SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6

Healthcare security

  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos
Milestone Helps Reduce Hospital Costs Via Innovative Patient Monitoring With Video Technology

Milestone Helps Reduce Hospital Costs Via Innovative Patient Monitoring With Video Technology

Corporate
Milestone Explains 4 Vital Components Of A Hospital Security Plan

Milestone Explains 4 Vital Components Of A Hospital Security Plan

Corporate
Milestone Launches Grant Program For Security Projects Funding

Milestone Launches Grant Program For Security Projects Funding

Corporate
Video Technology Strategies For Hospitals Are Moving Beyond Security

Video Technology Strategies For Hospitals Are Moving Beyond Security

White paper
Milestone Systems Releases XProtect Hospital Assist Two-Way Audio Demo Video

Milestone Systems Releases XProtect Hospital Assist Two-Way Audio Demo Video

Videos

Healthcare news

Join Milestone's XPerience Days For Video Innovation
Join Milestone's XPerience Days For Video Innovation

Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host this free, one-day event on September 5, in Los Angeles.  Event features Designed for IT pioneers and security professionals, the event will feature engaging presentations from Milestone's technology partners across key industries such as education, healthcare, smart cities, and hospitality. Attendees will gain insights into the latest developments in AI technologies, cloud video strategies, and Milestone's newest product offerings. Keynote session Brown will share his insights on how artificial intelligence is transforming video technologies and reshaping the future A keynote session from renowned AI futurist, entrepreneur, and author, Steve Brown promises to be a highlight of the event. Brown, a former executive at Google Deepmind and Intel, and an advisor to Fortune 100 pioneers on how to innovate with AI, will share his insights on how artificial intelligence is transforming video technologies and reshaping the future of security and business operations. Video technology "We're excited to bring together IT and security professionals from all over Southern California to discuss the game-changing video technologies that are driving our industry forward," said Tim Palmquist, VP Americas, Milestone Systems. "The Los Angeles XPerience Days is a great chance to mingle with experts and colleagues and see firsthand how data-driven video solutions can boost both safety and efficiency for any organization." What to expect AI & Video Analytics: Discover how AI is revolutionizing video technology in the security industry and beyond. Accelerating Cloud Technology: Understand the many options for cloud-based video management. Vertical Solutions for Growth: Learn about successful solutions that meet customer needs and expand business opportunities. Networking opportunity The event will be held at The Majestic Downtown, Los Angeles. Following the day's presentations, attendees are invited to network with fellow security professionals and speak one-on-one with Milestone experts during a relaxed social hour. "At Milestone, we're all about equipping our partners with the information they need to thrive in today's fast-moving security world," said Palmquist. "We can't wait for this event – it's going to be insightful, informative, and fun.”

Milestone Systems To Showcase Latest Video Innovations At Toronto Xperience Day
Milestone Systems To Showcase Latest Video Innovations At Toronto Xperience Day

Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host this free, one-day event on May 7 in Toronto. Geared to IT pioneers and security professionals, the day will feature engaging presentations from Milestone's technology partners across key industries such as education, healthcare, city surveillance, and hospitality. Attendees will gain insights into the latest developments in AI technologies, cloud video strategies, and Milestone's newest product offerings. Reshaping the future of security A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event. Brown, a former executive at Google Deepmind and Intel, and an advisor to Fortune 100 pioneers on how to innovate with AI, will share his insights on how artificial intelligence is transforming video technologies and reshaping the future of security and business operations. "We are excited to bring together security professionals from across Canada to explore the cutting-edge video technologies that are shaping the future of our industry," said Peter Lintzeris, Director of Sales, Canada, at Milestone Systems. "The Toronto XPerience Day offers a unique opportunity to learn from experts, network with peers, and discover how Milestone's open platform solutions can help organizations optimize safety and efficiency." Video management innovations The event will be held at Steam Whistle Brewing in the heart of downtown Toronto. Following the day's presentations, attendees are invited to network with fellow security professionals and speak one-on-one with Milestone experts during a relaxed social hour. "Milestone is committed to empowering our partners with the knowledge and tools they need to succeed in today's fast-paced security landscape," said Lintzeris. "We look forward to an engaging and informative event, and to continuing to support the Canadian security community with our open platform video management innovations."

