Illustra Video Surveillance software(1)
American Dynamics, part of Tyco Security Products, recently announced the latest version of the victor unified video management system. victor v4.1 makes it fast and easy for airports, universities, hospitals and other large sites to display, manage and prioritize video and events with its Command Center. Control room operators can easily manage hundreds of cameras across tens of monitors, control where event video will display and quickly and easily share critical video or event information with other security personnel on site or anywhere on the network. This “Push” capability works with IP or analog cameras, video clips, event information – virtually anything an operator has on their screen can be “pushed” to any other operator on the system. “When we looked at the critical requirements of high security facilities, the victor Command Center feature was right at the top,” said Dave Jackson, senior product manager for American Dynamics. “Getting a video of someone breaking into a facility is only useful if the security personnel closest to that event know about it. This “push” feature increases security exponentially by allowing operators to get the video in front of the right person immediately…even if that person isn’t in the same building.” victor v4.1 also makes it easier and faster to find events in weeks of recorded video with its SmartSearch and enhanced “Investigator Mode”. With SmartSearch, security officers can search days or weeks of video in seconds to easily find the last person who entered a restricted area, or when a laptop or other object was moved. Once an event is identified, Investigator Mode then simplifies the process of finding video on related cameras, time-synchronizing the view and exporting video from all related cameras. New, easy-to-use clip export and still image capture tools in victor produce high-resolution still images and videos that security personnel can use both internally/externally and with law enforcement. “With each release of victor and VideoEdge, we listen carefully to our customers to include the most vital business-enabling requirements,” continued Jackson. “This release builds a strong bridge to the wider American Dynamics community with integration with our HDVR hybrid recorder and our analog matrix switcher system to enable the majority of our customers to enjoy one unified video management experience.” The victor unified video management system is available through American Dynamics worldwide network of authorized integrators.Add to Compare
Browse Video Surveillance software
Video Surveillance software products updated recently
AI has opened doors to many transformation opportunities and increasingly minimised many risks -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing counterfeit, low-quality products. Transnational organized crime generates revenue of $2.2 trillion through transnational criminal organizations, complicit corrupt facilitators, and other threat areas. The list of criminal activities is long and involves such horrific crimes as trafficking of narcotics, opioids, arms, humans, fake medicines and other counterfeit and pirated goods; illegal tobacco and alcohol; illegally-harvested timber, wildlife, and fish; pillaged oil, diamonds, gold, and other natural resources and precious minerals; stolen antiquities; and other contraband or valuable items sold across streets, social media, online marketplaces, and the dark web. In short, illicit trade is a contributing cause to large-scale insecurity and instability across markets. AI-driven technologies Here is where revolutionary AI-driven technologies come in, with their capability to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. There are a few ways that AI can support the ongoing fight against illicit trade on a global scale in a tangible way. Transnational organized crime generates revenue of $2.2 trillion For financial transactions at risk of fraud and money laundering, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents -- often billions of pages of documents -- in a short period of time. Among these documents widely in circulation, most have an unstructured and inconsistent format -- from invoices to insurance documentation -- are a complex system to tackle; in this whirlwind of pages, the likelihood of non-compliant and misrepresented figures to go by unnoticed. But this is also where AI can thrive as solutions become a necessity, enhancing humans’ capabilities of identifying fraud risks in the early stages. Relying on natural language processing, the technology can begin interpreting the text from the scanned and digitised documents in order to process trade information at high speed. In this context, AI-powered solutions are capable of comparing, contrasting document information and identify anomalies worth looking into further. By automating a large portion of the process, AI-driven technology allows the staff to focus on more pressing, high-involvement issues that require human judgement while saving time on the time-consuming manual work of analyzing documents by hand. Identifying covert interactions between criminals As criminal networks become increasingly intricate in their illegal operations, cutting-edge AI technology is crucial in the battle against it. In 2019, EU launched a project with the goal to deploy advanced AI technology and robots to identify smuggling across the borders of Portugal, Estonia, Italy, Greece, Bulgaria, Romania and Hungary. With the help of AI, it will be possible to send drones and autonomous vehicles to the most dubious border areas in order to enforce border control and detect smugglers quickly and efficiently. Illicit trade triggers a chain reaction of negative impact across industries, governments and individuals The issues the EU is trying to address through the project include drug and weapon smuggling, as well as human trafficking. From tight border control tracking crossings to communication monitoring to identify covert interactions between criminals on both sides of the border, the project is one among many that will expand the scope of solutions to the illicit trade problems today. AI’s contribution is significant on many levels: from predicting crime and threats to safeguarding public health and safety (in face of human trafficking, counterfeit medicines, and toxic products), these are simply inklings of major shifts that AI technology promises for the future of the battle against illicit trade. So why is fighting illicit trade so crucial? Here are a few reasons why AI’s role in fighting this global issue is crucial. In a world where customers run the risk of being deceived and tricked into buying counterfeit products, companies who provide the original products suffer through the loss of revenue and market share. The same companies are also robbed of their intellectual property and proprietary data. Furthermore, people who are employed in these companies run the risk of losing their jobs as a result of revenue and market share loss. And finally, the last straw is the loss of brand integrity and reputation to the need to compete with low-quality, sometimes even dangerous counterfeit products. Just like a domino effect, illicit trade triggers a chain reaction of negative impact across industries, governments and individuals. And it’s time for AI to step in and stop it.
Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network cameras shipped by 2023 – there is a fast-growing desire for reliable storage on-board security cameras. The question for businesses is: do they look to break up their existing smart video network, by separating and compartmentalising cameras to handle data requirements, or do they increase its storage capabilities? As some people begin to venture out and return to work following initial COVID-19 measures, we are also seeing demand for thermal imaging technology increase. New technology like this combined with more of these always-on systems being rolled out, means organizations will need to carefully consider their smart video strategy. Newer edge computing will play an important role in capturing, collecting, and analyzing data and there are some key trends you can expect to see as a result of this evolution. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. Edge computing and smart security As public cloud adoption grew, companies and organizations saw the platform as a centralized location for big data. However, recently there’s been opposition to that trend. Instead we are now seeing data processed at the edge, rather than in the cloud. There is one main reason for this change in preference: latency. Newer edge computing will play an important role in capturing, collecting, and analyzing data Latency is an important consideration when trying to carry out real-time pattern recognition. It’s very difficult for cameras to process data – 4K surveillance video recorded 24/7 – if it has to go back to a centralized data center hundreds of miles away. This data analysis needs to happen quickly in order to be timely and applicable to dynamic situations, such as public safety. By storing relevant data at the edge, AI inferencing can happen much faster. Doing so can lead to safer communities, more effective operations, and smarter infrastructure. UHD and storage AI-enabled applications and capabilities, such as pattern recognition, depend on high-definition resolutions such as 4K – also known as Ultra High Definition (UHD). This detailed data has a major impact on storage – both the capacity and speeds at which it needs to be written, and the network. Compared to HD, 4K video has much higher storage requirements and we even have 8K on the horizon. As we know, 4K video has four times the number of pixels as HD video. In addition, 4K compliant video supports 8, 10, and 12 bits per channel that translate to 24-, 30- or 36-bit color depth per pixel. A similar pattern holds for HD — more color using 24 bits or less color using 10 or 12 bits in color depth per pixel. Altogether, there is up to a 5.7x increase in bits generated by 4K vs. 1080 pixel video. Larger video files place new demands on data infrastructure for both video production and surveillance. Which means investing in data infrastructure becomes a key consideration when looking into smart security. Always-on connectivity Whether designing solutions that have limited connectivity or ultra-fast 5G capabilities, most smart security solutions need to operate 24/7, regardless of their environment. Yet, on occasion, the underlying hardware and software systems fail. In the event of this, it is important to establish a failover process to ensure continued operation or restore data after a failure, including everything from traffic control to sensors to camera feeds and more. Consider the example of a hospital with dozens or even over a hundred cameras connected to a centralized recorder via IP. If the Ethernet goes down, no video can be captured. Such an event could pose a serious threat to the safety and security of hospital patients and staff. For this reason, microSD cards are used in cameras to enable continuous recording. Software tools – powered by AI – can then “patch” missing data streams with the content captured on the card to ensure the video stream can be viewed chronologically with no content gaps. Thermal imaging Health and safety is the number one priority for all organizations as people return to work and public spaces. Some organizations are deploying thermal imaging to help screen individuals for symptoms as they return. Organizations that operate with warehouses, depots and assembly lines will traditionally have large amounts of cameras located outside of the entrance. With thermal imaging smart video in place, these cameras can now serve a dual purpose as a screening device. The thermal imaging technology is capable of detecting elevated body temperatures, with 10-25 workers being scanned in one shot, from one camera – making it an efficient and accurate process. This way, staff can use the information to help identify people who may need further screening, testing, and/or isolation before returning to work. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices While this may not increase data storage requirements, it can change your retention policies and practices. Smart security today is about utilising AI and edge computing, to deliver an always-on, high-resolution video provision that can help keep people safe 24/7. These trends increase the demands and importance of monitoring, which means requirements of the supporting data infrastructure improve to match that, including the ability to proactively manage the infrastructure to help ensure reliable operation. Companies need to make sure they have considered all the storage and policy challenges as part of their smart security strategy for the future.
Stadiums around the world are still paralyzed from the effects of COVID-19. Fans and spectators in masses have been absent from stadiums since April and there doesn’t seem to be a concrete plan on how or when they’ll be able to return to near capacity. The NBA recently opted to form a bubble philosophy concept in Disney’s facilities, although it’s been a relative success, it’s also been a $200 million temporary solution. This then begs the question: How long can stadiums survive like this without spectator’s present? History tells us that stadiums, venues and sport recover from disasters, so what can stadiums do to speed up the process? This is the catalyst for AI to be integrated on mass level to stadiums around the world. AI is the answer AI’s role in getting fans and spectators back is huge, through capabilities such as: Social Distance Monitoring Crowd Scanning/Metrics Facial Recognition Fever Detection Track & Trace Providing Behavioural Analytics Technologies such as IREX.ai is now working alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. Stadiums around the world are still paralyzed from the effects of COVID-19 AI surveillance software such as IREX.ai when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. Crowd metrics Arming stadiums with AI-powered surveillance tools can detect crowd metrics such as “people counting” and “group statistics”. This ensures stadium personnel can monitor social distancing with precision, accuracy and immediately. Alerts can be set up throughout parts of the stadium to alert senior staff members when overcrowding can appear with real time videos, analytics and photos to their hand-held device, such as a smartphone. Fever detection Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures. What IREX.ai implements is an alert system, coupled with facial recognition of any individual(s) that read an elevated body temperature. This alert system then provides security and health officials with a photo of the individual with the elevated body temperature, meaning staff can react quicker to the situation prevent this individual from entry. Pandemic monitoring by facial recognition Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures Through facial recognition, staff members will be able to locate individuals through simply uploading a photo. It has never been easier to find a person of interest. With masks becoming an everyday part of society, facial recognition has come under scrutiny regarding the accuracy when a mask is worn. Irex.ai still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any individuals not wearing a mask. Another important aspect of facial recognition is finding persons of interest quickly through technology like IREX.ai’s “searchveillance”. The future is here. Designated staff can track a person from when they enter the stadium by simply uploading their photograph. An example of how this can assist stadium personnel is to help relocate lost children inside the stadium with their guardians/parents when they are separated. Another attribute would be any individuals banned from entering the stadium would trigger alerts once they appear under surveillance, a fantastic collaborative tool to use with Law Enforcement. Return on investment With security solutions, one of the biggest issues with any security investment is a lack of an ROI. This is where AI security is breaking the mould. The ability to provide business analytics, consumer/fan behaviours, traffic patterns, etc, allows other departments within the organization to gain vital information that can assist with their strategies and practices. Stadium security will never be the same in a post-COVID world, so why will its practices stay the same? AI & Stadiums is no longer the future, it’s the 2020 solution.
Johnson Controls introduces the Tyco HD Encoder, an ideal solution that allows high definition (HD) and standard definition (SD) analog cameras to function within an evolving IP infrastructure. The product is supported by both exacqVision, American Dynamics and VideoEdge. IP video surveillance Available in one-and four-channel options, the Tyco HD Encoder allows users in networked environments to retain HD and SD cameras while adding IP cameras over time, leveraging the benefits of IP while utilizing their existing analog infrastructure. Encoder hardware adapts analog video to be sent over IP networks, helping CCTV systems upgrade to a modern IP video surveillance organization. The HD Encoder is ready for deployment out-of-the-box and is Power over Ethernet enabled for minimal cabling by running power and data through the same CAT5/6 cable. The encoder also includes important features like HDMI out, H.264 compression for cameras up to 2MP, multi-streaming and support for AHD, CVI and TVI analog protocols. Fully integrated video system Tyco provides network video recorders and video management systems from American Dynamics and Exacq, offering the foundation for a fully integrated video system. Purchasing each aspect of the solution from the same vendor reduces potential product lifetime issues while streamlining setup and support.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Related white papers
Market Report: Cannabis At A Glance
6 Questions To Ask When Choosing A Security System
Optimize Your Business with Analytics and AI
5 Security Lessons For Navigating COVID-19Download
Cloud Video and Smart CitiesDownload
Security Investments Retailers Should Consider For Their 2021 BudgetDownload
Bosch Security Systems Protect Unmanned Train Depots On Southeastern Rail Network In The UK With Intelligent Video Analytics
ZeroEyes’ AI Weapons Detection And Proprietary Solution Chosen By Kenosha Unified School District To Enhance Campus Security
- Bosch Security Systems Protect Unmanned Train Depots On Southeastern Rail Network In The UK With Intelligent Video Analytics
- ZeroEyes’ AI Weapons Detection And Proprietary Solution Chosen By Kenosha Unified School District To Enhance Campus Security
- Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker
- VIVOTEK Collaborates With Existo To Deliver A Comprehensive Surveillance Solution For Michigan Cannabis Cultivation Facility