security Management System (SMS) can be used to integrate a facility’s access control technologies, digital video and alarm monitoring systems
Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week

Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff.

Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week. In particular, integrated systems can allow officials to program various doors and locks to activate at various times and apply rules based on time of day, shift changes, etc. Sensitive materials, such as pharmaceuticals or surgical equipment, demand an entirely different set of access control standards, which means any solution implemented must be easy to use and scalable to fit growing needs.

A Security Management System (SMS) can be used to integrate a facility’s access control technologies, digital video and alarm monitoring systems into a single, streamlined solution, says Mitchell Kane, President, Vanderbilt. “One advantage to this type of solution is scalability and flexibility, and its ability to serve multiple sites, which is common in this vertical market,” he says.

Meeting each hospital’s unique challenges

Every hospital setting has unique challenges. Consider Highlands-Clarksburg Hospital, a 150-bed behavioural psychiatric centre in Clarksburg, West Virginia. It houses patients in a wide range of circumstances, including forensic patients (deemed unfit to stand trial and/or non-restorable), dual-diagnosis substance abuse patients, children and adolescents, and intellectually challenged individuals.

Both a card swipe and PIN are
required to pass through any
controlled doors, to call
an elevator, or to cause the
elevator to move between floors

Because of the nature of the facility, it was determined that a two-step control process was needed to help ensure security and employee safety. Extra security measures were also needed to manage elevator usage, to ensure that high-risk patients are always escorted.

To meet the requirement for a two-step security procedure on interior doors, a Galaxy access control system added an additional layer of protection requiring users to input a five-digit PIN code. The same approach was also applied to the elevators controls, taking advantage of the integration between the access control and patient tracking systems. Thus, both a card swipe and PIN are required to pass through any controlled doors, to call an elevator, or to cause the elevator to move between floors. Escorting a patient requires a card swipe, PIN, and the patient tracking reader, or an alarm sounds.

In all, the integrator installed 208 readers, 24 power supplies and 20 Galaxy controllers to implement the facility access security system.

The current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients
Sensitive materials, such as pharmaceuticals or surgical equipment, demand an entirely different set of access control standards

Securing access to narcotics

One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, President, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients.

“One consequence of this approach is an increased security challenge to protect these distributed locations and the people that have access to them,” he says. “One solution is to combine the use of new wireless cabinet locks for the storage cabinets and carts with RFID panic devices for the staff. Both of these devices can be integrated into the facility access control systems so that the healthcare facility can monitor the operation and respond quickly to any incidents. “

Managing visitors in multiple scenarios

A hospital chain in Orlando, Florida, uses STOPware’s PassagePoint visitor management system at 13 of their hospitals. While all of the hospitals use PassagePoint at the main reception desk to process visitors, each facilities uses PassagePoint a little differently. The large city hospitals use PassagePoint 24 hours a day at their reception desks to process visitors and control the number of visitors in patient rooms. The smaller hospitals use PassagePoint after hours to keep track of visitors in the hospital after regular visiting hours and also deploy Patrol Officers to check the patient units to confirm that visitors are still with the patients.

A new system enhancement is
placing self-service kiosks in the
Emergency Department waiting areas.
Loved ones are given instructions to
self-register at the kiosk

A current new system enhancement project for this hospital chain is placing self-service kiosks in the Emergency Department waiting areas. Loved ones who are authorised to visit Emergency Department patients are given instructions to self-register at the kiosk. A key component of the self-registration is the Emergency Department stretcher where the patient is being treated. Only one key family member is allowed to self-register to visitor and/or stay with the patient. The hospital chain is looking forward to adding Health Level-7 (HL-7) patient integration in order to maintain highly accurate patient room locations.

Integrated access and identity management

Another hospital used HID Global’s iCLASS SE platform, powered by Seos, to implement a major upgrade to a single, integrated access control and identity management system. The hospital is using the system to rebadge thousands of staff, contractors and volunteers, replacing magnetic stripe cards with more secure and versatile ID badges that can support numerous future access control applications. The upgrade was launched during a major corporate re-branding and expansion initiative, and was implemented in stages over a several-year period. To support this multi-phase project, HID Global provided the institutions with multiCLASS SE readers that simultaneously support magnetic stripe, Indala proximity and higher-security 13.56 MHz smart card technology.

Staff could carry and wear a “panic button” or have a two-key combination on their computer as an alarm trigger
In the emergency room, 55 percent of nurses are assaulted in some way each year

Another HID Global example highlights a non-physical security example. The hospital selected an integrated, government-certified solution from HID Global that empowers them to attach a digital certificate of identity authentication to a FIPS 140.2 certified credential, using IdenTrust as the Certificate Authority for each authorised prescriber. FIPS 140.2 is a U.S. government computer security standard used to accredit cryptographic modules.

The HID Global credentials also include one-time password (OTP) functionality that allows EPCS (Electronic Prescriptions for Controlled Substances) authentication using an OTP, without the need of a desktop reader. With HID integration to Epic EHR (Electronic Health Records software), either the digital certificate or the OTP (with PIN) can be accepted within the EPCS module for two-factor authentication. This provides the convenience for the prescribing physician to choose the authentication mode that best fits his or her workflow in a given scenario. The integrated solution includes:

  • ActivID Credential Management System (CMS), ActivID Authentication Server
  • OMNIKEY reader/encoders and FIPS 140.2 contact credentials with an OTP generator and display window
  • FARGO printers and Asure ID software to print customised credentials
  • HID Professional Services for project management, installation, workflow analysis, training and support.

Focus beyond patients to include staff too

Healthcare security is often centred on the patient and keeping him or her safe, which is absolutely crucial. However, Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products, points out that the safety of hospital staff, particularly nurses, can be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention.

Stankevich says one possible solution would be to use duress/emergency notification technology: staff could carry and wear a “panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. “With Tyco Security Products’ Elpas infant abduction technology and the Lynx duress and notification system, we can pinpoint the alarm down to a six-foot radius, to a specific bed, nurse or location in the facility,” says Stankevich.

Read Part 9 of our Security in Healthcare series here

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • Hospital security
  • Healthcare security
  • Security management
  • Radio frequency Identification
  • Identity management
  • Wireless security
  • Door access control
  • Related links
  • ACT Access control systems & kits
  • ACT Audio, video or keypad entry
  • ACT Access control software
  • HID Access control software
  • ACT Access control readers
  • HID Access control readers
  • ACT Access control cards/ tags/ fobs
  • HID Access control cards/ tags/ fobs
  • Card Swipe Access control systems & kits
  • Proximity Access control systems & kits
  • Smart Card Access control systems & kits
  • Articles by Larry Anderson
  • Related categories
  • CCTV cameras
  • Digital video recorders (DVRs)
  • Access control systems & kits
  • Audio, video or keypad entry
  • Access control software
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Expert commentary
About this page

Explore access control advancements for securing healthcare facilities, with options like mobile credentials, biometrics, and visitor screenings.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec