Healthcare security applications
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive vide...
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’...
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individu...
It creates challenges when a mechanical locking system grows organically over the years: Managers at South Denmark’s Syrenparken mental health treatment facility no longer had a trustworthy overview of all their physical keys in circulation. Yet, to serve the people treated there, Syrenparken must store medicines and psychotropic drugs. However, it is critical that only trusted personnel gain access. On-site access control solution As part of a modernization program, it was decided to u...
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could...
A total overhaul of care and safeguarding measures at Southern Health NHS Foundation Trust’s mental healthcare facilities was required following historic failures, including preventable deaths in 2012 and 2013. A root-and-branch reform program was put in place to improve care, ensure transparency and cut risks. A comprehensive video surveillance solution was sought to underpin these efforts. The first phase project required complete video capture and recording at the Ravenswood House faci...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, Global President of Stanley Security Products and Solutions. Stanley Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, Stanley is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics Stanley manages very large, multi-national clients. As a consequence, the Stanley security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, Stanley is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at Stanley,” says Kushner. Stanley’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) Stanley has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to Stanley’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the Stanley brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that Stanley is “open and actively looking for properties that fit our commercial growth strategy.” He notes that Stanley focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers Stanley has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. Stanley is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. Stanley is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. Stanley is also developing a tight integration with Lenel’s mobile credentialing system. Stanley is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says Stanley heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” Stanley is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centers, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wireless escutcheons have been installed across the CPN premises integrated with the access control system from Delta Security Solutions, most on the doors to patients’ rooms. Now, everyone the ability to circulate freely without needing to carry a cumbersome key. Tracking Door Security In Real Time Because the Aperio integration at CPN is online, security staff can now keep track of all door security in real timeBecause the Aperio integration at CPN is online, security staff can now keep track of all door security in real time — which was not possible with the old mechanical master-key system. If a resident loses their credential, facilities staff simply cancel it instantly and reissue another, ensuring security at the site remains intact. Some dorm-style rooms at CPN have multiple beds; in these, Aperio escutcheons secure cupboards for every inpatient, so their personal belongings are kept safe without physical keys or needing to remember PIN codes. The old key-operated safes have been removed, saving CPN the recurring cost of re-keying or replacing safe locks. Securing Pharmacy And Medicine Store The Aperio H100 handle packs the power and flexibility of Aperio wireless access control into one slim interior door handle“Previously when a unit key was lost, we would have to change every cylinder it opened — which for some keys would be very expensive,” says Cédric Marchal, technical services engineer at CPN. At CPN, Aperio devices also secure areas where residents are not permitted, including staff rooms, offices and sensitive zones like the pharmacy and medicine store. Alongside the escutcheons deployed at CPN, the Aperio device range includes online and offline Aperio cylinders; an online security lock; a wireless lock for bringing server racks and cabinets into the same access control system as doors; and the new Aperio H100 handle, which packs the power and flexibility of Aperio wireless access control into one slim interior door handle. Every year since 2011, CPN have budgeted for an expansion in their Aperio system. Every year, more doors at their site are covered — enhancing the safety and well-being of patients. Enabled by Aperio wireless access control technology, the upgrading process continues. Learn more about Aperio and visit: https://campaigns.assaabloyopeningsolutions.eu/aperio
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the sick and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Connecticut. A Challenging Safety Diagnosis Avigilon has made us more efficient as we don’t have to spend much time sifting through large amounts of video” Charlotte Hungerford Hospital prides itself on supporting patient and staff safety in all hospital areas and locations. Several years ago, they found themselves with an outdated security system that lacked quality video coverage and recording capabilities. CHH struggled with reliable video playback and faced frequent system crashes. As a result, the hospital’s security operators were often unable to provide accurate evidence during forensic investigations and many liability claims and hospital incidents went unresolved. CHH needed a cost-effective, comprehensive security solution that could protect patients and staff across multiple locations while still being flexible enough to scale with the hospital’s growing needs. Avigilon AI & Analytics Technology With a desire to improve its legacy security system, CHH looked to Avigilon’s advanced artificial intelligence (AI) technology and video analytics to meet their security needs. CHH began a multi-phase upgrade that included installing over 100 Avigilon cameras with self-learning video analytics, deploying AI-based Avigilon Appearance Search technology and using impulse radar technology with the Avigilon Presence Detector (APD) Sensor. Avigilon Appearance Search technology – a sophisticated deep learning AI search engine – helps CHH quickly locate a specific person or vehicle of interest across all cameras both inside the hospital and care centers as well as outside parking lots. This technology provides CHH’s operators with enhanced situational awareness, enabling fast event response and helping to save time and effort during critical investigations. To protect areas of the hospital where cameras cannot be installed, CHH installed the Avigilon Presence Detector (APD), a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment. Avigilon Presence Detector Sensors Our Security Department’s mission at Charlotte Hungerford Hospital is the safety of our patients, visitors, and employees" Capable of detecting persons who aren’t moving or are hidden, the APD sensors help improve situational awareness for CHH staff, and are used in areas where cameras are not permitted, such as restrooms or change rooms. When integrated with Avigilon Control Center (ACC) video management software, APD sensors alert CHH operators of human presence while still maintaining privacy. Avigilon H4 cameras were used throughout the hospital to provide exceptional image quality and built-in self-learning video analytics, which provides accurate detection and notification of movement of people and vehicles. CHH also deployed HD Multi-sensor cameras which provide up to four camera views per camera installation, using only one camera license and network drop. This allows CHH’s staff to efficiently cover all angles in order to detect, verify, and act on potential security events across the hospital’s premises. Avigilon H4 and HD Multi-Sensor Cameras At the core of CHH is a desire to help the community and still serve as the beacon of compassion it was founded to be 100 years ago. With these values in mind, the hospital’s mission when it comes to security is the safety of patients, visitors, and employees. Avigilon’s AI solutions have helped achieve this by moving the CHH system from legacy to advanced and providing effective monitoring around the clock while also helping to create operational efficiencies. Since deploying ACC software, CHH’s operators spend significantly less time reviewing recorded video, allowing them to focus on proactive event response. Working with Avigilon, Charlotte Hungerford Hospital has a roadmap for continued growth and exceptional patient safety.
Since 1967, Southside Medical Center has been providing affordable healthcare and related services to the insured, underinsured, and uninsured in downtown Atlanta. As one of the oldest and largest community health centres in Georgia, Southside Medical Center has continued to advance healthcare in the area by becoming the first Federally Qualified Health Center (FQHC) of Excellence to offer additional services beyond primary care. “We are in a new era and are moving forward with plans to have the nation’s first Federally Qualified Health Center of Excellence,” explained David M. Williams, MD, CEO at Southside Medical Center. “Having state- of-the-art technology will help get us there in an efficient and reliable manner.” In its quest to provide advanced patient care, Southside Medical Center has made security a top priority, deploying the Avigilon High Definition (HD) Surveillance System to ensure the safety of more than 30,000 patients, 30 physicians, and 240 employees. High-Performance Surveillance SystemWe can now rely on the clarity and performance of the Avigilon HD Surveillance System to capture the necessary detail" Southside Medical Center faces many serious security challenges, including physical disputes among patients and theft. “We also have armed individuals who are not necessarily gang members entering our facility on a regular basis, providing another layer of risk and concern,” explains Barlon Lundgren, JD, CHPA, and director of corporate affairs at Southside Medical Center. “With a relatively small security team, we rely on the performance and image clarity of the Avigilon HD System for around-the-clock surveillance and investigations as incidents occur.” With limited security personnel on site, Southside Medical Center needed a high-performance surveillance system to monitor the 46,230 square feet facility and three adjoining parking lots. The previous analogue-based system simply could not meet the medical centre’s needs. “The analogue system was grainy, monochrome, and couldn’t zoom to capture specific details when needed,” notes Lundgren. “With a high rate of break-ins, we can now rely on the clarity and performance of the Avigilon HD Surveillance System to capture the detail we need to identify, confirm, and ultimately, convict.” Three of the Avigilon cameras were installed specifically to capture license plates" Analog To IP Surveillance Migration Working with the security experts at Southeastern Security Professionals LLC, a provider of design, installation, and service of life safety and security systems in the Southeast Region, Southside Medical Center installed one Avigilon 16-megapixel camera in addition to several Avigilon 11 and 5-megapixel cameras on the exterior of the facility for perimeter monitoring. “Three of the Avigilon cameras were installed specifically to capture license plates,” explains Lundgren. To further boost the Avigilon HD Surveillance System, Southside Medical Center kept its existing 28 analogue cameras, which have been installed throughout the interior of the facility. Nine Avigilon analogue video encoders were used to integrate the existing analogue cameras into the new Avigilon HD