Allegion Unveils LCN Senior Swing: AdaptivIQ Technology At ISC East 2025
Allegion Unveils LCN Senior Swing: AdaptivIQ Technology At ISC East 2025

Allegion US, a pioneering provider of security solutions, technology and services, is excited to announce the release of a series of enhancements to their LCN 2800IQ and 9500IQ Senior Swing series operators, including the patent-pending, self-adjusting technology, AdaptivIQ. Built for durability and efficiency, the LCN Senior Swing offers year-round performance and peace of mind in heavy-use applications including healthcare, offices and other high-traffic areas. From the fully loaded controller to groundbreaking AdaptivIQ and Smart Power Boost technology, this self-adjusting, self-calibrating automatic door operator reacts to seasonal and daily variations and external pressures like wind, carpet drag and HVAC stack pressure, allowing smooth, consistent operation and less ongoing maintenance. Real time adjustments "Our unique combination of AdaptivIQ and Smart Power Boost set the LCN Senior Swing apart from our leading competitors," said Jason Fodstad, the Senior Swing's Project Lead Engineering Manager. He adds, "Real time adjustments are a game changer for any opening with inconsistent wind or stack pressure. The ability to engage and disengage as needed allows the operator to address those external forces and minimize the risk of slamming. It's not simply on or off, like many competitors." The LCN Senior Swing meets the needs of installers and end-users alike, saving time and energy with fewer maintenance requirements. Installation is simple even for novice installers with new hook-and-cleat hardware, allowing easier and safer hands-free holding of both the motor gearbox and control box during setup. New control box The new control box is fully loaded, offering 23 customizable user settings, an intuitive user-friendly LCD screen, a self-calibration cycle and real-time diagnostics. "Our aim with the LCN Senior Swing enhancement was to meet our customers' needs beyond controlling the door, and we've far exceeded that goal beyond what is in the market today," said Emily Zentz, Product Manager for LCN Automatic Operators, adding "We've provided a product our customers can not only customize and configure to each opening but also trust to operate reliably all year long." Customers with existing Senior Swings can also gain all these new features and technology by installing the updated motor gearbox and new controller box. LCN has upgrade kits available to purchase. See AdaptivIQ, Smart Power Boost and all the other LCN Senior Swing enhancements in action at ISC East, November 18–20 at the Javits Center, New York City.

Amthal Celebrates 25 Years In Security Technology
Amthal Celebrates 25 Years In Security Technology

Amthal is celebrating 25 years, highlighting the company’s growth in scale, capability and technical expertise to deliver fully integrated life safety and security technology solutions that meet strict compliance requirements. Founded in 2000 by Paul Rosenthal and John Allam, Amthal started as a local residential security company. Over the past quarter-century, it has expanded into a group providing comprehensive fire and security systems across commercial, education, healthcare, retail, and public sector environments. Building long-term partnerships Says Paul Rosenthal, Amthal Group Companies Co-Founder and Group Business Development Director: “Over the past 25 years, Amthal has grown from a small business into a trusted pioneer in fire and security. I’m proud of the expertise and capability we have built and of our incredible team who has made this all possible." “Our approach of managing every stage of a project in-house, from design to ongoing support, has allowed us to deliver reliable, compliant solutions across increasingly complex environments to a loyal customer base. This growth reflects our commitment to quality, innovation and building long-term partnerships.” Complex regulatory standards The company’s evolution mirrors wider industry trends. Over the last two decades, client expectations have shifted from standalone installations to connected, compliance-driven systems capable of meeting increasingly complex regulatory standards. Amthal has responded by investing in people, especially focussing on a dedicated Apprenticeship scheme to lead career growth opportunities alongside technology to ensure quality and reliability throughout every stage of a project. Life safety and security technology Jamie Allam, CEO of Amthal Group Companies, added: “Reaching 25 years reflects how far we’ve come, but our focus is firmly on what’s ahead. The pace of change in life safety and security technology drives us to keep innovating and improving the way we deliver our services." “Our strength lies in the experience and dedication of our team, who ensure every system we design and maintain meets the highest standards for total protection and guaranteed compliance. As we look forward, our aim is to set new benchmarks in customer excellence through technology that enhances safety, reliability and performance.”

