The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can...
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million peopl...
Virtualization offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged Infrastructure Solution “ISC West attendees were...
Memoreyes, the developer of a smart, first-of-its-kind outdoor video surveillance system, is looking for qualified integrators to participate in its national dealer program. The company will provide integrators with training that centers on its patent-pending, Megapixel/HD–quality, pan-tilt-zoom camera system with machine learning. Memoreyes’ unique video offering provides an unprecedented set of advanced, almost human-like capabilities. Deter Criminal Activity “Integrators...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals, stadiums, corporate campuses, airports, and other enterprises must maintain high awareness over large areas via a growing number of security cameras. To know whether a familiar person, employee, VIP, perceived threat, concern, or stranger is onsite, security professionals must rely on their ability to focus on key details and then make accurate assessments. SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility" “It’s been a challenge to maintain awareness of who is present at Shelby American, whether those are specific individuals of concern or aggregate demographics of museum visitors,” said Richard Sparkman, Director of Technology, Fleet & Facilities at Shelby American car museum in Las Vegas. “SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility and helps us understand who is moving through our museum by age, gender, and time of day – allowing us to better tailor our museum experience." 24/7 Video Monitoring Available as a standalone solution or integrated with market-leading video management systems, SAFR for Security provides vigilant 24/7 monitoring to detect and match millions of faces in real time, delivering a 99.86 percent accuracy rate. In the April 2019 National Institute of Standards and Technology (NIST) test results, the SAFR algorithm tested as both the fastest and most compact amongst algorithms for wild images with less than 0.025 FNMR. When SAFR for Security is paired with a VMS, the integrated experience includes video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Security teams can customize real-time alerts to automatically notify them when persons of interest appear on a video camera feed or make use of automated bookmarking to conduct forensic analysis. SAFR for Security attaches rich metadata to video footage so security professionals can search by time range, location, category, person type, and registered individual instead of sifting through hours of video to find a specific person. All data passed through SAFR is protected with AES 256 encryption in transit and at rest “Security professionals are inundated with hours of raw footage, much of which must be evaluated in real time by a limited number of human eyes,” said Dan Grimm, Vice President and General Manager of Computer Vision at RealNetworks. “SAFR for Security helps these professionals maintain higher awareness by combining our highly accurate AI-based facial recognition service with the software they currently use.” Facial Recognition Systems The underlying SAFR platform has been optimized to detect and recognize faces in live video based on its industry-leading excellence in accuracy and performance. The SAFR platform can be deployed on a single PC to monitor a handful of IP cameras or scaled to thousands of cameras in a distributed architecture hosted on-premises, in the cloud, or hybrid. All data passed through SAFR is protected with AES 256 encryption in transit and at rest. The platform also provides actionable data for live analytics of traffic volumes, demographic composition, dwell times, and data exports for further reporting. “We’re delighted to partner with RealNetworks to extend our intelligent IP video system with SAFR for Security’s highly accurate facial recognition,” said Thomas Lausten, CEO, MOBOTIX AG. “The combination of SAFR and our innovative camera technologies opens up a new set of applications and use cases for MOBOTIX customers around the world, especially in retail, healthcare and education.”
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated Systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as shipbuilding, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasize smaller system sales, providing organizations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensors and devices in the network to enable "Beyond Human Vision" solutions. These solutions include the reliable detection of threats through the combination of different sensor technologies as well as the independent initiation of measures to counter such threats. Increased Process Efficiency The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods, such as the recognition of human behavior, moods or voices. In order to make this possible, a so-called "plug-in concept" is being further developed that goes far beyond what is available on competing products. This allows customers to easily create new features similar to developing apps for mobile devices while taking full advantage of the system's performance, including full CPU and GPU power and programmable logic. Examples could be analyzing customer behavior in retail situations and detect emergency situations in elderly homes and hospitals or analyze quality in production lines. The first products based on the new camera platform will be launched in the first quarter of our financial year 2019/20.
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercializes a complete range of personalization and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group's business development and establish a long-term presence in Japan. Evolis Japan K.K. Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers, expand the traditional distribution network, develop channels dedicated to new industry sectors, and strengthen response to the demands of government bodies and financial institutions."Japan is one of the world's leading economies with more than 125 million people. We therefore see strong potential for card personalization in several markets. The creation of a Japanese company will help in our existing business relationships and facilitate the development of new partnerships" says Eirik Bakke, Managing Director, Evolis APAC. On-Site Encoding And Securing Key Cards Evolis systems allow for the on-site personalization, encoding and securing of cards that support various applications, such as access control badges, debit and credit cards, ID cards, resident permits, drivers' licenses, transport passes, student IDs, as well as product tags for the retail and hospitality market.Evolis' solutions support any requirement in card personalization, from basic printing in small runs up to the personalization of advanced and secured cards in large volumes. Numerous governments, financial institutions and large retail chains are using Evolis' card personalization systems to issue their cards. Card Personalization Systems Due to its flexible manufacturing capabilities and technical expertise, Evolis meets stringent customer demands in terms or technical features, quality and delivery lead times. A project team is dedicated to designing specific and tailored solutions, recognized at national and international levels.
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for access control applications. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records Access control is critical for healthcare institutions in order to protect patient safety and meet stringent HIPAA requirements for medical information privacy. Radio frequency identification (RFID) readers are an effective and efficient means of user authentication to ensure that only authorized personnel can access patient health records, change settings on medical devices or gain access to restricted medications, equipment or supplies. Better Security Than Passwords RFID readers are more secure and easier to manage than passwords, which are easy to share and often forgotten, creating both security risks and an unnecessary IT burden. Password systems also slow down medical personnel, requiring them to remember and enter passwords into different devices, often under emergency conditions or extreme time pressure. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records, supplies and equipment they need to perform their jobs. ELATEC readers are already widely used for secure print management and other healthcare ecosystem applications such as time and attendance, computer single sign-on, room scheduling, pharmaceutical and high-value supplies dispensing, and medical equipment access control. Recognize 60+ RFID Proximity Card Transponders ELATEC RFID readers can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone BLE and NFCThere are dozens of RFID card technologies in use globally, creating challenges for hospital systems and device manufacturers wishing to implement RFID for access control beyond the front door. While other systems only recognize a few proprietary technologies, ELATEC RFID readers are universal. They can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone Bluetooth Low Energy (BLE) and Near-field Communication. They are also certified for use in 110 countries. This means that large hospital systems that may be using multiple card technologies across different locations due to mergers and acquisitions can rely on a single reader type for access control and user authentication for all the other devices and systems they use. For medical device manufacturers and software developers, ELATEC readers provide a ‘single part number solution’ that allows them to sell their RFID-enabled devices into practically any hospital system throughout the world without worrying about what kind of card technologies their clients may be using. Cost-Efficient And Longer Durability "We describe ELATEC’s readers as being future proof,” explained John Tepley, President of ELATEC USA, Inc. "There are numerous technologies used for various applications throughout the region and the world, which means companies that want to integrate RFID into their solutions must be prepared to handle many different RFID transponder technologies. ELATEC is uniquely positioned to meet these challenges." ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements, so they are inexpensive to maintain and will remain usable longer than competing reader technologies. As the healthcare ecosystem becomes more connected and complex, and the FDA puts increasing emphasis on cybersecurity risks for medical devices and software applications, developers need smart, easy solutions to close security vulnerabilities around user access and authentication. RFID provides fast, easy and secure authentication for all kinds of medical devices and applications. ELATEC readers can help developers meet emerging security challenges and address the needs of their healthcare clients.
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. Diary Management Processes VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. Important Additions A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. Security Investments The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" These latest integrations include IP intercom hardware from Jaquies; the mobile phone app GuardPoint; and the Metra locker system hardware. For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform, says Lee Copland, Managing Director, Maxxess EMEA. “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Allows Security Controllers Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone-Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations. With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Better Optimized Workforces “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.” “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organization. Risk Stratification And Control Objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-Factor Authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organization can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organization. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organization. This issue is so important – once we institute risk acceptance, our organization suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions.Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organization? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organization to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: Prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: How do we all, collectively, keep up? More critical is finding ways to offer or utilize new technologies and total solutions that make operations easier Ensuring Security Preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training In New Security Solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying An End Goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilizing new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing Access To Buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing Security Partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry Collaboration For A Secure Future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilizes the existing WiFi infrastructure in a building to create a personal, mobile safety device built to save lives — all while reducing infrastructure and cost. Tragedy Informing The Industry The tragic and unfortunate events that occurred in 2017 and in the years prior, such as mass shootings and natural disasters, have made adding layers of security a prominent trend in 2017. Soft targets have unexpectedly become the focus of many attacks, placing an even more significant emphasis on determining how to protect individuals within a campus. Visitor management was a key trend VuTeur focused on this year and will continue to concentrate on, as many security issues tend to stem from an uncertainty of who is in a building at any given time. Securing all types of campuses will continue to be crucial into 2018. Schools, healthcare facilities, stadiums and arenas, and other organizations face the challenge of maintaining a welcoming and friendly environment, while understanding and monitoring who is in the facility and properly safeguarding the area. Stadiums and arenas face the challenge of maintaining a welcoming and friendly environment, while properly safeguarding the area The security industry will continue to trend upward, which will help push new technologies, such as VuTeur's, that augment perimeter and building safety in every vertical. What’s To Come Next year, VuTeur's technology portfolio will expand, and we plan to establish deployments in a variety of applications, such as on educational campuses, hospitals, arenas, corporate campuses and government facilities. Communication will remain critically important in the event of an emergency, making RTLS technology extremely valuable for conveying routine- and threat-based messages. Integration will also be a significant trend in 2018, as it is vital for security systems to "talk" to each other, such as RTLS talking to access control and mobile devices, to create a more holistic approach to protecting assets and people.
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth Of Mobile Credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of companies supplying a mobile credentialing system to the market. Lenel’s Blue Diamond mobile credentials are based on technology developed by United Technologies sister company Supra. The use of a cell phone (by Supra) to open a real estate key box has already been adapted to the hospitality industry (with a deployment at Hilton Hotels), and now as an access control credential, part of Lenel’s OnGuard Version 7.3 release for the commercial and industrial security market. The components of the system are a Bluetooth reader, a virtual credential provided through a smart phone app, a cloud-based credentialing portal, and integration with the latest version of OnGuard. Offering a full solution is simpler to implement, and Lenel even has an “in-line” Bluetooth reader that can be used to add Bluetooth capabilities to existing systems. It’s just one aspect of the OnGuard 7.3 release that also is “reinventing the OnGuard experience,” according to Ross McKay, Lenel Systems International’s Director of Project Management. Future Adoption Mobile credentials are big talk at ASIS, but how long before they will be widely used? Estimates are all over the map, but research firm IMS has projected the percentage adoption of mobile credentialing at 19 percent by 2020 (according to McKay of Lenel). "Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately, anything you can give them on a phone, they will use" But Steve Van Till, president and CEO of Brivo, which launched its mobile credentialing system at last year’s ASIS, sees a range of possibilities in terms of adoption. Witnessing the fast adoption of smart phones as alternatives to perform a large number of daily tasks, some say mass adoption could only be a couple of years away. On the other hand, in our market, a lot of people are still using proximity cards (despite introductions of superior alternatives over the years). That legacy argues for slow adoption indeed. “Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately,” says Van Till. “Anything you can give them on a phone, they will use.” Because ASIS is an end user show, exhibitors tend to reflect on the changing dynamic of selling to end users. Changing Purchasing Dynamics How end users buy products may be changing -- obviously the IT department is having a greater influence than ever before. But what hasn’t changed is the importance of creating a system that will keep end users satisfied as they use it day-to-day for years after the installation is complete. IT may be yielding more influence, but at the end of the day, it’s the security customers -- the attendees at ASIS -- who must be satisfied. “While