In large-scene applications, it is difficult for a panoramic surveillance equipment to acquire real-time round-the-clock data due to a lot of factors such as blind spots, aperture limitation, fixed monitoring scene, etc. Aiming to solve these common problems that most general panoramic equipment are facing, Dahua Technology, a video-centric smart IoT solution and service provider, launches its new Hunter SDT5X Series Camera to bring more benefits to its users. Featuring smart tracking, perimete...
ReconaSense, a next-gen physical security intelligence and access control company, has announced the beta launch of its Rapid Install Wizard, a new software tool for integrators that reduces the time-intensive configuration of access control projects using Mercury controllers by 50% or more. Deploying Access control systems Deploying and configuring access control systems is typically a manual, error-prone process for integrators who must physically locate each onsite controller and input diff...
The technology partnership established between BlueBox Video and Hanwha Techwin means that images captured by Wisenet Full HD, ultra-high definition 4K and 360 degree fisheye cameras can now be cost effectively displayed on and across a video wall, as well as on a desk top PC monitor. The successful integration of Wisenet WAVE Video Management Software (VMS) with professional grade video wall controllers manufactured by BlueBox provides an affordable control room solution for a wide range of ap...
In any busy medical facility — surgeries, dental practices or physiotherapy suites — it’s all too easy to accidentally leave a door unlocked. With expensive equipment or controlled drugs on the other side, any opening invites an opportunist. But if a customer installs a Code Handle electronic PIN lock, they need never worry again. The secure, easy-to-fit Code Handle fits right over an existing locking cylinder. The user can simply swap the door handle for a sleek, low-profile C...
Now the customer can combine the advanced access control of a wireless electronic escutcheon with the intelligence and superior security of an electromechanical mortice lock. With a robust design, the new SMARTair Lock is built to secure doors where high daily traffic and a large number of access events are all in a day’s work. This new wireless device in the SMARTair product range is built around three main elements. The external reader with multi-colour LED is available in several diffe...
MedixSafe, a provider of access control cabinet market, is pleased to announce the launch of its new website showcasing its diverse access and key control solutions. The Memphis, TN-based company was founded in 2009 when it first began designing and manufacturing narcotics control cabinets for the EMS market. MedixSafe’s triple security-plus technology® with wireless connection to a user’s network and mobile devices enables the user to reliably monitor and track access to their...
NEC Corporation, a pioneer in the integration of IT and network technologies, announces that its face recognition technology achieved the highest matching accuracy in the Face Recognition Vendor Test (FRVT) 2018 performed by the U.S. National Institute of Standards and Technology (NIST), with an error rate of 0.5% when registering 12 million people. NEC's technology ranked No. 1 in NIST testing for the fifth time, following its top placement in the face recognition testing for video in 2017. The high performance of NEC's technology is reflected in the test results which placed the company significantly ahead of the runner-up. Convenience of biometric authentication technology The use of face recognition technology is rapidly expanding across a wide range of fields throughout the world In recent years, the growing convenience of biometric authentication technology, improved security awareness, and the remarkable development of artificial intelligence (AI), have driven companies around the world to begin adopting biometric authentication technology. Specifically, the use of face recognition technology is rapidly expanding across a wide range of fields throughout the world. Face recognition technologies are now being used in areas that require high reliability, convenience and long-term use, such as identity verification and national infrastructure, transaction settlements, bank account establishment, and passport verification. 49 organisations, including companies from the United States, China, Russia, Europe, and Japan, participated in the NIST's FRVT 2018, where the evaluation of face recognition accuracy was performed. Reducing the identification error rate These tests are the most rigorous and fair benchmarks implemented by the NIST as each organisation is required to submit and be evaluated on programs that were developed during the same period. By performing multi-stage matching, an impressive search speed of 230 million matchings per second was achieved. NEC aims to further expand the scope of this technology's application to include store transaction settlements Furthermore, leveraging NEC's deep learning methods to significantly reduce the identification error rate, NEC accurately matched images of a subject taken over a 10 year interval with an error rate that was 4 times lower than the runner-up. Going forward, NEC aims to further expand the scope of this technology's application to include store transaction settlements, services in public facilities, such as buses, railways, airports, city offices, and hospitals; and helping to protect and care for children and the elderly. Biometric identification solutions Based on the NEC Group AI and Human Rights Principles established in April of this year, NEC gives top priority to the consideration of privacy and respect for human rights when using AI and biometric data. NEC also aims to contribute to further improvements in the usability of biometric identification and video analytics technology, including face recognition. "NEC's portfolio of biometric identification solutions, 'Bio-IDiom', which includes face recognition technology, is critical to the ways that NEC is helping to build safer and more productive societies as part of the 'NEC Value Chain Innovation'," said Hitoshi Imaoka, NEC Fellow at NEC Corporation. "These technologies create new value by sharing information on the status of communities, things, and processes across the entire value chain, and are a meaningful source of growth in our Mid-term Management Plan 2020 and 'NEC Safer Cities', which support the realisation of safe, secure, efficient, and equal cities."