View all

Healthcare articles

Global Regulations Of AI: The Role And Impact On The Physical Security Industry
Global Regulations Of AI: The Role And Impact On The Physical Security Industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully.  Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximizing their potential while ensuring compliance with evolving regulatory frameworks.  The current state of AI in security systems  By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviors, analyze crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem.  Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorized entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behavior patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyze customer flow patterns and identify operational inefficiencies.  The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations.  Predictive analytics that forecast potential security risks before incidents occur.  Natural language interfaces that allow security teams to query video data using voice or text commands.  Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources.  Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats.  Emerging regulatory frameworks  The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorizing AI systems based on their potential risks and establishing strict guidelines for high-risk applications.  Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation.  Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasize the importance of data protection, requiring organizations to implement strict controls over how information is collected, stored, and used within AI-powered security systems.  Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organizations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed.  Preparing for the future  The challenge lies in maximizing security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximizing security effectiveness while maintaining transparency and public trust.  Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organizations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems.  Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights.  An ever-evolving environment  The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviors. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritizes privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges.  Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone.  Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organizations that prioritize both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.

Design To Finish: Approaching Access Control In Healthcare
Design To Finish: Approaching Access Control In Healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff and administrators to vulnerable patients, visitors and maintenance personnel. Safeguarding their safety and security, while providing seamless operation is a complex challenge - one frequently solved by access control. Use of access control Today’s security solutions play a central role in protecting people and mitigating risk across much of our built environment. An appropriately specified system is effective at regulating, monitoring and restricting entry and exits, and allows users to navigate an integrated network and its hardware to ensure the right access is provided to the right person at the right time. In healthcare buildings, the use of access control expands further, whereby a system can tackle a host of unique operational challenges - significantly contributing to fire safety, ease of movement and the theft prevention of equipment, medicine and sensitive patient data, and all while protecting human life and preserving privacy and dignity. In healthcare buildings, the use of access control expands. In doing so, access control can become the cornerstone of functionality, compliance and organization in any healthcare environment. Though, as the complexity of projects deepen, decision makers are reminded that coordination is key. Preparing and empowering users Between January and March 2025, there were over 832,000 patient safety events recorded in the NHS. While each of these events may not be directly linked to building security specifically, the healthcare industry is faced with a considerable number of safety incidents, which suggests greater monitoring and mitigation is needed across the board. Access control often provides staff with the vital means of retaining control without impeding care Patient well-being and security will always remain paramount in the sector, and access control often provides staff with the necessary means of retaining control without impeding care. Hospitals for example, sustain a high level of footfall across large campuses with multiple points of entry and on-site patient record systems, presenting a number of simultaneous security tests as a result. Though, unlike other public buildings, where rigid security measures are active at all times, many healthcare environments must strike a balance throughout their security framework to meet a host of one-of-a-kind demands. Use of access credentials With a continuous influx of patients, staff and visitors, healthcare groups are habitually required to remain accessible and inviting around the clock. At the same time, they must also be prepared to deter unwanted visitors in areas of restricted access and lock down intensive wards to ensure patients remain safe and secure under periods of monitoring. For this, the use of access credentials is critical and provides a regulated system for sensitive staff-controlled areas such as pharmacies, wards, and server rooms. By applying role, zone, or schedule-based access, decision makers can authorize personnel seamlessly, empowering facilities to manage patient care without compromising security in the process. Use of access credentials is critical and provides a regulated system for staff. Implementation of AI-powered tools and devices Modern systems may incorporate the use of keycards, biometric scanners, and mobile credentials When it comes to the operation of these systems, training gaps are a concern, however. Over the five years up to February 2025, numbers of NHS doctors rose by 26%, with nurses also up 25%, and this influx of new staff requires education towards the usage of access control.  Modern systems may incorporate the use of keycards, biometric scanners, mobile credentials and in some cases, voice-activation, with the implementation of AI-powered tools and devices set to play a more prevalent role in the future. Each system presents its own benefits and may be better suited to certain projects and areas, but without consultation and proper user education, they can instead become a barrier. Strategy, scalability, performance To alleviate these operational threats, early-stage planning is fundamental. Just as end-user education and training should be built into project timelines, it’s important to consider the growing need for cooperation throughout the entire supply chain of an access control project. A collaborative approach becomes even more critical when innovative solutions enter the market All too often, a lack of evidence-based decision making can hinder the specification of a scheme and its accompanying hardware, whereby choices are made without understanding long-term performance or compliance requirements. Whether approaching a new or retrofit development, ongoing communication allows experts to come together and ensure that product decisions are aligned with the buildings intended use and user base. This collaborative approach becomes even more critical when innovative solutions enter the market and new sector challenges arise. Latest access control products With this in mind, trusted manufacturers will no longer simply deliver the latest access control products, but will aim to work alongside the architects, specifiers, contractors, and facility managers at each stage of the building’s lifecycle to ensure touchpoints are addressed. This is crucial in modern healthcare environments, where the added layer of complexity requires tailored security measures. One area that is often neglected is scalability, for example. As healthcare facilities manage fluctuating patient numbers and a growing level of patient data, along with new regulations, systems must be adaptable and allow for ongoing improvements and updates to the security infrastructure without the need for a complete overhaul. By adopting a scalable system that combines technology integration with ease of use, decision makers can future-proof their building’s security. Manufacturers will no longer simply deliver the latest access control products Complexity of the healthcare industry In truth, access control has become more than a means of restricting access. Modern systems are more equipped than ever before to deliver environments that support care, safety, and operational excellence.  Nonetheless, the complexity of the healthcare industry and its buildings demands more than product innovation - it requires an industry-wide commitment to collaboration, from project conception to product installation and beyond.