the IT infrastructure and personnel are involved in how decisions are made, security personnel are still heavily involved,” says Sharad Shekhar, CEO of Pelco by Schneider Electric. “On a day-to-day operations level, it’s the security user who either truly benefits or gets truly hurt by the product. We face IT challenges up front, but the day-to-day utility of our products in the market is judged by the security people, not the IT people.” Shekhar says feedback from those day-to-day end users is one factor that makes a show like ASIS so important. “We need to get continuous feedback to guide our future product development,” says Shekhar. “The type of people who do security -- they like stability. They like certainty because it’s the nature of the business. They want to apply solutions that have been vetted, that are proven. Customers can’t afford to make a mistake.” "The type of people who do security - they like stability. They like certainty because it’s the nature of the business" At ASIS, Pelco is showing its VideoXpert open video management system (VMS) platform, integrated with the Optera multi-sensor panoramic camera. The ability of the VMS to display a seamless multi-sensor image is getting good feedback from customers. Pelco’s core strategy is to focus on four major verticals -- gaming, city surveillance, oil and gas, and ports. They devote a range of resources to each of the major verticals, including multi-functional teams including research and development, engineering, product support and marketing personnel. A fifth core vertical in the United States is corrections, and Pelco also sells in secondary verticals such as education, healthcare, etc., although they are focusing more on the core verticals. Education And Training Education is an important aspect of the ASIS show, there are rooms and rooms of educational sessions on a range of topics going on concurrently with the trade show. But education is also happening on the show floor, often in the form of presentations from vendors in theater-like areas of their booths. Promise Technology, a manufacturer of storage systems, is a first-time ASIS exhibitor that is providing educational sessions in their presentation theater in cooperation with VMS partners. “There is a lot of information in education and training,” says John van den Elzen, Managing Director, Worldwide Surveillance Business Unit, Promise Technology. “End users like to know how a solution is working. They don’t want to hassle with it if it doesn’t work. We qualify all the VMS vendors before the product comes to market. We know it works. We have a good relationship with the VMS vendors and work together if there is a problem -- no finger-pointing.” Promise provides RAID storage systems that are specifically targeted to the security market, and promote the products using security terms rather than IT terms. And they listen to feedback, whether at a trade show or at the many education events they have held globally to growing numbers of attendees. “This is very successful,” says van den Elzen. “People have a lack of knowledge and we look to fill in that gap.” There’s more knowledge to be had, and more exhibitors to visit in the second day of ASIS.
End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15 percent to as many as 25 to 40 percent of openings. Access Control For Data Centers Openings don’t just mean doors – it could mean a lock for a prescription drug cabinet in a hospital or physical access to a server in a data center. I caught up with ASSA ABLOY at AMAG’s Security Engineering Symposium (SES) 2016. AMAG and ASSA ABLOY are technology partners – AMAG’s Symmetry access control system is integrated with ASSA ABLOY’S IP-enabled locks. Our discussion covered changing locking trends – and new opportunities for consultants, integrators and end users. “It used to be enough to secure the perimeter of a data center, for example” says Jim Crowley, ASSA ABLOY’s Electronic Access Control (EAC) OEM Business Development Manager. “But now customers want to be able to secure the actual rack the server blades are in. In a co-located data center, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data.” Regulations are driving some needs for new locking solutions. In the data centerscenario, protection of medical information required by HIPAA [the U.S. Health Insurance Portability and Accountability Act of 1996] is driving the need to secure various openings – there are hefty fines for any violations of HIPAA rules. "It used to be enough to secure the perimeter of a data center, but in a co-located data center, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data" “If you look at the regulatory environment we’re in today, NERC (for the electric utility market) and HIPAA and those types of regulations are requiring that openings have auditability,” says Crowley. “You need to know which people have access to openings both proactively and on a forensic basis. That’s driving access control further into the enterprise and onto openings that you historically didn’t see.” [NERC is the North American Electric Reliability Corp.] Wired Vs Wireless Locks “There’s no one-size-fits-all solution,” adds Chapman. “You want to be able to offer a locking solution based on needs and budget, and you have a lot of options.” While every lock cannot be wired, it’s also true that many applications don’t lend themselves to wireless solutions. A strategic mixture is the best approach. “We are not trying to displace all hard-wired doors with wireless,” says Crowley. “There will always be a need for wired and wireless – they’re complementary, and not mutually exclusive.” He also notes that wireless locks use AES 128-bit encryption to ensure security. “We are always looking to improve the security of that wireless transmission, but some people have it in their head that wireless is not secure, which isn’t the case.” However, because concerns persist, ASSA ABLOY just came out with Wiegand wired versions of its cabinet locks and server cabinet locks. Some data centers just don’t want wireless locks in their facility. Adopting Cloud Security Solutions Another development is cloud applications for the light commercial market, which offer an attractive price point that combines security and convenience. “When folks talk to me about being concerned about security in the cloud, I ask them: How do you do your banking? If you’re using your bank’s Web-based services, your entire financial life is in the cloud.” When developing its variety of locking solutions, ASSA ABLOY is always listening to the voice of the customer, says Chapman. “We want our solutions to be innovative and customer-centric, with everyone having a good user experience – including our OEM partners, channel partners, integrators and end users.” The company has teams of people who constantly call on integrators, security consultants and architects, as well as owners and users. “We are constantly evolving, and we want to take whatever necessary steps to make doing business with ASSA ABLOY easier.”
We all know that security video cameras are becoming smarter. The IP cameras at the edge of today’s video surveillance systems contain computer chips that can potentially change how cameras are used. However, despite the changing technology and greater intelligence at the edge, today’s systems mostly use video cameras for one thing – to provide video. In some cases, the cameras provide hours and hours of video that no one will ever watch. Re-Examining The Role Of Video Cameras Prism Skylabs is helping to drive a re-evaluation of the role of video cameras in the market. Founded in 2011, the San Francisco cloud service company thinks of IP cameras as sensors that are capable of providing a range of data that can be managed and processed in the cloud to provide more useful information to end-user customers. Prism’s current implementations of the “software as a service” approach focuses on retail merchandizing and marketing applications, but Prism Co-Founder and Senior Vice President Bob Cutting sees many other opportunities too. The cloud infrastructure provides a “reliable and continuously connected way to monitor and get data from cameras that is extremely robust and reliable,” Cutting says. Information from cameras “trickles up” to the cloud where data is “pre-extracted and available,” helping retailers optimize their store designs and marketing. Prism provides a blend of complementary visual and analytics data. "We looked at the camera andreimagined what it can do as a realsensor – a sensor with intelligencethat is cloud-ready, cloud-enabledand easy to install. How we think ofvideo has to change" Retail Applications Of Video Analytics In the retail world, the approach enables marketers and merchandisers to constantly observe and monitor retail displays and customer activity from around the world in real time. Store owners can tell, for example, if their stores opened on time. Did a new product launch effectively? “There are hundreds of questions that retailers want to answer, and they don’t want to watch streaming video from the store,” Cutting says. “They just want answers to questions.” He says the system provides “an easy way to navigate and access data.” If you think of a camera as an intelligent sensor, the data provided by that sensor can take many different forms (and only one of them is “streaming video,” which may not be the most useful for a specific end user need). Cutting says the data is “privacy enabled,” and does not contain personal information. Integrating With CCTV Manufacturers Prism has integrated its cloud system with cameras from Digital Watchdog, and announced integration with Axis cameras at the recent ASIS International show in Anaheim. The company is also in the process of integrating with several other large camera manufacturers in the video surveillance market. Employing intelligent cameras at the edge, the company “saw overnight a shift from server-based solution to an edge-based camera solution.” “It’s the right form factor,” says Cutting. “We looked at the camera and reimagined what it can do as a real sensor – a sensor with intelligence that is cloud-ready, cloud-enabled and easy to install. How we think of video has to change.” Role Of Video Analytics In Store Security Security cameras are capable of providing up to a dozen additional outputs, combining data with visual elements, says Cutting. For example, intelligent cameras can count people, and can track movement of customers in a store based on defined rules. An end user can know how many people go down a certain aisle, how long they dwell in front of a display, how many people visit a certain area in a given time. Cameras can also provide “visual summaries” of activity in a store, showing graphically who went where over a certain period of time, providing retail traffic maps, heat maps, and other visual outputs to guide store owners and managers. Cameras can also provide “visualsummaries” of activity in a store,showing graphically who wentwhere over a certain period of time,providing retail traffic maps, heatmaps, and other visual outputs toguide store owners and managers Finally, cameras can provide a variety of visual data (in addition to streaming video). These include video snapshots (high-resolution images taken periodically and delivered in high resolution to the cloud). Visual outputs might also include “background models,” which are images of retail shelves presented without the customers moving in front of them to provide a detailed view of products and how they are arranged on the shelf. There are also other types of visual outputs, such as time-lapse video, and thumbnail images taken one frame per second. In effect, the visual output is matched specifically to what the end user wants to see – and one camera can be used for multiple outputs to meet the needs of various stakeholders. (Cameras can also provide outputs focused on the needs of loss prevention and security departments.) Examples And Applications Of Retail Analytics Lolli and Pops, a 26-store candy chain, is using the system to change the candy store experience. Using the Prism Skylabs system, the company tests multiple combinations of merchandizing displays, and measures the effectiveness (and maximizes the benefit) of each. The company employs A/B testing – one display in one store and a different display in a second store – to measure which approach works best, in effect fine-tuning the retail experience for customers. Another Prism customer is a large retailer deploying the system throughout Europe, leveraging the system’s ability to count, provide visual insight and understanding, and real-time visibility into the effectiveness of merchandizing displays (using a 25-point checklist to ensure compliance). Other potential end-markets include retail banking, hospitality and even casinos – “anyone who wants a better understanding of their space,” says Cutting. He says there is a growing opportunity for physical security integrators in the area of retail analytics, and use of cameras as sensors conforms to emerging industry trends such as “Big Data” and the “Internet of Things” (IoT). He asks: “How can we break down video into core components that are IoT-friendly and that a wider audience can use?”
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralized operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralized operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
The London Clinic has installed bespoke Traka solutions to ensure accountable authorized access and instant audit control capability for keys across its state-of-the-art hospital facilities. Harley Street’s globally renowned London Clinic is one of the UK’s largest private hospitals, dedicated to providing the best, personalized healthcare with a breadth of surgical and medical expertise. With hundreds of keys and access points in operation across the hospital, the Security and Operations team was reliant on a manual logging in and out system, which was proving inefficient and risked time delays to patient care. In sourcing a more innovative way to keep track of authorized access, especially to drugs cabinets and the Clinic’s 10 specialist theater areas, Traka was installed and networked across the site. The benefits of instant audit control capability and additionally being able to set curfews for different staff rotas has already made a significant difference in the efficient running of the Clinic. Ensuring safety of staff and patients Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location"“The vision and values of the Clinic have been developed through working with our Trustees, management teams and staff. As part of this process, we pride ourselves on being ‘pioneering’ not only in our attention to medical care but also in establishing better and more efficient ways of working,” says Lee Humphries, General Manager Security Operations at The London Clinic. “This is across every aspect of The Clinic, right down to daily operations. Security and key management are integral not only to the efficient running of the Clinic but also to ensure the safety of our staff, patients and guests. Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location; allowing our staff to focus on delivering high-quality service.” In total, Traka has installed four networked key cabinets, which utilize its flagship Traka32 technology to provide all the administration tools needed for the Clinic to effectively manage operations from its server and still provide extensive real-time data capture. Enhancing the hospital functionality Within the system, the Security team has now set curfews so that keys not returned will automatically trigger a notificationWithin the system, the Security team has now set curfews so that keys not returned will automatically trigger a notification, sent via email and text. There is also an opportunity for authorized personnel to pre-book keys in advance, so they are reserved, which has proven especially useful to manage contractor access and work programs. Ben Farrar, Traka Marketing Development Manager added: “Providing key management solutions for a hospital environment, such as The London Clinic, involves more than a choice of high-quality products and services – it encompasses best practices and an integrated approach to ensure the safety and security of staff, patients and visitors. “We worked in partnership with the Security and Operations team, right from the initial design process to create a bespoke Traka solution that could instantly enhance the smooth running of the hospital, without compromising on ease of use in emergency situations. And by adding Traka32 software, we achieved the requirements with the flexibility to create own central control over authorized access to critical keys.”
Ports of Jersey operate the island’s busy harbors and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harboring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totaling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doorsTo drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-Friendly Features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?