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, launches two new high performance steel doorsets within its Powershield Security Doorset range. The new SR3 and SR4 steel door ranges, also known as Torr and Titan, have been developed from scratch to offer a product compatible with increased frame and ironmongery options, allowing greater freedom of design for architects and specifiers. Complete doorset solution The doors are suitable for an extensive range of sectors, including banks, power stations, hospitals, safe rooms, MOD buildings, personal security, arenas and stadiums. After listening to customers’ requirements, the Torr and Titan ranges have been redeveloped to replace the Glen and Strangford security doors and are certified under LPS1175 Issue 7 to withstand against sustained, professional burglar and vandal attacks. The Torr and Titan ranges are overall easier to install, handle and lighter to use The launch ensures specifiers, architects and contractors can source a complete doorset solution from one trusted single point of contact. Compatible with a wide range of Kaye Certified locking systems, in single and double configurations, the two new door ranges can also come with or without LPS rated and certified vision panels, in a range of frame styles. With a leaf and frame weight reduction of up to 40% from previous ranges, the Torr and Titan ranges are overall easier to install, handle and lighter to use – making them an ideal choice for a wide range of projects. Highest quality products and services The ranges prioritise both the performance and the aesthetic of the doorsets, completely removing industrial looking features from the outside of the door leaf, and reducing the leaf skin thickness to tighten the folds and create a softer aesthetic. The new high security doorsets now look almost identical to standard commercial doorsets, perfect for those looking for discreet or inconspicuous solutions. Brian Sofley, Managing Director at ASSA ABLOY Door Group, explains: “We are always looking for ways to develop ourselves and our trade, ensuring that we deliver the highest quality products and services on the market. I believe both the Torr and Titan ranges really embody this value. We are confident that the two new ranges will exceed the needs of our customers and specifiers, providing a durable solution which achieves the performance demands required.”
Manufacturer of security and access solutions dormakaba is pledging its support to National Fire Door Safety Week 2019, to raise awareness around fire door safety and robust specification. Launched in 2013 in response to a legacy of fire door neglect, Fire Door Safety Week is a mass awareness campaign designed to increase public understanding of the role that fire doors play in protecting life and property. Showing signs of wear and tear Aligned with British Woodworking Federation, dormakaba is promoting the importance of passive fire protection, and ensure that everyone, from manufacturers to building occupants, is aware of what a fully working fire door should look like, down to the handles, locks and door closers. dormakaba recently launched its accredited CPD, ‘CPD 13 2019: Requirements for door hardware on fire doors’ To support this week, dormakaba recently launched its accredited CPD, ‘CPD 13 2019: Requirements for door hardware on fire doors’, which looks at the legislative requirements of hardware for fire doors, including CE marking, Certification and regulations. Graham Hulland, Product Marketing Manager at dormakaba says, “It is crucial that everybody takes responsibility for the maintenance of fire doors, and reports fire doors that have been incorrectly installed, or are showing signs of wear and tear.” Maintaining passive fire protection methods “In addition to the CPD, we also want to make people aware of our Mobile Showroom offering. With customer convenience in mind, we’ve developed the showroom as a way to allow them to view and try our comprehensive range of fire door closers and hardware. A technical expert will also be on hand to answer all questions, and ensure a robust, compliant specification.” Hulland continues, “We have set out to inform those responsible for specifying, installing and maintaining passive fire protection methods, and those who have positions of influence over fire doors, for example; education, hospitality and social housing authorities. If everyone is kept knowledgeable about fire doors, their importance and how they should work, this can save lives.”
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organisations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a mobile phone, such as a hospitality employee, in-home healthcare provider, or lone worker in the field. With the additional modality and simple access of the RiskBand wearable device, Everbridge is expanding its addressable market for protecting employees regardless of their physical location, whether inside the office, working remotely, or travelling the globe. Critical events such as assaults and active shooter incidents are threatening lives and causing major business disruptions. Fatal work injuries have increased over the last decade, with 5,147 occupational fatalities recorded in the U.S. in 2017. Emergency response strategy The rise in smart technology is drastically improving operations for businesses across the globe" This challenge is only magnified by an increasingly mobile workforce, as well as the prevalence of lone worker scenarios across multiple industries served by both Everbridge and RiskBand, including healthcare, banking, retail, energy and utilities, hospitality, and higher education. Designed for enterprise-level personal safety and security, RiskBand’s wearable devices bolster an organisation’s emergency communication and response strategy. A single push of a button provides two-way voice, user profile data, images, and geolocation, in near real-time to your organisation’s security operations centre. As part of the partnership, Everbridge will integrate its award-winning Safety Connection™ platform with RiskBand’s wearables, allowing both Everbridge and RiskBand customers to receive emergency messaging and provide detailed reporting of their location. The data from an employee’s RiskBand device is shared back to the Everbridge platform, allowing an organisation to deploy the appropriate emergency response. The rise in smart technology and connected devices is drastically improving operations for businesses across the globe, and bringing about new opportunities to keep people safe,” said David Meredith, CEO of Everbridge. Immediate access to phones The collaborative partnership will enable us to enhance employee safety through state-of-the-art wearable devices" “Our partnership with RiskBand is advancing our existing connected safety ecosystem, offering employees without immediate access to a mobile phone with a direct line for emergency communication that they can utilise anywhere.” As part of the expansion of that ecosystem, Everbridge is looking to introduce additional wearables into the marketplace, and integrate further with IoT devices, sensors, and smart building technology, all to better protect employees from an increasing array of workplace threats. "It is especially gratifying that a respected industry leader like Everbridge recognises the powerful solution of the RiskBand ARIES device and platform. We believe that this collaborative partnership will enable us to empower businesses to enhance employee safety through state-of-the-art wearable devices that are fully integrated with the most comprehensive critical event management solutions,” explained Jim Van Law, CEO and Co-founder of RiskBand. RiskBand will be fully integrated into Everbridge’s platform. Individuals attending the Global Security Exchange (GSX) conference next week in Chicago can visit the Everbridge Booth #124 to learn more about the joint offering.
Access control manufacturer Inner Range is increasing its presence in the Middle East by taking on a dedicated sales advisor for the region. The company, which has an EMEA regional head office near Reading, Berkshire, has delivered several major projects in the Middle East in recent years. Issam Alhamdan has now joined the Inner Range team as regional sales manager for the Middle East and Africa and will cover sales leads and project delivery throughout the region. Growing business opportunities in Middle East Inner Range General Manger Tim Northwood, said: “I’m delighted to welcome Issam to our team. The success of our recent projects in the Middle East and the fact we were so well received at this year’s Intersec event made it a natural progression to expand our team and take on someone to manage local sales activity and grow our business opportunities in the region. I look forward to Issam having every success.” For Inner Range, Issam will continue to work from Abu Dhabi, covering clients and business leads across the MEAIssam Alhamdan began his career in sales with Alpha Data, a security integrator in Abu Dhabi, before working with access control manufacturers for more than ten years. For Inner Range, he will continue to work from Abu Dhabi, covering clients and business leads across the Middle East and Africa. Promoting Inner Range products He said: “I’m really excited to join Inner Range. It’s a great brand and suite of products and there are already leads from potential and existing clients to follow-up. There’s already a sense of momentum and I can hit the ground running. Initially, the focus will be on promoting Inner Range products more widely by approaching security integrators and consultants to ensure they understand the power, sophistication and scalability that Inner Range systems offer.” Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure.
In a world where many electronic access systems offer greater convenience and flexibility than mechanical keys, what can really make the difference? Instead of being tied to mains electricity, what if one could carry the power with them? With a CLIQ wireless access control system, a battery inside each key powers all electromechanical CLIQ cylinders and padlocks. Authorised key-holders carry a single battery-powered key programmed with only their pre-defined access permissions. Keeping the solution’s power source independent of the locks and padlocks makes CLIQ management and operation more efficient. No need of cabling or electrical wiring Keys have a typical battery life of 5 years. When it is time to change the battery, anyone can do it. No expert needed, and no need to visit all CLIQ locks to reprogram or check their power. With CLIQ, all the power one needs is in their key. Because CLIQ devices are wireless and battery-powered, one does not need cabling around the doorCLIQ locks have other advantages, too. Because CLIQ devices are wireless and battery-powered, one does not need cabling around the door. There is no need for any invasive electrical wiring when one installs CLIQ key access control. And thanks to CLIQ’s menu of software options, one can decide how to manage users’ access rights. CLIQ Local Manager can administer their system via a local software installation; the CLIQ Web Manager runs securely in the cloud. ASSA ABLOY also offers a convenient Software as a Service solution option with round-the-clock support, maintenance and incident reporting as standard, and Service Level Agreements delivering data redundancy and up to 99.5% availability. eCLIQ wireless access system A fully electronic addition to the CLIQ portfolio, the eCLIQ wireless access system is built around secure microelectronics with AES encryption. Robust and durable, eCLIQ electronic cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. An integrated lubricant reservoir ensures they remain maintenance-free for up to 200,000 cycles. “This evolution of our award-winning CLIQ technology is already protecting businesses and public services across Europe,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Organisations in a range of sectors, and with differing building types – from Italy’s Creval Bank to University Hospital Frankfurt – have learned that eCLIQ provides the control and flexibility their premises need.”