Beyond The Cloud: How Edge AI And Containerization Will Reshape Physical Security
Beyond The Cloud: How Edge AI And Containerization Will Reshape Physical Security

The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralized access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerization and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a license plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralized access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerization and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks.  When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used.  For a security camera with a powerful edge processor, it’s like giving the camera its own specialized toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently.  As a developer, if you use an open container platform like Docker, any system that supports Docker can utilize your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customize deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimized. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralized servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerized framework An equally important aspect of containerization is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerized framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialized role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organizations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyze customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organizations the flexibility to optimize cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organization can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimizing unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerization via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.

View all

Healthcare case studies

Milestone Provides XProtect Video Management Software To Enhance Security For Massachusetts General Hospital
Milestone Provides XProtect Video Management Software To Enhance Security For Massachusetts General Hospital

With 1,300 cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team was not able to keep up with the vast amounts of recorded video. Now, BriefCam Syndex Pro for fast video review, search and analysis, embedded within a Milestone XProtect video management software (VMS) platform is making efficient and effective video investigation possible. Unique challenges to security Massachusetts General Hospital’s (MGH) Police, Security and Outside Services Department provides some security services to many other Partners hospitals and facilities. Following its recent digital conversion, unified on the Milestone XProtect VMS platform, MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly to the existing IP network. The hospital environment presents unique challenges to security, Michelman points out “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of time,” said Bonnie Michelman, MGH Executive Director of Police, Security and Outside Services and Consultant for Partners Healthcare. The hospital environment presents unique challenges to security, Michelman points out. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must also take into account not only the main location, but also dozens of satellite facilities around the Boston area. Enterprise risk management “We can’t cover all of these facilities with security staff,” said Michelman. “We need to augment heavily with very good, state-of-the-art technology that allows us to combine our intelligence, labor, policies and procedures, in order to create a better holistic approach to enterprise risk management.” Charged with creating a safe environment, MGH’s security team at the same time is challenged by the clinical team’s needs for increased efficiency through lowering length of stay and moving patients through the hospital as quickly as possible. The 24-hour Emergency Room, with its anxious, highly volatile population presents challenges of its own. In addition, patient elopement and patient wandering – unauthorized departures from the medical facility, whether intentional or unintentional – pose liability threats that can be very damaging to a hospital. Providing customer satisfaction A unified system was required to balance the video surveillance needs of a busy hospital campus A unified system was required to balance the video surveillance needs of a busy hospital campus with remote satellite locations while upholding the highest level of security possible, maintaining operational flow, and providing customer satisfaction that includes expectations of privacy. Michelman, together with MGH Senior Manager, Systems and Technology Robert Leahy, decided on the Milestone XProtect VMS platform. Camera count was increased from 400 to 1,300, and standardized with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools intended to reduce the time and effort needed to conduct video reviews, post-event video investigation and real-time video monitoring. The BriefCam solution ties in seamlessly with the Milestone video management solution, providing efficient workflow for investigators. Presenting video metadata According to Michelman, BriefCam has already proven invaluable. A two year long ROI examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. According to Michelman, BriefCam has already proven invaluable “I see BriefCam as a very important part of our toolbox of excellent practices for protecting what is a very complex environment of tangible and intangible assets,” said Michelman. BriefCam Syndex Pro’s ability to present video metadata in graphic visualization format, such as bar graphs, pie charts and the like, has opened up new realms of possibilities to extend the role of CCTV video beyond security into organizational efficiency and more informed, data-driven decision making. Better investigative focus “In the past, there might have been things that would have been a ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video,” said Michelman. “Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success.” BriefCam Syndex Pro embedded within Milestone XProtect VMS platform is helping MGH in its mission to effectively and efficiently protect and safeguard the hospital community. Michelman said: “We’re happy with these products, but it’s not just about the quality of the technology, it’s about the quality of the partnership. You know, it’s easy to sell a product, but to sustain it, service it, and be there after it is in is really very critical for us.”

