Part 3 of our Security in Healthcare series

Arecont Vision is seeing a growing number of video applications for healthcare providers
Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities

Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas.

Variety Of Video Applications

Arecont Vision is seeing a growing number of video applications for healthcare providers. Commonly protected with Arecont Vision megapixel surveillance cameras, integrated with a video management system or a network video recorder of the customer’s choice, is coverage of:

  • Entrances and exists to buildings, grounds, parking structures, car parks, and facilities
  • Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, operating rooms, morgues, patient wards
  • Pharmacies, drug storage areas, records storage, store rooms, laundry
  • Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas
  • Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits, and other litigation and compliance
  • Perimeter, parking surveillance and license plate recognition
  • Facial recognition, people counting, movement monitoring
  • Access control and staff identification
  • Visitor, patient, and staff safety

Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities. “Due to the resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results,” says Paul M. Sarnese, System Safety Direct, Virtua Health in New Jersey. “The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua.”

Addressing Accountability

Sacred Health Health System, Pensacola, Florida, uses Arecont Vision megapixel cameras as part of a video surveillance system to look for recorded video of suspicious persons after a description is given, says Michael J. Matroni, Emergency Preparedness and Security Manager, “We are also using it to review slip-and-fall complaints, and to address issues of employee accountability.”

Arecont Vision cameras more than satisfy our requirements for image quality,” says Lai Voon Hon, General Director of Hoa Lam-Sangri-La, a high-tech healthcare park in Vietnam. “The system is working very well for us.” The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. “Our new video surveillance system is an important element of that environment,” says Lai Voon Hon.

Pelco’s open platform concept can help ensure that existing technology can be incorporated when building a new building
Hospitals and healthcare facilities that have multiple sites and locations can benefit from centralizing all video on a single platform

Centralizing Video Onto A Single Platform

One Pelco customer is the University of Arizona Medical Center – South Campus (UAMC South Campus). When adding a new behavioral health hospital tower, UAMC South Campus sought to migrate and expand its existing analog video surveillance system to an IP system that would allow the capabilities of multisite monitoring. Using Pelco’s Endura IP video management system (VMS) with NSM5200 network video recorders, the hospital system was able to centralized all video onto a single platform while allowing several operators to simultaneously look for and view video of daily events. In addition, more than 150 Sarix and Sarix with SureVision technology IP cameras were deployed throughout the new tower, emergency room and most entrances and exits.

The open platform concept that Pelco offers can help ensure that existing technology can be incorporated when adding onto existing infrastructure

Other hospitals and healthcare facilities that have multiple sites and locations can benefit from the kind of technology used at UAMC South Campus – especially using the latest VMS technology VideoXpert and Pelco’s latest IP camera technology, Optera, which offers 180-, 270- and 360-degree views. Additionally, the open platform concept that Pelco offers can help ensure that existing technology can be incorporated when building a new building or adding onto existing infrastructure.

Pelco by Schneider Electric is focused on the development of video surveillance and security solutions for enterprise-class organizations that allow users to make real-time, business-enabling decisions. Pelco offers video management platforms, industry-leading IP cameras and accessories, and other video security products and open platform systems that healthcare facilities require to bring multiple sites and locations together into a single, holistic approach to security.

Multi-sensor Panoramic View Cameras

When Arecont Vision pioneered multi-sensor megapixel cameras with their first offerings in 2006, they were alone in the market in presenting these in place of pan-tilt-zooms (PTZs) and multiple individual cameras Over the past year, the industry has seen many legacy camera vendors offer their own 180- or 360- multi-sensor cameras to try and gain market traction.

Competition is always good, and our own fifth generation SurroundVideo cameras will get even better as a result,” says Jeff Whitney, Arecont Vision’s Vice President of Marketing. “Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analog cameras and PTZs as in the past, and understanding of the benefits of multi-sensor cameras will accelerate. PTZs are a legacy technology just as analog cameras and fisheye lenses are in many situations.”

"Most importantly for healthcare overall, users will see affordable solutions that don’t require multiple analog cameras and PTZs as in the past"

Multi-sensor megapixel camera technology is the way of the future to keep costs down, reduce the numbers of cameras required, shrink maintenance costs, and improve quality and video coverage for healthcare, says Whitney.

Pelco is also seeing an increase in use of 180-, 270- and 360-degree camera technology to cover a larger area, such as a large waiting room or corridor, or a parking garage. The technology in these cameras allow users to pan, tilt and zoom virtually within the picture to pinpoint an incident in real-time or retrospectively. Additionally, there is a significant uptick in violence within healthcare facilities, so it’s imperative that a comprehensive video surveillance system is in place to help identify potential problem areas or threats to the safety and security of patients, healthcare workers, visitors and staff of these large facilities. This can be done through open platform technology that works seamlessly with other cameras, video management systems, alarm monitoring systems and access control, says Kyle Cusson, Business Development Manager, Healthcare, Pelco by Schneider Electric.

360-degree Analytics

Jumbi Edulbehram, Regional President, Americas, Oncam, also expects 360-degree cameras to expand their uses in the healthcare realm.  “Another major development will be the use of analytics, built into the 360-degree cameras, being used to help monitor traffic patterns, streamline hospital operations, increase response times and provide overall, general business intelligence for hospital administrators on ways they can improve operations and management of these facilities,” says Edulbehram. “Using analytics, the possibilities are nearly endless for how patients, staff and visitors can be better served.”

A role that is sometimes overlooked is the growing importance of mobility for security officers in the healthcare vertical. “These facilities – more than ever – need to find ways to deploy effective, yet cost-aware, solutions to protect critical assets, staff, visitors and patients,” says Edulbehram. “Remote monitoring has become mainstream, and mobile applications are growing in popularity because they enable users to fully experience surveillance through 360 degrees, in full high definition from a smartphone or tablet.” The ability of officers to remain mobile while also accessing video on the go offers new flexibility that is critical to the success of any security solution, he says.

Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses
There is a wealth of untapped information within the departments and offices
of hospital perimeters that can be analysed to improve security strategy

Expanding How Video Is Used In Healthcare

With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims.

What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Additionally, IT innovations will drive continued technology investment – hyperconvergence and virtual desktop infrastructure (VDI) deliver new levels of cost saving and opportunities for efficiencies, he says. For example, a VDI environment can automatically lock users out of a device after three minutes of inactivity or if they have swiped into a different workstation. Additionally, VDI drives mobility, allowing medical staff to roam from environment to environment to improve patient care and hospital operations.

Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims

As in hospitals and healthcare facilities, the world of video analytics is gaining ground in vertical markets such as retail, government and corporate enterprise applications, says Steve Birkmeier, VP of Sales and Business Development, Arteco. “There is a wealth of untapped information within the many departments and offices of hospital perimeters that can be analyzed to improve security strategy in the future,” he says.

Video Event Management Software

Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols.

Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare as well, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products.  If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. “At Tyco Security Products, we are making smart solutions that use native analytics and intelligence to help security operators determine when they need to record video and have that top quality image. It’s a cost-effective way to use high-resolution imaging,” he says.

Read Part 4 of our Security in Healthcare series here

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More

Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.

Smart Offices: How Is Mobile ID Changing The Way We Access The Office?
Smart Offices: How Is Mobile ID Changing The Way We Access The Office?

If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points, and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient, and extremely user-friendly. More and more businesses are realizing the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organizations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.