SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Milestone highlights the video surveillance technology in the healthcare sector

17 Jul 2023

Milestone highlights the video surveillance technology in the healthcare sector
Contact company
Contact Milestone Systems
icon Add as a preferred source Download PDF version
Related Links
  • New Milestone CEO will carry on company mission to ‘Make the World See’
  • Milestone Marketplace helps customers explore unmatched possibilities to extend video solutions

Video surveillance technology and software such as Milestone System’s XProtect Video Management Software (VMS) bring a dynamic toolset to the clinical setting, whether a large or small hospital, medical clinic, outpatient centre, nursing home, or medical lockdown facility.

Of course, these facility types work differently. However, the video technologies available can help these facilities to operate more securely, lower their vulnerability to loss, and improve their care of patients.

Visitor management

Visitor management is a low-tech affair at most hospitals and clinics. While in comparison, most hospitals require high-tech credentials for employee and contractor access. Most hospital visitors will check in at a security desk, where personnel confirm identity and approve visits to patients or employees. They often provide approved guests with stickers or badges identifying them as visitors. Records may document the visit in keeping with the hospital’s visitor policy.

Records may document the visit in keeping with the hospital’s visitor policy

In times of heightened risk, security measures may be tighter to reduce the risk of exposure to the visitor and liability to the hospital. For example, at the height of the COVID-19 pandemic, most medical facilities went into near-lockdown conditions, restricting visitor access. As a result, medical facilities now hold to a wide variety of access restriction guidelines, with each facility acting autonomously in response to the current pandemic status in their area.

Visitor management scenario

Adding video technology to enhance a visitor management scenario could be a simple solution, or scale to a more complex system, depending on the needs of the management. For example, a simple design includes an existing camera monitoring a clinic’s lobby. The camera could maintain a view of the visitor registration desk. This practice captures video of people registering as they enter the facility. As a result, best practices are in place, even without advanced visitor management technology.

In a more advanced scenario, hospital personnel or vendors can integrate video surveillance and visitor management systems at the software level. Milestone makes API or SDK development ensure the system components can communicate information. In doing so, visitor information becomes metadata available on both systems. For example, in a VMS, such as XProtect® open platform, the metadata is associated with video images of the person as they register.

Benefits of integration

In addition, information is now available, such as the visitor’s name or clothing details at time of visit

With video recordings, administrators now have reportable information that becomes part of the evidentiary data that documents the visit. Reportable data is a game-changer for a wide variety of reasons. One of the benefits of integration is that data is searchable. In addition, information is now available, such as the visitor’s name or clothing details at the time of his visit. Furthermore, it is easier to find specific video data without viewing hours of video footage looking for a particular person. 

Mark A. Johnson is the Healthcare Business Development Manager for Milestone Systems. He says, “Milestone is compatible with numerous visitor access platforms to assure you are following the guidelines from accreditation agencies and following in best practice of the International Association for Healthcare Security & Safety (IAHSS).”

Video surveillance

Many large and small healthcare organisations will include video surveillance on the main entrances and primary hallways. However, beyond the basics, the application and management of video surveillance technologies differ from facility to facility. While the immediate need for video surveillance footage will be for investigating incidents and providing a record of activity, that’s not the only reason video technology is helpful in healthcare environments.

Many hospitals and clinics shy away from monitoring patient examination rooms and hospital beds using video because of privacy issues. In particular, HIPAA laws in the United States require the confidentiality of protected health information.

HIPAA regulations

Improper installation can cause a HIPAA violation if cameras are out-of-compliance or misused

In addition, video cameras are occasionally incorrectly installed. Improper installation can cause a HIPAA violation if cameras are out-of-compliance or misused. However, in some cases, such as psychiatric wards and nursing homes, monitoring patients with video is often necessary. Furthermore, even in clinics and general-use hospital rooms, nursing staff may monitor patients via camera if the personnel makes no recordings, and HIPAA regulations are in force.  

Johnson tells us, “Video surveillance is now being called out in many hospital association groups guidelines. For example, the American Society of Hospital Pharmacists (ASHP) just released guidelines around the diversion of controlled substances. They state one of the top five revised guidelines is better use of surveillance technology, including advanced analytics capabilities. In addition, ASHP has an extensive document outlining many must-have areas for video surveillance.“

Video use for two-way communication

Video communication can sometimes be invaluable for communicating with patients in secure lockdown areas. In addition, video helps to monitor patients who are at risk for falls. Furthermore, remote communication could be beneficial if infectious disease transmission concerns nursing staff. However, privacy masking measures must be in place to allow these patients the privacy they require.