TDSi’s Integrated Security Solutions Offer The Healthcare Sector Greater Flexibility
TDSi’s Integrated Security Solutions Offer The Healthcare Sector Greater Flexibility

TDSi products can be easily synchronised with existing security investments from many third parties The Healthcare market is an area of expertise for security solutions specialist TDSi. Not only does it require the most stringent security, the Healthcare sector often has strict budgets and involves caring for some of the most vulnerable people in society, so any solution needs to be highly reliable and easy to operate and manage. Specific areas such as hospital pharmacies need higher levels of security due to the value of stored products; baby units or wards for elderly patients typically require access control to monitor both entry and exit. There may also be specific security considerations for staff, with lone workers or remote parts of healthcare facilities that could be open at any time, day or night. Despite this, staff, patients and visitors need to be able to move around with a minimum of disruption. TDSi’s range of access control and security solutions are designed to integrate efficiently with each other and also in close collaboration with other manufacturers’ products, such as Texecom’s alarm systems and Milestone’s CCTV solutions. TDSi products can be easily synchronised with existing security investments (from many third parties) or installed from scratch to offer fully bespoke security. By offering a wide choice of access control options along with the ability to record a detailed audit trail with their highly flexible software packages, TDSi is the ideal choice for installers and customers in the Healthcare sector. An excellent example of TDSi’s expertise in this market is a recent installation at London’s Charing Cross and Hammersmith Hospital, which covers an impressive 617 doors across multiple sites and integrates with both security and fire systems for a rapid response in an emergency. John Coleman, Managing Director of expert installation specialist Advanced Detection Systems (ADS), which specified TDSi’s solutions as part of the project commented, “This has been a major and high-profile project for us which required a best-of-breed solution for the access control element. TDSi systems are specifically designed to integrate with other building services and security systems and are particularly well suited to projects where CCTV, fire alarms and access control need to work closely together to protect people and property. In partnership with TDSi, we were able to offer Charing Cross and Hammersmith Hospital, solutions which fully met their needs and give peace of mind that patients and staff can be fully protected from emergencies and potential security breaches, at all times.” TDSi’s EXpert controller features a stand-by battery facility that allows the system to continue operating in the event of power failure The project uses TDSi’s EXpert IP controllers, fully featured networkable access control units, with supervised inputs and relays, making them ideal for monitoring and signaling alarm conditions which could occur at Charing Cross and Hammersmith Hospital. With capacity for up to 48,000 cards, the flexible access controller is ideal for those applications that feature high user volumes through access points - such as a busy hospital and teaching environment. TDSi’s EXpert controller features a stand-by battery facility that allows the system to continue operating in the event of power failure and at these times the system can be controlled without the need for PC communications, so controlled access is maintained. TDSi’s Director of UK Sales, Stuart Griffiths, explains, “The project at Charing Cross and Hammersmith Hospital is an excellent example of how TDSi’s systems can be easily and very successfully integrated with other building services and security solutions to offer a highly intelligent and powerful access control system. A hospital environment protects many vulnerable people and assets, so being able to fully co-ordinate security while making the most of existing asset investments (particularly when budgets are under closer-than-ever scrutiny) is a highly desirable outcome for all stakeholders.”

Xtract One's SmartGateway Boosts Security In Nova Scotia
Xtract One's SmartGateway Boosts Security In Nova Scotia

Xtract One Technologies announced its SmartGateway has been selected by Nova Scotia Health to strengthen security measures and provide AI-powered weapons detection across facilities province-wide, with an initial order of 25 systems.   Nova Scotia Health, in tandem with its nurses’ union, is working to modernize and strengthen security across its facilities to ensure a safe environment for all patients, visitors, and staff. Adopting and deploying advanced technologies like SmartGateway is an important step toward achieving that goal. Safe and secure health care By helping to limit the number of potentially dangerous items entering their hospitals, this technology supports its commitment to providing safe and secure health care. Xtract One was selected for its proven efficacy to accurately detect knives, a top priority for the organization. Previously tested in Truro, Nova Scotia, over a 12-day trial period, SmartGateway successfully scanned 7,400 individuals entering the facility and detected 49 prohibited items during that period, mostly pocket knives and box cutters. Deploying SmartGateway “Violence against healthcare workers is a challenge that persists and demands addressing. By deploying SmartGateway, Nova Scotia Health is setting an important example for what it means to take meaningful action to protect frontline healthcare workers, patients, and visitors,” said Peter Evans, CEO of Xtract One. “This installation marks another key step in our expanding work with Canadian healthcare organizations, having deployed in Manitoba earlier this year. We look forward to  continuing to deliver effective threat detection as more providers take proactive measures to prioritize security and peace of mind for their teams.” Overall approach to security      “Our goal is to deliver first class healthcare, and ensuring the safety of all who enter our facilities is a critical step in providing that service,” said Dean Stienburg, Director of Security for Nova Scotia Health. “With SmartGateway, we’re making tangible strides in bolstering our overall approach to security. We were impressed by the system’s effectiveness during the trial period and are looking forward to the deployment helping us mitigate and respond to the threats of today’s environment.”  Maximising security screening outcomes SmartGateway delivers fast, discreet, and accurate individual screening, utilizing AI-powered sensors to unobtrusively scan for weapons and other prohibited items upon entry. This technology replaces intimidating, traditional metal detectors and mitigates the need for individuals to remove personal items. This prioritizes individual privacy and comfort, all while maximizing security screening outcomes. SmartGateway is designed to enable seamless passage through checkpoints and promote the uninterrupted flow of movement.

Hikvision AIoT: A New Era For Elderly Care Facilities
Hikvision AIoT: A New Era For Elderly Care Facilities

Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specializes in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.

View all

Healthcare products

Milestone XProtect Hospital Assist Remote Patient Monitoring Technology

Milestone XProtect Hospital Assist Remote Patient Monitoring Technology

Temperature Screening For Challenging Times

Temperature Screening For Challenging Times

Avigilon Presence Detector (APD) Impulse Radar Device

Avigilon Presence Detector (APD) Impulse Radar Device

TESA SMARTair™ Wireless Access Control System

TESA SMARTair™ Wireless Access Control System

March Networks RideSafe IP Recorders

March Networks RideSafe IP Recorders

IDEMIA MSO 1300 Series USB Fingerprint Device

IDEMIA MSO 1300 Series USB Fingerprint Device

Axis Communications AXIS P9106-V 3MP Indoor Corner-Mounted IP Dome Camera

Axis Communications AXIS P9106-V 3MP Indoor Corner-Mounted IP Dome Camera

Wireless Access Solutions In Healthcare

Wireless Access Solutions In Healthcare

View all

Healthcare white papers

Essential Data Security Strategies For Healthcare

Essential Data Security Strategies For Healthcare

Download
The Future Of Healthcare Security Is Connectivity

The Future Of Healthcare Security Is Connectivity

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Verkada Workplace Safety Survey

Verkada Workplace Safety Survey

Download
Securing Care Closer To Patients

Securing Care Closer To Patients

Download
Healthcare Surveillance: Finding Efficiencies From OR To ER And Beyond

Healthcare Surveillance: Finding Efficiencies From OR To ER And Beyond

Download
Intelligent Video Security Solutions

Intelligent Video Security Solutions

Download
Solve Access Control Challenges in the Healthcare Sector

Solve Access Control Challenges in the Healthcare Sector

Download
Using Smart Video Analytics to Improve Operations in Healthcare Facilities

Using Smart Video Analytics to Improve Operations in Healthcare Facilities

Download
How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

Download
Thermal Cameras: Can They Accurately Detect Body Temperatures?

Thermal Cameras: Can They Accurately Detect Body Temperatures?

Download
The Healthy Market For Video Surveillance At Medical Facilities

The Healthy Market For Video Surveillance At Medical Facilities

Download
View all

Healthcare videos

Milestone Systems Introduces XProtect Hospital Assist

Milestone Systems Introduces XProtect Hospital Assist

Milestone System's Presents Privacy Blur Of XProtect Hospital Assist

Milestone System's Presents Privacy Blur Of XProtect Hospital Assist

ABLOY and PROTEC² CLIQ in Healthcare Case Study: London Ambulance Service

ABLOY and PROTEC² CLIQ in Healthcare Case Study: London Ambulance Service

ESMS Program: Digital Transformation In The Healthcare Sector

ESMS Program: Digital Transformation In The Healthcare Sector

View more

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Healthcare security
About this page

In-depth coverage of Healthcare security featuring latest news and company announcements products and healthcare security solutions and case studies. Read insightful analysis of product technology and business trends related to healthcare security from security industry experts and thought leaders. Learn how leading security solution providers are making an impact leveraging the latest in healthcare security technologies.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec