Healthcare security applications
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the sick and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern...
Since 1967, Southside Medical Center has been providing affordable healthcare and related services to the insured, underinsured, and uninsured in downtown Atlanta. As one of the oldest and largest community health centres in Georgia, Southside Medical Center has continued to advance healthcare in the area by becoming the first Federally Qualified Health Center (FQHC) of Excellence to offer additional services beyond primary care. “We are in a new era and are moving forward with plans to ha...
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and econom...
The City International Hospital (CIH) is a new multi-specialty hospital located within the Binh Tan district in Ho Chi Minh City, Vietnam. Located in the International Hi-Tech Healthcare Park, CIH features the latest medical technology and imaging equipment. With a large volume of visitors anticipated at the hospital every day, the need for a best-in-breed surveillance solution was a high priority from the onset of the project. To fulfill this requirement, hospital administrators turned to Citek...
Hamilton Health Sciences, a March Networks customer since 2004, is the second largest healthcare organization in Ontario with seven hospitals and 11,000 employees serving 2.3 million residents in Hamilton and the surrounding area. Keeping patients, staff and visitors safe, and protecting the organization’s physical assets in so many locations is a demanding job, but a monitoring center with a video wall and March Networks DecodeStation VX software has been a game changer. State-of-t...
Background When the security team at Palmetto Health Baptist, an acute care Medical Center in Columbia, S.C., invested in an upgrade to their surveillance cameras from black-and-white to color, they did so with the expectation that it would significantly improve the quality of video they were capturing. Unfortunately, this turned out to be the equivalent of putting new paint and tires on a car that really needs a new engine. In the hospital’s case, the new cameras only made it more eviden...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernized halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European Physical Security Market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organizers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimized hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly Modernized Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting program. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The program opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will center on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive Program A Security Expert Forum in Hall 2 will present a continuous program with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the program will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
Virtua called on the services of CM3 Building Solutions of Fort Washington, Pennsylvania to design and install their new system, as well as local manufacturer’s representative, ASR Enterprises, Inc. to assist with equipment selection. After choosing ExacqVision NVRs, Virtua’s management team met with various megapixel camera suppliers to review their product lines and to see demos. After extensive testing and analysis, Arecont Vision megapixel cameras were selected for Virtua’s new system as a result of their superior resolution, processing power, product selection and use of H.264 compression technology. New Arecont Vision megapixel cameras added to the security systems throughout Virtua’s facilities are connected to ExacqVision’s hybrid network video recorders (NVRs). The system design allows for the seamless transition to a networked platform over time, eliminating the need to immediately replace all existing analog cameras. The hybrid recording solution also enables Virtua to immediately capitalize on the performance and cost efficiencies of Arecont Vision megapixel cameras in locations where they are most needed, with the ability to easily integrate additional megapixel cameras overtime. To preserve the integrity of security operations, new Arecont Vision megapixel cameras and ExacqVision NVRs are installed on a dedicated network connected by an NVR server with dual network interface controller (NIC) cards. This method isolates video bandwidth from the hospital’s data network until video needs to be viewed via a remote client. The NVRs are installed locally with varying storage requirements based on current camera counts and anticipated future expansion. Virtua’s smaller facilities have 2 Terabytes of storage, while hospitals and larger facilities have storage capacities ranging from 8 to 40 Terabytes. Surveillance and access control systems for Virtua’s hospitals, long-term care facilities, health and fitness centers, and corporate business services facilities are monitored centrally at the company’s Incident Command Center (ICC) located in Camden, New Jersey. The ICC is the location that also dispatches security personnel to all facilities. The megapixel cameras used throughout the Virtua system include Arecont Vision models AV8185, AV3155DN-1HK, AV2155 and AV3105. Arecont Vision’s SurroundVideo® AV8185 is an 8 megapixel, 180-degree panoramic H.264 IP camera that incorporates four 2-megapixel CMOS image sensors to provide 6400x1200-pixel panoramic images at 5.5 frames-per-second (fps). Th e panoramic view can also be set at lower resolutions to provide faster frame rates, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. Low-light sensitivity is 0.2 lux at F2.0. The 180-degree panoramic camera can substitute up to 24 analog cameras. Features include image cropping and up to four regions of interest for forensic examination and digital PTZ. The megapixel cameras used throughout the Virtua system include Arecont Vision models AV8185, AV3155DN-1HK, AV2155 and AV3105 Virtua also uses 2 and 3 megapixel Mega- Dome® IP cameras from Arecont Vision. Model AV3155DN-1HK is a 3 megapixel H.264 network (IP) MegaDome integrated camera, lens and IP66-rated dome providing 2048x1536-pixel images at 15 fps and 0.2 lux light sensitivity at F1.4. Features of the all-in-one camera include a 1/2” CMOS sensor and Arecont Vision’s Mega-Video® image processing at 80 billion operations per second. The camera employs H.264 (MPEG 4, Part 10) compression to minimize bandwidth and storage requirements while maintaining real-time image resolution. Capabilities include motion detection, image cropping, region-of-interest viewing and the ability to zoom into an image after it is archived (forensic zooming). Virtua uses the day/night (DN) model featuring a motorized IR cut filter which is removed in low light conditions to provide increased sensitivity. The 2 megapixel Arecont Vision AV2155 MegaDome® has similar features and provides 1600x1200-pixel images at 24 fps, with low-light sensitivity of 0.1 lux at F1.4. Both domes feature a camera gimbal with 360-degree pan and 90-degree tilt adjustments for easy installation. Also used at various Virtua sites is the Arecont Vision’s AV3105 3 megapixel box camera, which has specifications similar to the Arecont Vision AV3155 dome. Megapixel Benefit The image quality and digital PTZ capabilities of Arecont Vision megapixel cameras far exceed analog and conventional IP cameras allowing Virtua to capture and record extremely detailed video images over large coverage areas. Combined with recent cost reductions in NVR storage and network switches, the use of fewer cameras allows Virtua to transition to high-quality video with the highest levels of cost-efficiency, which translates into lower total cost of ownership and overall higher ROI. Arecont Vision’s megapixel cameras also allow for significant upgrades in system functionality compared to standard-resolution IP cameras. In addition to lower bandwidth and storage requirements, megapixel cameras dramatically decrease costs related to other elements of a system, including fewer software licenses, fewer lenses and a decrease in man-hours needed to install and operate systems. Additionally, Arecont Vision megapixel cameras’ ability to provide highly accurate digital PTZ functionality translates into fewer moving parts than traditional PTZ systems, which reduces maintenance costs and the potential for failure. “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several AV8185 panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results,” said Paul M. Sarnese, System Safety Director, Virtua Health. “The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua.” The Arecont Vision system proves its value on a daily basis monitoring more than 4 million square feet of coverage area. After a recent incident at one facility, Virtua’s ICC staff reviewed crystal clear megapixel images within minutes and quickly distributed them to security managers and personnel throughout the enterprise for immediate action.
Security surveillance specialist AD Network Video is introducing its enhanced integrated HD IP video solution for hospitals. Virtual NVR delivers high definition IP video images for evidential purposes which directly tackle theft and anti-social behavior in a completely secure way. The Virtual NVR aims to offer hospitals secure environments, a culture of safety for patients, visitors and staff. The new solution offers video of high quality that can be used for whatever action is appropriate, including legal action if necessary. The Virtual NVR solution intelligently distributes video storage across single or multiple locations, with IP cameras recording and storing images on the in-camera server. These will carry on recording even in the event of a network outage as the devices operate as if they were standalone systems resulting in no single point of failure. The evidential recordings are easily accessible locally or from the control room via a single user interface and are exported in compliance with police and home office guidelines. Recordings can be archived and managed from a central location driving greater efficiency and flexibility in locating and retrieving video from multiple sites. Virtual NVR's secure and segregated network enables hospital operators to implement the HD IP camera solution and integrate event triggers. Virtual NVR has flexible and scalable qualities, from general practices to large hospital trusts. AD Group, of which AD Network Video is the solutions arm, has developed security surveillance solutions for more than 30 years. Current solutions include FireVu for early fire detection, and for logistics losses, TransVu. Both can be used in healthcare environments
