A new study of CCTV system managers, commissioned by security technology company NW Security, found that nearly half (46 percent) of medium and large-sized businesses across England, plan to use their CCTV systems to support remote management of processes and people in the workplace. The study also uncovered the fact that the primary reason for investing in CCTV systems in the workplace is to keep staff safe while working. Remote management One clear finding was that CCTV systems are increasi...
Radio Physics is pleased to announce the global launch of Optracon, a stand-off threat detection solution. Optracon is a fully automated multi-sensor fusion solution for detecting concealed mass casualty threats at distances of up to 30m. Harvesting data from state-of-the-art radar, video analytics, LiDAR, machine learning algorithms and artificial intelligence to produce the world’s leading concealed threat detection solution. Following more than 18 months of development, greatly aided...
Following a successful trial, Olsztyn, Poland is the first city in the world to use blockchain to assist their emergency services, thanks to SmartKey, the blockchain connection platform. The SmartKey team has successfully connected an Ethereum smart contract to a Teltonika smart key device and app which will enable fire, ambulance and police teams to enter any part of the closed district or any secure building within the city safely and securely, without having to track down a keyholder or wait...
Hackers are increasingly penetrating the computer networks of hospitals and other vitally important organisations in Germany, according to a newspaper report. The federal government registered 43 successful attacks on healthcare providers by early November, the Sunday edition of the Frankfurter Allgemeine Zeitung reported in a text seen in advance by dpa. That figure is more than twice as many as in the whole of 2019 and it was given in a response by the federal government to a request from the...
Mobile Communications America (MCA), the foremost provider of voice, video and data solutions that enhance the safety, security, and operating efficiency of workplaces announces the addition of S3 Integration, LLC (S3), a front-runner in integrated security management systems, life safety systems, and IT solutions and services. Safety and security industry Headquartered in Baltimore, Maryland since 1996, S3 is a market front-runner in the safety and security industry with a geographic presence...
Current security and hygiene-protocols require special measures for access to buildings and rooms. This can lead to bottlenecks especially when there are large numbers of people and poses special challenges for many companies. Protecting the health of employees, visitors and customers have a top priority. The risk of production downtime in the event of a quarantine measure is very high. Hygiene concepts reduce the risk of infection, but also tie up valuable human resources. Vital tasks of IRM...
Already established as a renowned provider of high-quality door closers, UNION has further strengthened its range with the launch of three dynamic new solutions. Innovative and properly certified, the three new door closers all bring incredible value to the market, by solving a number of critical challenges faced by installers to meet the needs of their customers. With the launch of the CE26V, SC-CE3F and CE4F-E, UNION now meets almost every door closer requirement - whether for light or heavy closing, concealed closing, or the ability to choose between hold-open and free-swing settings. With the new SC-CE3F door closer, style comes to the fore. A concealed solution, it helps maintain the aesthetics of an environment by being hidden from view. Residential and commercial applications This allows buildings to benefit from the advantages of a fixed power size 3 door closer without compromising on aesthetics, making the SC-CE3F the perfect choice for high-end residential and commercial applications. Its concealed nature also protects it from vandalism, particularly in spaces such as university halls of residence, where this can be a problem. The new CE26V rack and pinion door closer is an easy-to-fit solution that can be set to any power size between 2 and 6 Compliant with the demands of BS 8300 for creating an inclusive environment, the SC-CE3F is also more compact than comparable products, reducing the amount of material needed to be removed from the door leaf. The new CE26V rack and pinion door closer is an easy-to-fit solution that can be set to any power size between 2 and 6, in line with the EN 1154 standard governing the requirements of controlled door closing devices. Providing assured protection As a result, the CE26V offers outstanding flexibility, making it suitable for anything from lighter doors of 20kg to heavier doors up to 120kg. The CE26V ensures it is possible to meet almost any EN power size demands from a single product. Due to this flexibility, it’s ideally suited for new projects or retrofit applications. The CE26V is also CE and Certifire tested for 120 minutes on timber doors in all three fixing positions, providing assured protection in the event of a fire. The new CE4F-E electromagnetic door closer is a dual-function solution that can be set to one of two modes: hold-open or free swing. When in hold-open mode, the CE4F-E allows people to walk through the doorway without opening the door, offering the ultimate barrier-free solution. This makes it ideal for hospitals, hotels, theatres and other high-traffic public areas. Smoke alarm system The CE4F-E complies with the demands of BS EN 1155 by connecting to a building’s fire or smoke alarm system By removing the need for physical contact, it also reduces the spread of germs - a consideration that is increasingly in demand following the outbreak of COVID-19. Alternatively, in free-swing mode, the door operates as though no closer is fitted. This allows the door to swing freely with little force required to open it; suitable for the needs of residential bedroom doors in care homes, for example. Both modes provide assured fire safety, should an incident arise. The CE4F-E complies with the demands of BS EN 1155 by connecting to a building’s fire or smoke alarm system. In the event of a fire, power is cut to the unit, allowing it to automatically close and stop the spread of fire and smoke. Fire alarm sounds “We’re extremely excited to have launched the CE26V, SC-CE3F and CE4F-E door closers, which strengthen our range and allow us to offer a comprehensive offering that meets all door closer needs,” comments Richard Wilson, Product Category Manager at UNION. “Whether you’re after versatility in terms of door weight, concealment for aesthetic reasons, or the choice between hold-open and free-swing, UNION has got you covered." "The new solutions join other tried and trusted UNION products, to ensure you can turn to us whatever your door closer needs might be. This includes Door Sense, a safe, simple and legal retrofit device that holds fire doors open but automatically closes if a fire alarm sounds, and Retro V, an easy way of replacing old door closers without risking a fire door’s certification.”
Flexibility and a trusted record of reliable security in real-world environments: these are critical features when choosing any new electronic locks. With the Aperio E100 Wireless Escutcheon from ASSA ABLOY Opening Solutions, one can get both. A robust device suited to almost any medium- to high-traffic door, the E100 is easy to install wire-free - an ideal choice for both retrofit projects and new buildings. With Aperio’s open platform, it is straightforward to then integrate the escutcheons with almost any new or existing security system. One can integrate Aperio E100 escutcheons online or offline - or combine both online and offline doors within the same access control system. The E100 escutcheon offers a convenient combination of free exit from the inside with automatic locking on closure from outside. One can also lock securely from the inside, if they wish, with the Privacy Function. Door security levels A new InHolland campus in Amsterdam will require access control to integrate with a smart building system It comes in a variety of specifications to fit different door security levels or everyday usage. Supplementing a Standard version, the E100 Premium offers upgraded security that is also certified (DIN/EN) for use at fire and escape doors. “Available for EURO, DIN, Scandinavian and Finnish door profiles, the Aperio escutcheon provides trusted security at a range of sensitive locations, including many universities, offices, stadiums, public buildings and hospitals across Europe,” says Lars Angelin, Aperio Business Development Manager at ASSA ABLOY Opening Solutions EMEA. Smart building system At the Centre Hospitalier Métropole Savoie (CHMS) in France, for example, around 1,300 E100 escutcheons integrate natively with a central access system. The hospital’s wired and wireless doors are managed together with real-time logs and remote opening. CHMS door credentials are tailored for compatibility with the government’s electronic Health Professional Card, so staff only carry one, dual-use RFID-enabled badge. At the Netherlands’ InHolland University of Applied Sciences, Aperio escutcheons seamlessly integrate with a Nedap AEOS system. A single credential enables users to unlock all authorised openings managed by AEOS - whether wired or Aperio-secured doors. Looking to the future, a new InHolland campus in Amsterdam will require access control to integrate with a smart building system. Battery-operated wireless locks Because all Aperio locking devices are wireless and battery powered, they are installed quickly Aperio is designed for interoperability, so is a natural fit: “I am very satisfied with the implementation and operation of the Aperio solution,” says Frans Bruggeman, Facility Services Consultant at InHolland. Because all Aperio locking devices are wireless and battery powered, they are installed quickly and with minimal building disruption. A recent ASSA ABLOY benchmarking study measured installer labour costs at over 80% lower for these wireless locks versus standard wired locks. “The same study confirms improved energy efficiency with Aperio, too,” adds Angelin. “The ongoing cost of running these battery-operated wireless locks is much lower than for equivalent wired electronic locks, which require an ‘always on’ mains electricity connection to retain secure status. Potential cost savings are significant over every lock’s life-cycle.” Comprehensive RFID compatibility Alongside comprehensive high and low frequency RFID compatibility, the Aperio escutcheon allows convenient mobile access powered by Bluetooth Low Energy. The user’s identity is stored and protected using native, on-device security and strong end-to-end encryption. For door entry, a user presents their smartphone or mobile device to the escutcheon’s inbuilt reader, which communicates securely with the access system to generate a fast decision. The Aperio E100 wireless escutcheon completes a comprehensive range of Aperio wireless locking devices which includes electronic handles (H100), cylinders (C100), locks (L100) and a wireless lock for server cabinets (KS100).
Digital Guardian, a globally renowned company in Data Loss Prevention (DLP) and Managed Detection and Response (MDR), has developed a new Ryuk Ransomware Protection Content Pack to detect and defend against Ryuk ransomware. This solution is available free of charge to all Digital Guardian customers globally. The company’s Advanced Threat & Analysis Centre (ATAC) Team worked quickly to create and validate the content pack confirming that, once deployed, the Digital Guardian agent can detect and prevent Ryuk ransomware. Ryuk Ransomware Protection Content Pack Digital Guardian’s data protection platform provides deep visibility and granular controls Unlike ordinary data protection solutions, Digital Guardian’s data protection platform provides deep visibility and granular controls, which enables customers to extend use-cases beyond data loss prevention and into advanced threat mitigation, such as detecting and defending against Ryuk ransomware attacks. Regular data protection companies merely monitor and alert on incidents, even with artificial intelligence and machine learning, which would not help thwart ransomware attacks that result in system disruptions and the loss of critical data. Data protection platform for Digital Guardian customers Any Digital Guardian customer currently subscribed to the Managed Detection and Response service has been automatically protected. Digital Guardian customers subscribed to the Managed DLP or SaaS services who are interested in deploying the Ryuk Ransomware Protection Content Pack should simply notify their DG Account Executive, Support, or managed service team representative. On-premise customers interested in downloading the Ryuk Ransomware Protection Content Pack should also contact the Digital Guardian Support Team and it will be made available to them to deploy within their own environment. Countering the rise in Ryuk ransomware attacks “In the midst of a global pandemic, Ryuk ransomware has been used to target dozens of hospitals and already caused significant interruption to operations. The FBI is warning of even more attacks and we want Digital Guardian customers to be protected,” said Tim Bandos, Chief Information Security Officer at Digital Guardian. Tim adds, “We urge all customers, especially hospitals and healthcare institutions, to take this threat very seriously and implement measures to mitigate the threat and minimise damage. We’ll continue to monitor the situation and do all that we can to protect our customers and their data from these insidious ransomware attacks.”
Check Point Research, the Threat Intelligence arm of Check Point Software Technologies Ltd., a renowned provider of cyber security solutions globally, has published its latest Global Threat Index for October 2020. Researchers reported that the Trickbot and Emotet trojans continue to rank as the top two most prevalent malware in October, and that the trojans have been responsible for the sharp increase in ransomware attacks against hospitals and healthcare providers globally. File-encrypting ransomware The FBI and other U.S. government agencies recently issued a warning about ransomware attacks targeting the healthcare sector, warning that the estimated one million-plus Trickbot infections worldwide are being used to download and spread file-encrypting ransomware such as Ryuk. Ryuk is also distributed via the Emotet trojan, which remains in 1st place in the Top Malware Index for the fourth month in succession. Ransomware attacks against healthcare organisations and hospitals in October increased by 36% in EMEA Check Point threat intelligence data showed that the healthcare sector was the most targeted by ransomware in the U.S. in October, with attacks increasing by 71% compared with September 2020. Similarly, ransomware attacks against healthcare organisations and hospitals in October increased by 36% in EMEA and 33% in APAC. Support remote workforces “We’ve seen ransomware attacks increasing since the start of the coronavirus pandemic, to try and take advantage of security gaps as organisations scrambled to support remote workforces. These have surged alarmingly over the past three months, especially against the healthcare sector, and are driven by pre-existing TrickBot and Emotet infections." "We strongly urge healthcare organisations everywhere to be extra vigilant about this risk, and scan for these infections before they can cause real damage by being the gateway to a ransomware attack,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. Top malware families This month, Emotet remains the most popular malware with a global impact of 12% of organisations The research team also warns that “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 43% of organisations globally, followed by “Dasan GPON Router Authentication Bypass” and “HTTP Headers Remote Code Execution (CVE-2020-13756)” with both impacting 42% of organisations globally. (The arrows relate to the change in rank compared to the previous month.) This month, Emotet remains the most popular malware with a global impact of 12% of organisations, followed by Trickbot and Hiddad which both impacted 4% of organisations worldwide. ↔ Emotet - Emotet is an advanced self-propagating, and modular trojan. Emotet was once used as a banking trojan, and recently has been used as a distributer of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links. ↔ Trickbot - Trickbot is a dominant banking trojan constantly being updated with new capabilities, features and distribution vectors. This enables Trickbot to be a flexible and customisable malware that can be distributed as part of multi purposed campaigns. ↑ Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. Top exploited vulnerabilities This month “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 43% of organisations globally, followed by “Dasan GPON Router Authentication Bypass” and “HTTP Headers Remote Code Execution (CVE-2020-13756)” with both impacting 42% of organisations globally. ↔ MVPower DVR Remote Code Execution - Remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. ↔ Dasan GPON Router Authentication Bypass (CVE-2018-10561) - An authentication bypass vulnerability that exists in Dasan GPON routers. Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorised access into the affected system. ↑ HTTP Headers Remote Code Execution (CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. Top mobile malwares This month Hiddad is the most prevalent Mobile malware, followed by xHelper and Lotoor. Hiddad - Hiddad is an Android malware which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. xHelper - xHelper is a malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisement. The application is capable of hiding itself from the user and reinstalling itself in case it is uninstalled. Lotoor - Lotoor is a hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily, and identifies more than 250 million malware activities every day. The complete list of the top 10 malware families in October can be found on the Check Point Blog.
Imaging Development Systems GmbH (IDS) extend selection of automatically focusable board-level cameras. Thanks to their practical autofocus function, uEye LE AF industrial cameras deliver perfectly focused images even with frequently changing object distances. IDS now offer additional camera variants with 2.1 and 3.1 MP Sony sensors which provide more flexibility in terms of application design and camera integration. For the first time, the company also offers models with upright USB Type-C alignment in this product family. uEye LE AF cameras In addition to the previously available uEye LE AF cameras with 6.4 MP (IMX178, 58 fps) and 18.1 MP (AR1820HS, 20 fps) sensors, customers can now also purchase models with 2.1 (IMX290, 120 fps) or 3.1MP (IMX265, 80 fps). All cameras feature a USB 3.1 Gen 1 interface, USB Power Delivery – which can be used, for example, to power an LED light source or a photoelectric sensor – and allow the use and control of liquid lenses. The autofocus function ensures sharp images in the blink of an eye, even if the lens is not physically accessible or if the distance between the lens and the object changes frequently. The board-level cameras are therefore particularly well-suited for applications in fields such as logistics (e.g. for parcel acceptance and sorting) or traffic monitoring. Due to their compact design with dimensions of only 36 x 36 x 20mm they also prove their strengths in embedded vision systems. This means that they are also interesting for integration into small medical devices.
As iPhone 12 shipments rollout, security experts at Check Point warn of the security risks in using 5G. Here’s how consumers can stay safe while using the new iPhone and other 5G carriers. Security experts at Check Point are warning of security risks around 5G as iPhone 12 begins to ship worldwide. What is 5G? And how does it work? 5G is the shorthand term that stands for the fifth generation of wireless cellular networks. Following previous wireless standards after 1G, 2G, 3G, and 4G networks, 5G enables a new network that is designed to connect everyone to everything, faster. The way 5G works is that it transmits large volumes of data over shorter distances than 4G. Compared to 4G, 5G is faster, more responsive, uses less power, more reliable and can carry more devices. Two Primary Security Risks of 5G More connected devices mean more attack vectors 5G poses a higher security threat partly because there are more vectors through which a hacker can attack. By design, 5G is set to enable a significant number of connected devices, each of which expand the attack surface from which a hacker can work from. Tens of billions of smart devices are expected to connect to 5G networks, and only a tiny fraction of these have any security features beyond a password. In short, every IoT device that 5G enables is a potential breach point. Lack of access control and poor threat visibility 5G networks are more distributed and decentralised. Devices are directly connected to the internet through the service provider. As 5G devices roll out in offices, factories and hospitals, the risk of data breaches and attacks increases sharply, as communications to and from these devices will bypass the corporate network and their security controls. Similarly, employees using 5G mobile devices to access cloud-based corporate resources will increase the risk of breaches and data losses. Micro software agents How to Stay Protected on 5G Carriers, including iPhone 12 - Have advanced threat prevention - As 5G will connect users and applications across mobiles, endpoints, networks, cloud and IoT, it’s essential to have advanced threat prevention to protect all of these types of asset, wherever they are located. Use micro-scale plugins - Given this huge volume and variety of products - many of which will have extremely limited or zero security capabilities - organisations need an easy way to deploy and manage security on any type of device. One of the best, innovative approaches is to use micro-scale plugins that can work on any device or operating system in any environment. These micro software agents control every attribute that goes to and from the device on the 5G network, and connect to the consolidated security architecture to enforce protection. Use a VPN - Leverage a VPN to stop hackers from accessing the user’s data without permission and spying on their online activity. Keep all the IoT devices updated - Any device that connects to their mobile phone should have all the latest updates. This way, the users know that they have the latest security patches on all devices that orbit around 5G. Have strong passwords - Make the passwords very strong. Use characters that are random and various. Internet of things Ian Porteous, Regional Director, Security Engineering for Check Point, said: “5G is a double-edged sword. On one side, we get blazingly fast internet speed. On the other side, we are more prone to cyber attacks because there are more attack vectors for hackers to choose from. Fast-growing technologies like the Internet of Things (IoT) are expected to explode with 5G. Each device is a potential breach point." "Hackers see these as new windows to launch possible attacks. As you use the new iPhone or other 5G carriers, practice more caution than ever: use a VPN, keep your IoT devices updated, and always use the strongest passwords you can imagine, as starting points for good 5G cyber hygiene.”
Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorised to enter? Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or What a security guard needs is to be able to hear and to communicate with an individualinvite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds. Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents. Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides valuechallenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open. COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service. The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
The general public doesn’t give much thought to the important role of security officers in creating and promoting safer environments. The low-profile work of security officers is vital to protecting people, places and property. During the pandemic, newer aspects to that role have emerged. Security personnel have been called on to perform diverse tasks such as managing queues at the supermarket, safeguarding testing centres and hospitals, ensuring food deliveries, and supporting police patrols. The British Security Industry Association (BSIA) and two other organisations in the United Kingdom are joining forces to raise awareness of the work of security officers and to recognise the vital importance of the duties they perform. BSIA, a trade association, includes members who are responsible for 70% of privately provided UK security products and services, including security guarding, consultancy services, and distribution and installation of electronic and physical security equipment. BSIA, the Security Institute and the Security Commonwealth Joining BSIA in the awareness campaign are the Security Institute, a professional security membership body; and the Security Commonwealth, which is comprised of 40 organisations from across the security landscape with common objectives to build professionalism, raise standards and share best practices. “The recognition of security officers as key workers is the start of a re-appraisal of what service they provide to the community in keeping the public safe and secure,” says Mike Reddington, BSIA Chief Executive. “As we exit lockdown and have to navigate public spaces again, [security officers] will have a crucial role in supporting public confidence. We are working closely with the Police and all other public bodies to find the best way to achieve this.” Security officers acknowledged as key workers The campaign will showcase security professionals as a respected, valued, professional service provider and a key worker that is acknowledged and embedded in daily lives. The British Security Industry Association (BSIA) and two other organisations in the United Kingdom are joining forces to raise awareness of the work of security officers “Great effort has been invested in the professional standards and capabilities of frontline [security] officers, and they have proven their worth during the coronavirus crisis in the UK,” says Rick Mounfield, Chief Executive, the Security Institute. “They, along with the wider security sector, deserve to be recognized, respected and appreciated for the safety and security they provide across the United Kingdom.” “[We are working to] build professionalism, raise standards and share best practices, and I hope this campaign can make more people recognise the changes we have all made and continue to make,” says Guy Matthias, Chairman of the Security Commonwealth (SyCom). The industry will be reaching out to companies, professionals, and organisations in the sector to participate in the campaign. The hope is that, over the coming weeks as lockdown is eased, the industry can play its part to ensure that the country emerges with confidence to start to recover and build for the future. Private security more important than ever The campaign will showcase security professionals as a respected, valued, professional service provider Across the pond in the United States, law enforcement professionals are facing a crisis of confidence during a time of civil unrest as protestors call to “defund the police” and to otherwise undermine and/or recast law enforcement’s role in preserving the peace and ensuring public safety. If an upshot is that public policing is starved of resources, the role of private security to supplement their mission is likely to increase. In short, the role of private security is more important than ever on both sides of the Atlantic. Public recognition of that role is welcome, obviously. In any case, the importance of their role protecting people, places and property has never been greater.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specialises in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control terminals. The technology needed to bring a multi-layered approach to screening individuals entering the hospital facility who could potentially introduce a significant amount of risk to those within the facility. Access control solution integrated St. James Hospital chose the Vanderbilt ACTpro access control solution integrated with the ZKTeco Proface-X-TD Facial Recognition Terminal to address its challenges. The ACTpro solution specifically used the ACT1500 Single Door IP Controller and ACT1030 MiFare Card Reader alongside the ZKTeco system. The Proface-X-TD solution uses intelligent engineering facial recognition algorithms and the latest computer vision technology. It supports both facial and palm verification for a fully touchless experience. Coupled with the Proface-X-TD solution, ACTpro can not only grant and restrict access based on biometric functionality, but can detect mask-wearing and high temperatures as a means to grant or restrict access to the facility. As a result, better hygiene is achieved with touchless biometric authentication, skin temperature detection, and masked individual identification. Anti-spoofing algorithm If a member of the staff presents to the door with high skin temperature, that individual is routed to another location, and the door will not open to identify potential infection. The Proface-X-TD solution is also equipped with an anti-spoofing algorithm for facial recognition against almost all types of fake photos and videos. The solution is ideally suited to hospitals like St. James because of their ability to be layered as part of a comprehensive approach to screening individuals considered at-risk for infection as a means to protect patients and other staff members. Elevated temperatures detections The touchless nature of the terminals brings safety and hygiene issues to the forefront, cutting down on possible exposure to infectious disease. The device detects people with elevated temperatures who can then be further scrutinised to add extra screening processes and identify potential disease exposure. This ability, along with the visitor check-in and tracking processes integrated with the ACTpro access control system, is a critical component in today’s modern healthcare facilities to provide real-time data for security officials.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimisation Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licencing With a simple licencing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
iSpace Environments, a Minneapolis-based commercial furniture and technology dealership, is now using Carousel Digital Signage software to promote its services and amplify its message throughout its showroom as part of a technology upgrade and renovation. A longtime Carousel Digital Signage reseller, iSpace provides furnishing and technology design and integration services to clients in the corporate, higher education, healthcare, and automobile retail sectors. As organisations re-open following the COVID-19 pandemic, iSpace is helping clients reconfigure their workspaces to comply with the new health and safety regulations. Their interior transformation adheres to these compliance standards and demonstrates how furniture and technology can create safe, comfortable work environments. Content creation and management Showing the technology creates awareness of what AV technology offers for workplace design" iSpace is now using Carousel Cloud software to communicate health and safety guidelines, welcome messaging, visitor information, and examples of how clients can apply digital signage to their own environments. All visual messaging is distributed to flat panel televisions and video walls throughout the building, leveraging Carousel Cloud’s interoperability with Apple TV devices to simplify and centralise media playout. iSpace’s AV experts demonstrate the software’s capabilities during tours, including multi-display support, Apple TV interoperability, and ease of use including simplified content creation and management. Communicate competitive advantage “Showing the technology creates awareness of what AV technology offers for workplace design,” said Nate Pesch, Technology Sales Manager at iSpace Environments. “Our customers aren’t always aware of our technology-related products and services, and Carousel Cloud helps us communicate our competitive advantage.” Pesch confirms that the digital signage content they show to visitors often opens the conversation to broader possibilities. “The Carousel content always looks visually impressive and provides an opportunity to share our expertise around technology integration,” he said. “We have many examples of becoming a one-stop shop for customers.” Standalone server infrastructure Those conversations then lead to Carousel Cloud’s benefit in workspace communications. Carousel Cloud gives users the flexibility of being able to update content at any time and from anywhere - a benefit that Pesch says is increasingly critical during as business operations continue to change. He also points to the cost-reducing benefits of Carousel Cloud, which eliminates the traditional expense of a standalone server infrastructure. Instead, Carousel Cloud software is deployed on the organisation’s existing IT infrastructure and can use common Apple TV devices or BrightSign media players (including the BSN.cloud platform) on the playout side. Use built-in templates One organisation’s safety protocol may different from another, but everybody wants to feel safe" “Carousel software is easy to learn, so an organisation lacking in-house design resources can use built-in templates to create content,” said Pesch. “That’s important these days as many content managers are working from home. With Carousel Cloud, content managers can make changes remotely. We can also show how easy it is to use these templates across different aspect ratios, as we display the content on portrait screens, landscape screens, and video walls in our showroom and meeting spaces. It’s very powerful.” iSpace Environments, which has remained open through the pandemic as an essential business, is seeing an increase in traffic as organisations consider how life in the workplace will change. With organisations across the globe updating facilities in accordance with new regulations, many customers are aiming to create environments that communicate how safety is their top priority. Organisation’s safety protocol “We’re helping people get back to business any way we can, whether it’s with screen dividers on desks, furniture reconfigurations, or digital signage to communicate the proper safety measures,” said Pesch. “Businesses and schools need to show that they’re thinking about safety, and digital signage is one way to communicate that they’re doing something about it. One organisation’s safety protocol may different from another, but everybody wants to feel safe. Digital signage is one of the most effective ways to communicate these messages.”
The tallest building in the European Union, Varso Place in Warsaw, Poland, is now live with Forge Bluepoint visitor management and Inner Range intelligent access control. Forge Bluepoint, Forge’s cloud-based visitor management solution was chosen by Varso Place’s developer HB Reavis after the firm researched the market and found it could provide a great experience for visitors as it was multi-tenant ready, multi-lingual and it could integrate seamlessly with Inner Range’s sophisticated Integriti system. Jakub Kacer, Security Manager at HB Reavis said: “When all tenants use Forge Bluepoint, our receptionists will have less administration work, we will have real-time visitor statistics and it’s a modern attractive visitor system.” Access control system Forge Bluepoint will allow the main reception teams at each building to focus on the experience at Varso Place. Visitors will be invited by tenants via email which will provide them with a unique QR code. Visitors will use this QR code to check-in at the Forge Bluepoint kiosk or with the reception team. The integration with Inner Range’s Integriti access control system allows visitors to also use the QR code to call the lifts, supplied by Schindler, to access the floor of the tenant company and nowhere else. Paul Speariett, Co-founder and Director at Forge, said: “Working closely with the onsite security and building management team at Varso Place, in Warsaw, we were able to implement Forge Bluepoint during the COVID-19 crisis from the UK. It wasn’t ideal, but we overcame the challenges and are proud to see Forge Bluepoint working to give visitors a great experience.” Visitor management supplier Forge is currently rolling out Forge Bluepoint at Nivy Tower in Bratislava and the Agora Tower in Budapest Tim Northwood, General Manager at Inner Range, said: “Our flagship intelligent integrated access control system Integriti provides robust security and sophisticated controls around access to these new buildings. But it also allows trouble-free access for users, including the ability to invite and manage visitors easily via Forge Bluepoint.” With 1.5 million sq ft of leasable space, companies including Cambridge Innovation Centre, Bank Gospodarstwa Krajowego (a state-owned development bank in Poland) and the Polish offices of Nvidia, Yves Rocher and Workday will call Varso Place home and use Forge Bluepoint to invite visitors easily, safely and securely. Forge, as the chosen visitor management supplier for HB Reavis globally, is currently rolling out Forge Bluepoint at Nivy Tower in Bratislava and the Agora Tower in Budapest. Access and security solution Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure. It’s Integriti product is an award-winning intelligent access control and security system that can integrate with a multitude of third-party products to create a sophisticated and highly secure access and security solution while also providing trouble-free access for site users. Varso Place is Warsaw’s largest mixed-use development and consists of Varso 1, Varso 2 designed by HRA Architekci, and Varso Tower, the tallest building in the European Union at 310m high which was designed by celebrated architects, Foster + Partners.
For more than a century, SwedishAmerican Health System, its hospital and medical facilities, have been serving the community of Rockford, Illinois. As a division of the University of Wisconsin Health, the medical staff has been delivering high-quality healthcare and strategies to keep patients and families healthy. What families and patients don’t see is the security systems that have been put in place at all Swedish American medical facilities and outlying satellite healthcare clinics. “In an ongoing effort to provide security at the highest level, SwedishAmerican is upgrading all their servers to include Windows 10,” said Randy Lapp, a regional business development manager at Salient Systems. Reliable security solution “The security team has nearly completed the replacement of old DVRs with new enterprise network servers. This offers a much more reliable security solution tying all the medical facilities together. Each clinic will have a single server, while there will be multiple servers in the hospital. Server types and camera counts will depend upon the needs of each wing of the facility.” In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe. One such effort is the migration from Windows 7 platform to Windows 10 and maintaining compliance in their OS. Utilising Salient’s CompleteView VMS with Dynamic Resolution Scaling, the security team has more than adequate bandwidth to record and store video for 90 days at each facility. Video surveillance systems The servers replace an obsolete system and have been engineered by Salient System network engineers Because the medical centre offers a daycare facility, recording is ongoing, and is stored for 90 days; however, some recordings are held for as long as six months. In locations where there are privacy issues, such as patient treatment areas, no video recordings are made. Still, in spaces such as parking lots and common areas, video recording is essential. The servers replace an obsolete system and have been engineered by Salient System network engineers to accept upgrades in security solutions as technology, and various solutions evolve. Even more important is the fact that the servers are tailormade to fit the specific needs of the various hospital departments and separate clinics. The servers, just like the hospital, have evolved over the years. The PowerProtect platforms extend the limits of operational capabilities for video surveillance systems engineered for continuous access and durability. Various requirements for storage “The reason for the custom build is to fulfill several missions of the hospital system,” Lapp said. “There are various requirements for storage and differing requirements for recording frames per second. The customised nature of these security solutions fulfils the unique needs of the customer.” SwedishAmerican Hospital has video recording requirements that weren’t necessary a few years ago. This is an inner-city hospital system, where there are different and sometimes difficult challenges" Terry W. Gagliano, security manager at the hospital system, said the investment in this server solution would not only help with the upgrade to Windows 10, but it will allow greater recording capacity. “This is an inner-city hospital system, where there are different and sometimes difficult challenges,” Gagliano said. “The clinics also are within the inner city, and we wanted to ensure that we had enough bandwidth to not only record, but to store the images that we are getting. We wanted to be able to effectively record and store video for 90 days.” Mission-critical video surveillance Recording and storage specifications vary at the hospital. For instance, at the child daycare centre at the hospital, recording is active only during hours of operation, and storage of those images last from three to six months. Parking lots also are under constant surveillance, and storage on the servers is ongoing. “We’re thrilled to have these server platforms in place and working,” Gagliano said. “What we had been using is obsolete. The PowerProtect solutions are engineered to accept upgrades as they are needed and as they become available. We expect these servers to last beyond five years before we have to consider replacement.” The servers or hybrid NVRs are a value oriented digital video surveillance system, offering continuous operation with advanced components. They are rack-mounted, and as any end-user would expect, delivers reliability and a processing power required by mission-critical video surveillance. High performance in a flexible platform Because the storage of video images is important, SwedishAmerican sought a single Intel Xeon processor with 16 GB of memory, which also offered the hospital system up to 48 TB of video storage. “We were looking for new servers at our existing buildings, so that meant we were in the market for 40 to 45 servers,” Gagliano said. Our clinics have varied and different missions, so demand for security services are different" “Our clinics have varied and different missions, so demand for security services are different. When we sought customised solutions, we found exactly what we needed.” PowerPlus is a two-unit NVR rack mount used for the installation because SwedishAmerican sought a balance between processing power, storage capacity, and redundancy for high performance in a flexible platform for its existing video surveillance applications. A hospital setting is a 24/7/365 environment, requiring a system that can withstand the rigors of continuous operation. That’s where the enhanced performance of CompleteView 20/20 comes in. Considering performance first and foremost “When we started the process of replacing our servers and NVRs, we considered performance first and foremost,” Gagliano said. “It was mission-critical to have flexibility, and it was important to honour the standard of excellence already offered by SwedishAmerican Hospital.” In recent years, SwedishAmerican has been honoured in the medical professional for its commitment to quality, and it has become a gold standard for medical care of any other healthcare system in northern Illinois. The hospital has received a Top 100 Hospital Quality Award, 150 Top Places to Work in Healthcare, and a Distinguished Hospital Award by J.D. Power and Associates, among many other accolades. While there may not be an award or designation for security in the workplace, SwedishAmerican has done its best to ensure that patients are afforded the highest level of safety and security.
Siqura and TKH Security realised a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialised departments, a 32-bed emergency ward, a 3-storey rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfil the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Round table discussion
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?