Surveillance System, creating a high-performance hybrid system that facilitates the migration from analogue to digital as budget allows. Southside Medical Center also installed three Avigilon HD network video recorders (NVRs) to store up to 14 days of continuous surveillance footage and plans to add a stand-alone storage system to boost storage capacity to 30 days for greater scalability. Efficient Face And License Plate Capture With the Avigilon HD Surveillance System in place, we can find what we are looking for twice as fast" According to Lundgren, the primary goal of the Avigilon HD Surveillance System is to capture the detail required for evidence collection. “The bulk of our time is spent reviewing footage for investigative purposes,” says Lundgren. “With the Avigilon HD Surveillance System in place, we can find what we are looking for twice as fast as we could with our previous analogue-based system.” This feature was put to the test on the first day that the Avigilon HD Surveillance System was installed. Four teenagers entered the premises in a stolen vehicle and stole a second car from the parking lot. “Leveraging the zooming capabilities of the Avigilon 11- and 5-megapixel cameras, we were able to capture facial details and license plate numbers that we immediately shared with the police.” Law enforcement officials have since retrieved the stolen vehicle and the perpetrators have been charged with theft. Simplifying Remote Surveillance Using Avigilon Control Center Network Video Management Software, the security team at Southside Medical Center can easily move back and forth between live and recorded footage for evidence collection. But according to Lundgren, ease-of-use was another key selling feature of the Avigilon HD Surveillance System. “Using Avigilon Control Center software, we can easily transfer footage onto DVDs, making it very easy to share evidence with law enforcement,” comments Lundgren. “And Avigilon Control Center allows us to download images along with the player, making it easy for local law enforcement officials to view footage, a key differentiator and top reason why we chose the Avigilon system.” We can also add or import views, such as satellite images of the facility, for even greater coverage"Multiple screens enable users to seamlessly monitor several views at once, providing complete coverage for the entire facility. “We can also add or import views, such as satellite images of the facility, for even greater coverage,” notes Lundgren. Avigilon’s simple management tools have also made it easy for Lundgren to monitor and reduce the bandwidth required for remote surveillance. Central Monitoring Scalability was another key requirement for Southside Medical Center, which plans to build a 60,000 square foot facility across from the main building to accommodate the new services it will soon offer as Georgia’s first FQHC of Excellence. “Within the next two years, the Avigilon HD Surveillance System will triple in size, so we needed to deploy a surveillance system that could easily expand to meet our future needs,” says Lundgren. “We also plan to gradually integrate our satellite clinics into the Avigilon HD Surveillance System so we can monitor activities at all our facilities from a central location.” Just one Avigilon megapixel camera can deliver the same coverage of at least four analogue cameras"Seamless Integration According to Lundgren, the Avigilon HD Surveillance System was much simpler to install and integrate into the facility’s existing infrastructure than other surveillance solutions would have been. “By selecting the Avigilon HD Surveillance System, we required less additional equipment and we achieved far greater performance at the same cost,” notes Lundgren. “And because just one Avigilon megapixel camera can deliver the same coverage of at least four analogue cameras, we saved more time and money during installation.” By deploying the Avigilon HD Surveillance System, Southside Medical Center was able to achieve even further cost savings by not having to invest in the additional equipment required for pan-tilt-zoom (PTZ) functionality. “If we had deployed an analogue-based system, we would have had to invest in additional PTZ housings and motors to achieve greater coverage. With Avigilon, we get even better coverage with less hardware.” Cost-Effective Surveillance Solution By monitoring the Avigilon HD Surveillance System live, Lundgren and his team can act on a tip, monitor a situation, and call in the police to stop a potential break-in or criminal act before it happens. “Not only does this help us avert a potential crisis, it also reduces the time and cost associated with police investigations,” says Lundgren. The Avigilon HD Surveillance System is an excellent choice for any healthcare provider wanting to enhance patient and staff safety"Southside Medical Center has also saved HR-related costs by leveraging the Avigilon HD Surveillance System to monitor employee performance. “We can now confidently resolve ‘he said/she said’ conflicts between patients and staff,” explains Lundgren. Southside Medical Center also uses the surveillance footage to resolve complaints, performance improvement issues, internal theft, and confrontations between patients and on site. “We have planned and designed the system so that we can add audio monitoring in certain areas to further improve customer service if we choose,” adds Lundgren. Enhanced Healthcare Security As the chair of the Georgia chapter of the International Association for Healthcare Security and Safety (IAHSS), Barlon Lundgren plays an influential and far-reaching role in the state’s security industry. “I have hosted several healthcare providers to see the Avigilon HD Surveillance System in action and have also invited Avigilon to showcase the solution at a local IAHSS event,” concludes Lundgren. “With its exceptional image clarity, reliability, and scalability, the Avigilon HD Surveillance System is an excellent choice for any healthcare provider wanting to enhance patient and staff safety.”
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and economic growth are naturally driving healthcare expenditures higher in developing markets. The frequency of physician, medical service provider, and hospital/clinic visits are all likely to rise considerably in the future in both developed and emerging markets. All of this drives the need for video surveillance for security and for active medical treatment activities Arecont Vision megapixel cameras are deployed by healthcare facilities of all sizes and types around the world to increase the quality and coverage of video while driving down costs of installation and ongoing operation. Arecont Vision Deployment Examples Arecont Vision IP megapixel camera technology, both single-sensor and multi-sensor products, has been proven around the world for a variety of healthcare sector needs. Entrances and exits to buildings, grounds, parking structures, car parks and facilities Office areas, emergency rooms, nursing stations, treatment centers, clinics, operating rooms, procedure rooms, morgues and patient wards Pharmacies, drug storage areas, records storage, store rooms, laundry Public areas, reception, lobbies, hallways, cafeterias, kitchens, retail areas Protection from slip-and-fall, workman’s compensation, malpractice, lawsuits and other litigation and compliance Perimeter, parking surveillance and license plate recognition Facial recognition, people counting, movement monitoring Access control and staff identification Visitor, patient and staff safety What Arecont Vision’s Healthcare Customers Say “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results." "The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua," said Paul M. Sarnese, System Safety Director, Virtua Health The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua" “Performance sold us on Arecont Vision megapixel cameras. We are using the video surveillance system to look for recorded video of suspicious persons after a description is given. We are also using it to review slip-and-fall complaints and to address issues of employee accountability," said Michael J. Matroni, Emergency Preparedness and Security Manager, Sacred Heart Health System. “The quality of Arecont Vision cameras more than satisfies our requirements for image quality. The system is working very well for us and Arecont Vision is extremely responsive to our needs.” "The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment," said Lai Voon Hon, General Director of Hoa Lam-Shangri-La, Vietnam.
The Savelberg nursing home has implemented smart domotics to provide elderly people affected by dementia with a wider range of movement. Depending on individual abilities, residents can move freely within three living zones. Savelberg has chosen the Conview Care solution from Leertouwer, which uses MOBOTIX cameras. Integrating Residential And Care Services Savelberg in Gouda is part of Zorgpartners Midden-Holland. Zorgpartners is a full-service organization offering diverse residential and care options for elderly people in the Central Holland region. A lot of attention is paid to integrating independent living and care provision. Conview Care is a complete care solution for organizations that wish to improve their processes with the help of technology One of the fifteen centers, Savelberg is managed by Irene Feenstra, who said: “We have been investing for years in care for elderly people affected by dementia in order to increase their quality of life. In late 2014, prior to commencing the planned renovation of two sections that house elderly people affected by dementia, we started looking for a new call-for-assistance system. "Zorgpartners Midden-Holland have been using the IQ Messenger communication platform for some time, which is one of the reasons why, after comparing several solutions, we decided on Conview Care from Leertouwer.” Conview Care is a complete care solution for organizations that wish to improve their processes with the help of technology. It stands out in the market due to its open integrability, vendor-neutral technology, and ease of management. Video And Audio Care Solution As soon as a resident ventures outside their allowed living zone, the care givers are notified through a message on their smartphone" "Here at Savelberg, the care solution includes video surveillance, sound and motion detection, and electronic wristbands", says Jasper Coppes, Care & Technology specialist at Leertouwer. "This combination automatically informs the staff if one of the residents exits the approved living zone. "High resolution Q25 MOBOTIX cameras function as smart video and audio sensors. In addition, an infrared ring developed by Gold-IP is provided thus allowing for night-time surveillance. This naturally happens with the consent of the customers or their direct family, and without saving any images." "Each residence is equipped with a smart sensor with camera which automatically sends a message once a resident gets out of bed," says Feenstra. "If the person returns to bed after going to the toilet, there is no problem and nobody needs to go and check on them. If said resident needs help, the care giver in charge notices immediately enabling them to react adequately." 24/7 Wander Detection Using the Conview Care solution, Leertouwer has created three living zones for Savelberg, allowing for 24/7 wander detection. The innermost zone consists of the floor where elderly people affected by dementia live. Within this zone, they can move with a greater feeling of freedom, as the previous boundary using air-lock doors has been removed from near the elevator. The second living zone consists of the entire building with nine floors and all shared areas, while the third zone has an additional open terrace and garden. "Since we removed all physical boundaries our dementia patients have visibly thrived," says Feenstra. "As soon as a resident ventures outside their allowed living zone, the care givers in charge are notified through a message on their smartphone. If a resident leaves the outermost zone and thus our premises, we can immediately bring him or her back.” We plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years." New Domotics Give More Freedom Although Feenstra prepared a business case for the new solution in late 2014, the greater freedom for all residents and the staff are more important than financial savings. "Our employees no longer need to do unnecessary night-time rounds which may disturb the sleep of residents, but can nevertheless immediately intervene if there really is a problem. Moreover, they feel that the new domotics ensures a lighter and happier atmosphere in the ward, which helps them enjoy their work more. "Approximately 40 flats over two floors have currently been equipped with a MOBOTIX Q25 camera connected to Conview Care. Until now, they have been working flawlessly. Implementing them was easier than expected and our care givers are also remarkably enthusiastic about and happy with them. They perceive it as a new way of working which increases the well-being of our residents. "Given these positive experiences, we plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years."
The City International Hospital (CIH) is a new multi-specialty hospital located within the Binh Tan district in Ho Chi Minh City, Vietnam. Located in the International Hi-Tech Healthcare Park, CIH features the latest medical technology and imaging equipment. With a large volume of visitors anticipated at the hospital every day, the need for a best-in-breed surveillance solution was a high priority from the onset of the project. To fulfill this requirement, hospital administrators turned to Citek Corporation, a technology integrator located in Ho Chi Minh City. IP Surveillance With Arecont® Megapixel Cameras The need to secure CIH by maintaining the highest levels of situational awareness was a primary design objective for the new video surveillance system. To achieve this goal, Hoa Lam’s management team worked together with Citek’s technical personnel to design and install a superior video surveillance system. The decision to deploy an IP surveillance solution featuring Arecont Vision megapixel cameras was based on superior functionality and image quality, ease of use, and the ability to manage the system centrally or remotely. “We always rely on the quality of Arecont Vision® cameras”, says Mr. Thomas Tran, CEO of Citek Corporation. “Our experience with Arecont Vision® has made them our first choice for every large project because of their exceptional performance and image quality.” Situational Awareness Both Day And Night Citek became an Arecont Vision® installer in Vietnam in 2009, and installation of the video surveillance system was a smooth process by the experienced integrator. The video surveillance system at CIH is monitored on a local network, which includes a main server and two client systems. There are approximately two hundred Arecont Vision® cameras installed at the CIH facility to date There are approximately two hundred Arecont Vision® cameras installed at the facility to date, including approximately one hundred SurroundVideo® 360° AV8365DN 8 megapixel (MP) panoramics and 35 SurroundVideo® 180° AV8185DN 8 MP panoramic cameras. These high-performing cameras deliver exceptional situational awareness in both day and night lighting conditions. Additionally, there are approximately 60 Arecont Vision® MegaVideo® AV2115DN compact day/night megapixel cameras installed at key locations which are operational 24/7. “The quality of Arecont Vision® cameras more than satisfies our requirements for image quality,” said Mr. Lai Voon Hon, General Director of Hoa Lam-Shangri-La. “The system is working very well for us and Arecont Vision® is extremely responsive to our needs.” Substantial Savings, Superior Coverage The CIH management team carefully evaluated their long-term return on investment (ROI) comparing IP and analog surveillance system solutions. Since a smaller number of Arecont Vision® megapixel cameras provide superior area coverage to conventional cameras, substantial savings are derived. This includes reducing the number of cameras, cables, poles, and housings plus the requirement for less ongoing maintenance and fewer VMS licenses. Additional savings are derived from the reduction in manpower needed to watch video feeds and guard the facility. Beyond the financial benefits, CIH management recognises the intangible ROI achieved from maintaining high security, which makes the facility a safer place for patients, staff and visitors. “The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment,” said Mr. Lai Voon Hon.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?