Bon Securs Hospital, Galway, has integrated the SALTO XS4 Locker Lock into the drug and medicine cabinets used within a new build extension to the hospital to control when and by whom patient medication can be accessed.Bon Secours Hospital Galway is a 120 bed acute care facility, providing a wide range of surgical and medical services. It is part of the Bon Secours Health System, the largest private healthcare provider in Ireland, and currently admits 18,000 patients per annum, comprising 6,000 in-patients and 12,000 day-cases. A substantial expansion plan has seen 50 new Patient Bedrooms, a Physiotherapy Department, a new Restaurant and enhanced Laboratory, Medical Stores and Office Accommodation added to the hospital.“The XS4 Locker lock is designed to provide a high level of security protection and is ideal for use with drug and medicine cabinets as well as for more general use with hospital staff lockers” said Stephen Foley from Doorware, SALTO’s Irish distributor who carried out the installation at the hospital. “We’ve installed 32 drug and medicine cabinets with the new electronic locks and these now ensure that only authorized, accredited medical staff can access the drugs and medicines contained within them. Every time the cabinets are opened the event is automatically logged via their audit trail facility (the lock continuously records the last 1,000 operations in its memory) giving hospital management a useful security record.”XS4 Locker has been designed to offer the latest in state-of-the-art electronic access control technology in a low cost simple retro-fit format to solve the problem that most lockers, including those routinely used by hospitals, are supplied with very basic mechanical locks that usually offer little in the way of resistance to thieves. The XS4 Locker is designed to offerthe latest state of the art access controltechnology It can be fitted to most cupboards and cabinets to control access to any drugs, medicines or other equipment stored on site and upgrading from an existing mechanical lock is quick and easy. The old lock is removed and the XS4 Locker simply fitted in its place. No wiring is required, power is supplied by 3 AAA or optional lithium batteries good for 30,000 openings, and its exterior dimensions are a compact 54mm x 105mm x 28mm ensuring a neat fit and professional appearance. An ergonomically designed twist operated locking handle makes for easy use, even with wet hands, and its durable wipe clean construction makes it highly resistant to chemicals; UV radiation and physical wear and tear ensuring a long lasting, smart appearance.The access reader is built into the locking handle and the ID carrier - key card, wristband, key fob or bracelet – is simply presented to the reader and XS4 Locker will grant or deny access, providing an intelligent solution for high performance locker security in hospitals in a versatile easy to fit package.
One of England’s oldest childcare centres has invested in an IP network based video surveillance system manufactured by Samsung Techwin, to create a safe and secure environment for its staff and children. Gingerbread Corner, which is located in Croydon, Surrey, was England’s first latchkey scheme. It was established in 1976 with the objective of providing quality childcare for single parents of children aged between 5-11 after school and during school holidays. 37 years later, Gingerbread Corner has evolved and grown. It now provides year-round child-care for more than 160 children between the ages of 3 months and 11 years. An existing outdated analogue CCTV system needed to be replaced. Apart from the fact that there were just four cameras which only allowed the monitoring of entrances and exits, the quality of the images captured and recorded were not of sufficient quality to be of any practical use if and when an incident needed to be investigated. As a registered Charity, Gingerbread Corner relies heavily on its fund-raising activities to maintain and improve its facilities, as well as employing 40 members of staff. Despite concerns over significant funding gaps following the Government’s Comprehensive Spending Review, Gingerbread Corner’s management were determined to allocate sufficient capital for the installation of an effective replacement video surveillance system. “There are so many potential situations where access to high quality video evidence can help protect the children in our care and also verify that our staff has at all times professionally carried out their duties,” said Ben Dzendzera, Gingerbread Corner’s Operations Manager. “For example, with so many children living in single parent environments, we can avoid any disputes by being able to monitor, and if necessary verify, who has collected a child from our premises. Equally important, we can quickly resolve any issues which might arise through accusations of one child bullying another and we have a duty of care towards our staff to ensure they can be protected against any false accusations.” Ben invited a number of different companies to recommend a solution that would meet both Gingerbread Corner’s current and future needs. “It was clear that we immediately needed approximately 20 cameras in order to be able to monitor all activity throughout the site, but we also wanted to ensure that the system we invested in could continue to be expanded if and when our requirements changed.” Some of the quotations received provided for the new system to be analogue based, but Ben and his colleagues decided to take the advice offered by video surveillance and public address specialists Postfield Systems, who recommended that Gingerbread Corner should choose an IP network based system. The cameras offer multiple streaming with a choice of compression methods An analogue system would have provided Gingerbread Corner with a slightly lower cost option, but the justification for allocating the extra capital for an IP network based system was easily made. “One of the key advantages of choosing a Video over IP solution is that it is very flexible in terms of how it can be monitored,” said Ben. “Live or recorded images can be viewed by any authorised member of staff who has access to the Internet. I personally use the Samsung Techwin Net-i Viewer software on my laptop to view the video of any incidents, whilst senior management can access the system via smartphone when they are off site.” A total of 21 Samsung Techwin cameras have been installed, 16 of which are SND-3082 Day/Night network domes. These utilize Wide Dynamic Range (WDR) technology making them ideal for locations where there may be strong contrasting lighting conditions. The SND-3082 features Power over Ethernet (PoE) which means that both power and video/audio transmissions can be provided via a single Ethernet cable connected to Gingerbread Corner’s network. This has resulted in costs being kept to a minimum as there wasn’t a need for coaxial cable to be run to each of the 21 cameras. The five other cameras are Samsung Techwin SNO-1080Rs which are weatherproof cameras, have built in IR lighting and feature PoE. The SNO-1080R is part of a range of cameras which was designed to provide a cost effective network video surveillance solution for small to medium size applications. Both models offer multiple streaming with a choice of compression methods, providing the option to simultaneously transmit images to multiple locations at various frame rates and at different resolutions. This allows different authorised users to monitor live images at one location, whilst recording video evidence at another. The images from all of the cameras are recorded on one of two SRN-1670D network video recorders which have been designed to be user friendly in that they have the look and familiarity of a DVR. “As a non-profit organisation it is difficult to show a return on investment, but there is no doubt that the video surveillance system has given us peace of mind in knowing that if any serious incident takes place we can verify exactly what has happened by being able to retrieve the recorded video.”
Rick Meyer, Executive Director, Friendship Village of Bloomington says, “In my sixth year at the Village, it became very clear to me and my staff how time-consuming and unwieldy our old access control system had become. The community opened in 1979, thirty-two years ago, and the existing access control system had been in place for fifteen years. We realised it was at the end of the road; it was clearly time for us to find a more modern and user-friendly system.” Floyd Total Security Recommended SALTO Rick Meyer further explains, “After evaluating our limited options with the existing service provider, we referred our problem to Floyd Total Security, a SALTO Inspired Business Partner and system integrator, also located in Bloomington, MN. Continuing Care Facilities are of critical interest for Floyd, and Bill Wood, who heads up the company’s electronic locking systems team.” “His team was charged with helping find the best solution for the needs of our project and brought SALTO to our attention.” “We liked the SALTO system from the start and Ray Satterfield, Director of Facility Management, suggested we ask other Lifespace Community facilities to assist in our evaluation. After several group presentations and a couple of site visits, they unanimously recommended SALTO over the other options, as did Gary Conkin, Lifespace Development and Construction Manager, who oversees and approves all construction projects from the corporate office in Des Moines, IA.” Outfitting The Facilities “Floyd met with the management team to understand how they needed various parts of the system to work to best suit our operation. They made sure we could take advantage of everything that the SALTO System could provide. The Village has just opened a new fitness center which was, of course, also protected with the SALTO locks. Various workers at the facility, like nurses and housekeepers have a range of scheduled time needs, and their access cards have been programmed accordingly.” Advantages Of The SALTO System Rick Meyer continues, “The Village was previously equipped with three separate systems; a traditional proximity card system on the perimeter and two generations of offline locks on administrative and resident doors. While these where easy for staff and seniors to use, they proved very costly to operate and maintain. Talk about time-consuming! Our facility has 415 doors with electronic locks for over 1200 cardholders. In order to program the old system to provide access cards for new occupants or to supply replacements for lost cards, a staffer had to carry a laptop with cable to every door lock covered by the new or lost card in order to recode for access. Many man- and woman-hours were lost in resolving these problems.” “Furthermore, we were having trouble getting parts and support for our old system. That was a growing problem, to the point where we actually had to ask some of our residents to go back to using metal keys. Not something we desired for a facility that prides itself on being up-to-date in everything!” “With SALTO it was easy. We no longer have to program at the door and we didn’t have to build an infrastructure with wiring through walls; we used the SALTO Virtual Network. When the locks where installed, of course they required initial programming. But unlike the other options, they don’t require ongoing lock reprogramming at the door as we make access changes. The SALTO Virtual Network (SVN) pushes and pulls data from our “hot-spot” openings to all the offline locks.” “We like the ability to set up the computer and program all the cards, rather than walking around to each location. The fact that Floyd and SALTO can reference many large installations in similar applications helped satisfy us that we’re using a proven product.” Employee Cards He stated, “The Village has about 285 employees including part-time, on-call, high school, etc. Our eight-person maintenance staff functions as security during the morning and early afternoon, followed by two trained security officers for the afternoon, evening, night and weekends. Cards issued to employees are automatically refreshed and updated when used at any of our seven “Hot-spot” doors, which makes it very easy to meet everyone’s access needs on the fly.” If A Card Is Lost “When a card is reported lost, there’s no big crisis. The cards are blank, with no telltale room number or ID, so someone finding it would have no way of knowing what unit the card gave access to. We simply delete it and assign a new one. Once the original card is deleted, it will no longer provide access to the exterior doors either: access is denied and facilities are notified. The lost card is also added to the blacklist of deleted cards which eliminates its value at the interior doors via SVN.” Rick Meyer explained. Friendship Village Population “A retirement facility like Friendship Village has a unique population. Apart from residents in healthcare, skilled nursing and long-term care, where the doors do not lock, there is assisted living, general residency, independent living and twelve free-standing town homes. There are also administrative offices and a variety of special facilities. All of their needs must be carefully addressed to avoid creating unnecessary problems.” “With the new system in the works, administrators set up meetings to alert employees and the resident body to what was coming, so they could appreciate the benefits and improvements. A permanent informational kiosk about the new SALTO system was supplied and staffed by Floyd to provide residents with any information they required.” Expectations Were Exceeded “The installation went well and timelines were met: a week for preparation, loading the software and training, then about four weeks for actual change out of the residence units, with perimeter doors switched over to the new system last. The entire implementation took about five weeks in the summer of 2011. Floyd technicians trained our maintenance personnel on the installation and maintenance of the battery powered door locks. This allows us to remove and install the devices ourselves when we remodel and refresh areas of the facility, a common occurrence with 425 units.” “This SALTO changeover is probably the easiest such install we’ve ever done. Residents feel safer in their units than they did before. Floyd couldn’t have provided a better or more accommodating crew. Our administrators had ample time to get familiar with the new system and feel comfortable with it. Michelle Hasbrouck and Chris Chromey from Floyd backed us up with responses to residents’ concerns and where available when we needed them.” “We would recommend this system absolutely! As a result of our experience, Floyd Total Security has implemented the SALTO Inspired Access Control System at two other Lifespace Communities: Grand Lodge at the Preserve in Lincoln, NE and Abbey Delray South in Abby Delray, FL.” “Two additional facilities in Florida and Pennsylvania are scheduled to begin installation later this year, with the balance coming online over the next two years. We think all our communities will be moving in this direction.” commented Rick Meyer.
As part of the centralization of five Munich hospitals, 20,000 old cards were gradually switched to new LEGIC employee ID cards for time & attendance and access control. With around 3500 beds, 260 day clinic places and 9500 employees, the Klinikum Munich, resulting from the merger of five clinics, is the biggest health service provider in southern Germany, today. As part of the centralization operation of the five hospitals, a central SAP system was implemented. It was decided to implement a certified SAP sub-system from Kaba for time & attendance and access control. At the same time, a company-wide card system was introduced. The areas for which employees use the new LEGIC ID are: time & attendance, access control, in the canteen, at food and clothing distributors. Kaba time & attendance terminals were installed everywhere and then 10,000 old cards were exchanged for the new LEGIC ID card. A further 10,000 cards were then given to sub-contractors and visitors. At the same time, new regulations were put in place regarding the use and payment of the catering facilities in the entire hospital. The Munich-based company Automaten Seitz implemented a cashless payment system (EC machine). Old cash register PCs and distributors were replaced. Now, employees, outside staff, visitors, interns, etc., can eat in any of the hospital’s five canteens without using cash. Access control was also extended. In order to be able to cover new requirements for flexible access profiles, the Kaba Attendance Management module was implemented. All employee authorizations will be taken care of centrally with this module. Central access control regulates, on all premises, access to underground garages or open parking spaces, canteen entry and entry to particularly sensitive areas (laboratories, computer rooms, etc.). The data center, which requires particular protection, is secured with high-security gates. Daniel Wolf from the StädtischenKlinikum, adds: “We have a certified sub-system for time & attendance and access control which is fully integrated in SAP and very stable. Overall, we are very satisfied with the system.”