SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alcatraz achieves SOC 2 for biometric security
    • Datalogic AI tech drives retail innovation at NRF 2026
    • Deep Sentinel launches Mobile Monitoring Trailer
    • Eplan and CADENAS partnership enhances data access
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

AlertEnterprise solves the healthcare visitor problem with Visitor Identity Management (VIM)

12 Jan 2022

AlertEnterprise solves the healthcare visitor problem with Visitor Identity Management (VIM)
Contact company
Contact AlertEnterprise
icon Add as a preferred source Download PDF version
Related Links
  • Which security markets are embracing touchless and contactless systems?

Security is of the utmost importance in the healthcare setting so that patients and staff alike can focus their attention on improved clinical outcomes. Unfortunately, visitors are often a contributing factor to safety incidents and the burden on hospital staff has increased exponentially since the onset of the pandemic.

Let’s review the current state of healthcare workplace safety and how an automated, cyber-physical approach can help eliminate the administrative hassle and strengthen safety protocols.

Global pandemic adds undue strain

The ongoing global pandemic has placed enormous strain on healthcare systems and people are only beginning to understand the impact in terms of both patient outcomes and healthcare worker wellbeing. A recent analysis by Press Ganey revealed an increase in patient safety events of all types during 2020.

In late 2021, the Johns Hopkins Centre for Health Security released a new report sharing survey results from 1,189 healthcare workers in which 47 percent reported feelings of burnout.

Workplace violence in healthcare

Incidents of serious workplace violence are four times more common in healthcare than in private industry

Even before the current stressors placed on healthcare systems by the pandemic, hospitals were a relatively dangerous place to work. While a high level of danger is expected from industries like construction or manufacturing, healthcare presents a more high-risk environment than both.

According to the Occupational Safety and Health Administration, incidents of serious workplace violence are four times more common in healthcare than in private industry. And in 2019, U.S. hospitals recorded 221,400 work-related injuries and illnesses, which amounts to 5.5 work-related injuries and illnesses for every 100 full-time employees.

Visitors play a role

According to the Bureau of Labor Statistics, violence is among the top five causes of injury among hospital workers. Those acts of violence stem from a mix of patient and visitor aggressions. Among the most common acts committed against nurses, which are shouting and yelling, swearing, and grabbing, visitors account for 35.8, 24.9, and 1.1 percent of incidences according to the American Nursing Association. From 2013-18, roughly 33 percent of nurses reported verbal abuse by visitors and 3.5 percent reported physical abuse.

The pandemic has only increased these types of incidences. A Missouri hospital, for example, recently installed panic buttons on their badges to summon hospital security as needed.

Fully automated visitor identity management can help

VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data

A cyber-physical approach to visitor management that incorporates automation can both strengthen vetting protocols and relieve the administrative burden on staff.

The Visitor Identity Management (VIM) software, for example, automates the entire visitor identity lifecycle from pre-registration to check-in, on-site experience, and check-out. And compliance never comes into question, since VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data.

Here’s how it works:

  • When a patient is admitted to the hospital, Epic generates an HL7 message that processes the event and creates a patient profile.
  • VIM syncs this information, pulling patient information like the patient’s name, department, MRN unique identifier, and more
  • The system pushes back HL7 messages for discharge and updates using the same interface 

Benefits of VIM

Here’s where the practical benefits start to set in. The software creates a visitor profile associated with the appropriate patient. From there, visitors can check-in and out on their own through a self-service kiosk app. Or, staff can issue visitor stickers, technology badges, or advanced mobile credentials using lobby workstation software.

VIM automatically vets visitors against internal and third-party watch lists before issuing an approved profile

Beyond automation efficiencies, VIM also ensures the highest level of safety and security for everyone in the building. The software automatically vets visitors against internal and third-party watch lists before issuing an approved profile. Additionally, VIM software integrates with physical access control systems so that a visitor’s physical access would remain limited to only approved areas of the hospital. By leveraging both systems, healthcare facilities with heightened security needs, such as children’s hospitals, can create a much more controlled environment for patients and staff.

Manage new vaccination and testing data

Another major challenge facing the healthcare system complies with the emergency temporary standard issued by OSHA, which requires adequate personal protective equipment, timely exposure reporting, and more. In a survey of over 5,000 registered nurses conducted by National Nurses United (NNU), just 23 percent said their employer reported COVID-19 exposures promptly.

Using VIM software, healthcare providers can automate workflows related to COVID-19 health and safety compliance, as well as vaccination checks, to expedite the management and flow of critical health data. And with a secure record of all visitor comings and goings, healthcare systems have one more reliable, auditable data point to conduct contact tracing.

Cyber-physical approach

An automated, cyber-physical approach to managing the visitor experience increases the number of checks and balances available to secure an already stressful working environment. In short, visitors get a better experience and staff have more time to focus on higher-value work.

Meanwhile, automated workflows for vaccination and physical access can help expedite compliance with new requirements and contact tracing in the event of an exposure. Due to the integration with Epic software, an organisation can reap these benefits using the systems they already have in place

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Electronic security systems
  • Application security
  • Physical security
  • Hospital security
  • Commercial security
  • Healthcare security
  • Private sector security
  • Public sector security
  • Security management
  • Security monitoring system
  • Security access systems
  • Signature verification
  • Network monitoring
  • Vehicle tracking
  • Electronic access control
  • Building security
  • Facility security
  • Public security
  • Security software
  • Visitor management systems
  • Testing & Approvals
  • Integration software
  • Cyber security
  • Mobile communications
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Incident Management
  • Cloud security
  • Mobile access
  • Related links
  • HID Access control software
  • HID Access control readers
  • Networkable Access control readers
  • Access Control Software Access control software
  • Area Lockout Option Access control software
  • Card Access control software
  • Contact Access control software
  • Central Monitoring Option Access control software
  • Centrally managed access solution Access control software
  • License Access control software
  • Reporting Option Access control software
  • Serial Interface Option Access control software
  • Visitor Management tool Access control software
  • Related categories
  • Access control software
  • Access control readers
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec