Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida.

Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’

Mobile video recorders

Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011

In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution.

Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analog cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.”

Hybrid network video recorders

In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video.

An embedded Linux-based operating system, ruggedized design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras.

Safety of our passengers

Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened"

Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. 

Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video.

Diagnostic imaging services

When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings.

For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics.

Traveling to multiple locations

Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes

This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialize. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs.

Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters.

Video management software

Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems.

It also provides the organization with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez.

Video surveillance infrastructure

Martinez and his staff are trained to take full advantage of all the Command software functionality

A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.”

Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory.

Patient safety and service excellence

This allows them to select users from the company directory, assign a profile and customize their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand.

We have four construction build-outs planned, including a four-story, 80,000 square-foot building"

We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favor of the newer GT Series.”

March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

How Can You Be Sure Your Organization Is Protected When It Comes To Cyberphysical Security?
How Can You Be Sure Your Organization Is Protected When It Comes To Cyberphysical Security?

At ISC West this year, emerging technologies will be on display to help organizations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can move enterprises to a place of digital transformation and proactive management rather than reactive practices based on threats and changing regulations. The show provides an opportunity for both vendors and potential customers to learn from each other about what’s out there and what’s needed in terms of future solutions as the industry evolves. Are you in cyber and physical security compliance? At this year’s show, we’ll continue to see developments focused on integration of cyber physical security that will lead to deeper understanding of the relationship between devices, device monitoring and spaces in which all devices physically reside. Digital solutions help achieve a digital transformation which stitches the data relationships together to provide better threat vector impact and overall understanding of risk. The technologies in smart buildings are subject to cyberattacks, which pose not just a threat to data and privacy but can compromise the physical space as well. Think of the locked door in a smart building that now is opened with access control via key cards or mobile devices given only to certain members of staff. These integrations increase safety and restrict access across the enterprise, but a bad actor can access and duplicate the necessary data to open the door with a copycat device while hiding the event from the surveillance system. By having a comprehensive cyber whitelist of installed devices, potential rouge devices are prevented from transmitting on the network, therefore providing an automated guard against internal and external attacks. When systems are compromised due to a hack or physical intervention, it puts what’s behind the door at risk, whether it’s money in a bank or information in a sensitive work environment, such as a laboratory. Digital solutions help achieve a digital transformation which stitches the data relationships together It’s increasingly important to highlight the relationship between cyber and physical security. A great illustration of this is the digital twin. A digital twin is a replica of a physical space that uses both informational and operational technology to give real-time information about what’s going on in a space.  These can include things like floor plans for the building as well as real-time sensor data from the building management system, HVAC systems, lighting, fire, security, and more. By getting a complete picture of the physical and digital assets of an organization, it becomes possible to monitor all systems from one central location to see how they’re working together and act on the insights they provide. So, in the example of a breach from before, it’s possible to flag that hack, isolate its exact location and devices involved, and resolve it quickly while maintaining preservation of evidence. Compliance: how to get there safely, efficiently and effectively As these threats evolve, governing bodies are taking action to ensure that data is protected to minimize these kinds of threats and ensure that organizations feel confident in the security of their data. Norms and compliance measures are emerging quickly, such as General Data Protection Regulation (GDPR) which began to be enforced in March 2018, and the California Cybersecurity Law, which went into effect in the US just this past January. The regulations of what can be done with data mean that companies need to react or face penalties such as fines, which can be as high as 4% of worldwide annual revenue of the previous year. These are also fluid and can change rapidly, meaning flexibility is important in compliance solutions. However, this presents an opportunity for companies to invest in innovation to ensure they’re prepared for those changes and to protect the safety of not just employees, customers and target markets, but of the larger organization. Getting to a place of compliance can seem costly and time consuming at the beginning Getting to a place of compliance can seem costly and time consuming at the beginning, especially for larger organizations. They may have thousands of security assets (cameras and sensors, for example) and might not even be fully aware of what they have, where they are, and whether those assets are functional, never mind compliant with data protection legislation. The right solution takes all the steps to becoming safe and compliant into account, beginning with inventory and mapping of all assets to get a complete picture of where things stand and where changes need to be made. One large financial institution, upon embarking on this journey, identified an additional 10% of assets that they didn’t know they had, and additional ones that were nonfunctioning and needed to be repaired or replaced for compliance and safety. Monitoring: centralized and remote for rapid response Once assets and data are centralized and a complete inventory is taken, it’s much easier to effectively monitor the complete enterprise. At this year’s show, smart technologies will be on display that reduce cybersecurity risks and monitor assets for compliance. If something changes, that can be flagged, and appropriate parties can be quickly notified to act and neutralize security threats or avoid the expensive penalties that come with noncompliance. Since all these components are centralized in one location, it becomes possible to monitor much more effectively and fix issues remotely in minutes rather than scheduling a trip to a location that may not happen for days or even weeks. A security camera for a large chain enterprise such as a retail store or bank in a small-town location deserves service just as quickly as one in a major city, since the threat that each non-functional device poses is the same to who and what it is there to protect. Keeping it up: a proactive approach to service and maintenance One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach to systems maintenance and operation. In addition to performance and compliance, other types of data, such as historical events, can also be monitored centrally. This gives context to security events and can move organizations from a reactive to a proactive approach to their security as well as operations. If small problems are identified and resolved before they become larger problems, it means that security events can be mitigated more quickly or prevented entirely due to early intervention. On the operations side, early insights into asset performance means that fewer resources are expended on noncompliance fees and large-scale, emergency repairs. These resources can take the form of money, but also of time spent by employees and enforcement agencies to ensure continued compliance. Staff can spend time engaged in active monitoring rather than generating reports, since that can now be automated. In the new decade, it’s time to use the technological resources available to better protect systems for smarter, safer and more sustainable environments. On every level, compliance is important not just for its own sake, but so are the other benefits associated with intelligent management. The show presents an educational opportunity for vendors and customers alike. Walking around the show floor and talking to everyone is a unique way to see what’s out there and evaluate what is and isn’t working for a business while getting information from all the industry experts. Even if they’re not ready for a complete overhaul, taking stock of what’s available, where things are heading and how their operations and mission can be better served by implementing one or more of the solutions showcased is more important than ever. On our end, those conversations about needs and concerns are invaluable in driving innovation.

Q&A: How The ‘Secret Service Of Hollywood’ Protects Celebrities
Q&A: How The ‘Secret Service Of Hollywood’ Protects Celebrities

At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in.  Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.

What are the Security Challenges of Protecting Utilities?
What are the Security Challenges of Protecting Utilities?

Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?