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organisation. Risk stratification and control objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-factor authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organisation can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organisation. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organisation. This issue is so important – once we institute risk acceptance, our organisation suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions. Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organisation? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organisation to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organisations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
Often spread over large premises, housing expensive equipment and with a high number of visitors accessing the site every day, care homes face numerous threats. Care home safety and security is a big issue, and ensuring the safety of patients, staff, visitors and assets is a top priority but also a challenge, so by installing access control systems workers are able to easily manage areas around a building. Access control systems can also carry out functions such as time and attendance, staffing level management and parking management. “Access control systems are increasingly being used to enhance safety and security in residential care homes by restricting and monitoring the movement of staff, residents and visitors without impacting on the residents’ everyday lives,” say access control specialists, Nortech. “Installing an effective access control system not only provides a flexible form of security but also one that is bespoke to each individual site.” Importance of access control systems Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers Access control allows staff to manage, control, monitor and restrict the movement of people or vehicles in, out and around an individual site. Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers. Access control systems can be easily installed to ensure that only authorised persons can access specific areas. In more sophisticated facilities, systems can also be used to restrict access to areas that need to be kept separate for the safety of other patients, such as isolation rooms. Access control solutions in care homes Care homes are known to be targets for criminals because they hold valuable goods such as computers and IT equipment and sensitive patient data as well as the personal possessions of staff, visitors and patients. To combat this and deter thieves, a growing number of premises are now installing access control systems to offer instant, flexible protection. One system Nortech can offer is a hands-free access control solution which is both secure and user-friendly. This Nortech system uses Nedap’s uPASS access readers which offer both convenience and security. UHF ID badges and uPASS access readers Each member of staff is issued with a long-range (UHF) electronic ID badge that they carry on a lanyard or clip. The UHF ID badges are automatically read by the uPASS readers at a distance of up to 2m allowing staff access though doors without the need to physically present their ID card to the reader. Two advantages of this hands-free system are that it allows staff to push trolleys or wheelchairs or to carry equipment easily around a care home whilst also avoiding the spread of germs or viruses through constant contact with door handles. Integrating access control system with security solutions Access control systems can work on a small scale for just one door or used as part of a wider security system The ease of integrating access control with other security measures is another reason why the system is so appealing, as access control software enables hospitals and care homes to provide even tougher protection for their sites. The systems are often effectively linked to the likes of CCTV, property marking, perimeter protection or intruder alarms. Access control systems can also work on a small scale for just one door, as well as being used as part of a wider security system. They provide users with a great deal of flexibility according to individual requirements. Enhancing security of hospitals, residential care homes By using access control as a method of security, different authorisation levels can be easily set, thereby preventing people from accessing areas they do not have clearance for. New photo ID cards can also be created instantly for new staff or if a replacement is required. Electronic access control systems are increasingly being used to enhance safety and security in hospitals and residential care homes. In these environments, staff often needs to gain access through doors while escorting patients in wheelchairs or beds or when carrying sterile equipment, etc. so hands-free access is the ideal solution. Card-based access control systems Managers, trained staff, ancillary staff, residents and visitors can all be assigned a pass card that will allow them access around the building appropriate to their status. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
The stakes are higher when it comes to hospital security. Patients expect and deserve privacy and safety. Yet a hospital building or complex must remain a welcoming and supportive space, around the clock. Mechanical lock and key technology may be too passive for this modern healthcare environment, but that does not mean users should abandon the familiarity of keys altogether, because not all keys are created equal. Programmable electronic key systems Programmable electronic key systems put sophisticated access control into the form of a traditional key Programmable electronic key systems put the advantages of sophisticated access control into the form of a traditional key. They reinvent the key for the 21st century, making it more flexible, more powerful and better equipped to handle the security demands of a busy place. Lost keys and departed employees are no longer a problem, because their key’s access rights can be cancelled with a click. And at multiple secure points around the hospital, the familiarity of a key is welcome to a user group who are not experts — at least, not in access control technology. CLIQ locking system Keys can be as smart as any card-based credential. For example, CLIQ technology from ASSA ABLOY backs up the familiarity and ease of use of key-based locking with the flexible management and real-time security features of an intelligent electronic access system. A CLIQ locking system consists of battery-powered, programmable keys; cable-free padlocks and cylinders that are easy to retrofit to almost any standard opening; and management software that can be run locally or via a secure cloud. For users, CLIQ means carrying a single, programmable key pre-loaded to unlock all authorised openings — not just doors, but also gates, alarm boxes, cabinets and lifts. Say goodbye to huge key rings. Programmable key solution For hospital security managers, a programmable key solution enables users to create personalised access schedules — even for temporary contractors — and collect audit trails for doors or keyholders automatically. Staff travels into, out of and through the hospital based on set rules and programmed into their keys. Many hospitals find CLIQ invaluable in managing access to medicines and other controlled substances. Nursing staff using older mechanical key systems struggle to keep track of who has the right keys. Searching for that person to gain access to drugs wastes precious time. Unauthorised access to drug stores can, of course, bring serious financial and safety implications. Medicine management with key-based access control Lock electronics are powered by the battery inside every key, so the retrofit was cable-free At Queen Elizabeth Hospital, Birmingham, pharmacy managers sought a better solution adapted to nurse-accessed medicine stores. They chose a PROTEC2 CLIQ system which combines mechanical disc cylinders with battery powered, programmable CLIQ keys. Lock electronics are powered by the battery inside every key, so the retrofit was cable-free. CLIQ devices secure doors, cabinets and mobile drug trolleys within the same access system. Security and pharmacy managers can see who opened every lock whenever they want — making medicine audits and incident investigation much easier. “Programmable key solutions can really boost medicine safety in hospitals,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalised access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit. A similar system trialled at Scunthorpe Hospital found the total wasted time eliminated would equate to having an additional 24 nurses on duty across the Trust every day,” Stephan Schulz adds. Key-based access control solution Key-based access solutions are equally comfortable at scale. At University Hospital Frankfurt 1,100 eCLIQ cylinders secure doors in a new building. A fully electronic implementation of CLIQ technology, eCLIQ cylinders and keys are easy for staff to use and for hospital security managers to administer from web-based software. The CLIQ Web Manager makes it easy to program, reprogram and audit every CLIQ key, cylinder or padlock. Because the interface is accessible from anywhere with an internet connection — via multifactor login over https:// — users can manage a CLIQ system whenever and from wherever they choose. Its architecture supports multiple administrators or sites. CLIQ Web Manager The Web Manager also integrates easily with all kinds of business management software, helping users automate tedious operations and processes. They can also make the Web Manager one element within an existing access control system. The Web Manager can run in a self-hosted IT environment or completely free of local software installation with two different Software as a Service (SaaS) solutions, Shared SaaS or Dedicated SaaS with hosting just for users and maintenance schedules set by them. With either option, the security software is always up-to-date — a major benefit in healthcare, where confidentiality makes cyber-attack resistance critical.
Evelina London Children's Hospital has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardised system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilises a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. The DUOX 2 wire system functions perfectly using most types of cable Time and date stamping of visitors Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires system with aesthetically pleasing profiles and user-friendly features and functionality, the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
As in every health facility, security for the Haute Savoie region’s new hospital presented a complex challenge. Access control required multiple checkpoints and access rights tailored to individual staff and contractors. Real-time control, enabling managers to respond proactively including by opening and closing doors remotely, was another essential. To meet their security challenges, managers selected Aperio® locking technology integrated online with an ARD access management system. Because Aperio® locks are wireless, the hospital could introduce many more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drug stores. Central access system software Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system Now staff no longer carry key bunches or waste valuable time hunting down relevant keys. All their individual permissions are stored on a single, programmable RFID credential. Alongside standard wired locking, the hospital chose 1,300 Aperio® wireless escutcheons, 10 Aperio® wireless handles with integrated RFID reader, and 301 Aperio® wall readers. A network of 228 Aperio® communications hubs connects every Aperio® lock wirelessly to the central access system software. All these battery-powered Aperio® devices integrate natively with the centralised access system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time management logs, remote door opening and free time slot management. Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system. Maintaining access control autonomously “Having just a single badge — and not having to carry around heavy keys — has been a major advantage for us,” says Béatrice Dequidt, Health Executive at CHMS. “This solution's advantage is it represents a single site from an authorisation management and systems perspective,” explains Aurélien De Riols, ARD’s Eastern Region Director. One single, intuitive management interface enables security teams to administer and maintain access control autonomously, as well as streamline laborious everyday tasks. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Aperio and ARD maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. For every site user, the advantages of carrying a single RFID-enabled badge — instead of multiple keys — are clear.
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analogue cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedised design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialise. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organisation with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customise their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favour of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralised operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralised operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)