Additionally, administrators must consider how security monitors might be visible to unauthorised visitors in nursing management areas. Finally, staff should treat personal information and images with high regard for patient privacy. This recommendation is directly in line with HIPAA rules for the healthcare industry.

Access control

Video surveillance becomes more critical when applied in loss prevention scenarios for pharmaceuticals

Video surveillance becomes much more critical when applied in loss prevention scenarios for pharmaceuticals and medical supplies. Therefore, personnel should closely monitor controlled areas of clinics and hospitals with restricted access. For example, with access control technology, the staff achieves higher security protocols for sensitive areas, such as pharmaceutical storage areas, medical supply rooms, or patient file storage. However, recommend the application of access control at perimeter entry doors to avoid loss prevention. 

A secure area could be as simple as providing a locking cabinet or equipping a room with a numbered keypad or badge access on the door. Keycard credentials assist with authorising employees and contractors to access approved areas of the hospital or clinic. In addition, access control provides authorisation documentation along with a timestamp verifying the activity. Furthermore, access control restrictions keep unauthorised visitors from accessing restricted areas and items.

XProtect open platform

When employee swipes a keycard, XProtect registers activity and flags the video and metadata for reference

A progressive step many clinics employ is integrated access control with video surveillance. In the XProtect open platform, system administrators can associate cameras with specific access control readers. As a result, when an employee swipes a keycard, XProtect registers the activity and flags the video and metadata for future reference. Problems with misappropriating medical supplies or pharmaceuticals are easier to mitigate when these tools are in place.

Larger hospitals with multiple buildings and parking structures might be concerned with parking infractions and parking lot access issues. For example, these problems might include unauthorised access to assigned parking areas via tailgating or using unauthorised credentials. Access control helps bring parking management and reporting to a parking system that is more advanced than general parking.

Video management software

XProtect video technology brings a broad set of open-platform solutions to address many of these needs. By pairing video surveillance with access control and other systems, XProtect can document incidents, record and flag evidentiary data for later retrieval, and notify security when an incident has occurred.

Many competitors offer a VMS solution for camera management. However, some VMS companies require a proprietary system that does not provide the flexibility you find with XProtect’s open platform. Milestone works with hundreds of technology vendors to ensure their products work with XProtect video technology.

Author's quote

The technology partners’ products are stand-alone solutions, when they pair with XProtect

While the technology partners’ products are stand-alone solutions, when they pair with XProtect, the client sees the advantages of managing third-party tools via one platform.

Johnson tells us, “Milestone is compatible with the vast majority of access control and video equipment, ushering healthcare compliance and training efficiency to the front of the line while continuing to use existing equipment. At a healthcare organisation where I previously worked, we used the same cameras and, in some cases the recording servers, along with an installation of Milestone software, and we were up and running quickly and in compliance with the accreditation agencies.”

Milestone Systems and XProtect

Milestone aims to make the world see by giving people the power to understand video surveillance and data. Together with the partner community, empower customers to get more from video technology. Milestone is a pioneering provider of open-platform video management software. XProtect VMS integrates with a vast number of cameras and best-in-class business solutions.

XProtect is scalable, starting with the needs of the healthcare business and growing as the organisation expands over time.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Audio surveillance
  • Retail surveillance
  • Digital video surveillance
  • Remote video surveillance
  • IP video surveillance
  • Hospital security
  • Commercial security
  • Healthcare security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Facial recognition systems
  • Video analytics
  • Remote video monitoring
  • Electronic access control
  • Security guards
  • Identity management
  • Security seals
  • Security training
  • Institute security
  • Retail security
  • Wireless security
  • Door access control
  • Security software
  • IP Surveillance
  • Security service
  • Video compression
  • Hybrid security
  • Hybrid surveillance systems
  • Human identification system
  • Human area network
  • Outdoor video surveillance
  • Visitor management systems
  • Indoor surveillance
  • Day/Night surveillance
  • IP security solutions
  • Covert Surveillance
  • Security communication
  • Integration software
  • Cyber security
  • Mobile communications
  • Video Management System
  • Internet of Things (IoT)
  • Indoor Security
  • Central Monitoring
  • Data Security
  • IR cameras
  • Network Video Recorders
  • Digital Video Recorders
  • Video Encoders
  • IP transmission
  • Security Assessments
  • Cloud security
  • Artificial intelligence (AI)
  • Video surveillance
  • COVID-19
  • Touchless Security
  • Related links
  • Networkable Access control readers
  • Card Swipe Access control readers
  • Standalone / Networkable Access control readers
  • Smart Card Access control readers
  • Related categories
  • Bollards
  • Access control readers
  • Gates
  • Storage
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec