Milestone Systems announced a webinar panel discussion of safety and security professionals, including representatives from Nemours Children’s Hospital Health System in Jacksonville, Florida, and The City of Calgary in Alberta, Canada. They will share insights and ideas on how to address change, support their core mission and assist other parts of their respective organizations. The webinar will focus on how these three different organizations are using their video management system to he...
Systems consultants and end-users who want to use products from Axis Communications now have a choice of easy, off-the-shelf options, following a distribution agreement between Ingram Micro and Quanika. Quanika’s latest portfolio of software solutions, already being used in the NHS and at major distribution and manufacturing sites, is designed to make integration more straightforward. The company’s modular, ready-made approach means that it is now simple to deploy Axis Communication...
Sentry Security Solutions a commercial and residential security provider headquartered in Texas now offers Human Temperature Scanners. This product line is designed for quick and easy deployment at scale across school campuses, businesses, and other commercial applications. Campus and Workplace Protection during COVID 19 requires new technology like Sentry Live HT thermal imaging. The solution is currently being utilized for hospitals, corporate campuses, airports, retail stores, train stations...
Telguard, a provider of security and life safety communications, announced that it’s partnering with sister company AMETEK Land to offer the VIRALERT 3 Integrated Human Body Temperature Screening System as part of its security distribution channel offering. The VIRALERT 3 is a non-contact temperature monitoring camera that detects body temperatures as people enter a building while maintaining appropriate social distancing. The VIRALERT 3 builds on AMETEK Land’s expertise in temperat...
The compact new SALTO Neo Cylinder is a compact smart door lock cylinder equipped with state of the art wireless access control design technology. It is designed to provide smarter building management and can be installed on doors where fitting an electronic escutcheon is not normally possible or required and includes standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. For nearly a decade, SALTO, in partnership with BioCote® - the antimicrobial technol...
STANLEY Security, a global integrator of comprehensive security solutions and the world’s second-largest electronic security company, has announced its investment in Evolv Technology, the globally renowned company in artificial intelligence (AI)-based touchless security screening. This investment, backed by STANLEY Ventures, the venture capital arm of Stanley Black & Decker, forms a strategic partnership between the two companies. Evolv Express Evolv Express, the company’s tou...
In the era of the smartphone, Bluetooth Low Energy (BLE) is transforming the future of access control. This removes the need for a physical card or tag and replaces it with a secure Bluetooth credential that communicates with the reader to grant or deny access. As a fast follower of this technology, Vanderbilt will be introducing: A range of BLE readers A contactless door release button in the same look & feel as the Bluetooth readers Virtual credentials available through ACTpro Software license, including 1 FREE demo credential FREE end-user app for Android and iOS The BLE readers and accessories work exclusively with the new release of ACTpro Software V2.10. Bluetooth Card Readers BLE hardware with Vanderbilt software Vanderbilt virtual credentials purchased via a software license Wiegand & RS485 interface options Compatible with MIFARE Classic & MIFARE DESFire EV1, EV2 Compatible systems: ACT Enterprise (ACTpro Software) Bluetooth virtual credentials Smooth Migration: Reduce the total cost of ownership by extending the life of existing ACTpro system controller and hardware, while allowing a smooth migration to cellphone credentials. Save Time & Money: Cellphone credentials are time and cost-effective alternatives to managing physical credentials. Easy Management: Creating, deploying, and the management of access rights can be carried out by the administrator directly in ACTpro Software for easy management. Customer Convenience: Bluetooth removes the need for a physical credential and replaces it with a virtual credential for smartphone devices that provides customers with a smooth user experience. Secure: Data encryption with 128bit AES encryption and randomization. This encryption is the same grade used by banks and hospitals. Future-proof investment: The Bluetooth readers also act as a traditional card reader. This means users can continue using MIFARE cards and slowly migrate to the Bluetooth virtual credentials at their own pace. The total cost of ownership: In comparison to other brands in this area, Vanderbilt is offering a one-off license purchase as opposed to a subscription-based model that would include annual charges per virtual credential. Instead, the company's approach means the users will have no hidden or extra costs and make big savings in the long-term. Distribute virtual credentials A Bluetooth reader and the ACTpro software are used to add and distribute virtual credentials, much in the same way as a traditional physical card or tag is allocated to an employee or visitor. How it works? The end-user downloads the Vanderbilt Bluetooth app, and registers for a credential with the system administrator (i.e., receptionist, facilities manager, etc.). Authorization can be granted both offline and online. The system administrator reviews and processes the request. This, in turn, sends the end-user a QR code that they save to their smartphone and link to their app to generate their credential. The end-user then uses the credential (via the app) when approaching doors with Vanderbilt BLE readers to gain access. Unique user experience with 2 identification modes for easy management: “Shake to Go” or “Show to Go”. IP65 water-resistant with waterproof electronics. Easy to install and use with enrollment software in ACTpro.
To further develop effective and customized solutions for Seek Scan™, one of the most affordable thermal temperature screening solutions meeting FDA guidelines during the COVID-19 public health emergency, Seek Thermal announces it has made APIs available for access control, VMS and other integrated network capabilities. The Seek Scan thermal imaging system (MSRP $1,995) is specifically designed and calibrated to quickly automate body temperature screening using skin temperature as a proxy, while enabling social distancing protocols. In a few seconds, the system automatically detects a face for measurement and displays an alert if the readings are warmer than the customizable alarm temperature. Thermal scanning system The thermal scanning system follows FDA guidelines by meeting the accuracy specification, including a reference heat source (black body), and by being made for single person screening at a fixed distance. The new API capabilities allow Seek Scan to be accessible anywhere on a network The new API capabilities allow Seek Scan to be accessible anywhere on a network, enabling access control systems, video management systems, integrators, and business owners to manage and access their Seek Scan systems and solutions. Now, integrators can implement Seek Scan temperature screening to send alarm events, trigger access control and video management systems as well as pull and present historical data to integrate multiple Seek Scan units into one enterprise solution. Video management systems Specific integrated functionality could include: Accessing entry doors following scans Triggering access control and video management systems Allowing custom designed solutions utilizing Seek Scan hardware Sending pass/fail scan messages and alarm events Flagging video when a scan occurs “The demand for temperature screening and integrated API solutions has been growing rapidly,” said Mike Muench, CEO and President of Seek Thermal. “As businesses, institutions and organizations seek to provide safer environments in an increasingly uncertain time, we recognize the needs of our customers don’t stop with the contactless screening technology itself - the new and expanded integration capabilities of Seek Scan offer additional control, convenience and confidence.” Developing customer relationships Whether the desire is to unlock a door with a temperature scan, capture an image or flag a video when a scan occurs, or send email alerts, Seek Thermal has made it easy for integrators to connect temperature screening to their network using its JSON based APIs to do all that and more. With Seek Scan, the company has developed customer relationships with a diverse group of organizations, including manufacturers, government institutions, hospitals and medical facilities, office buildings, hotels and hospitality providers, schools and universities, first responders and professional sports organizations. Seek Thermal will continue to release features, capabilities and protocols to enhance its API offering.
Identiv, Inc. announced the launch of its frictionless, battery-less uTrust UHF Credentials that work with identification applications that require long-distance reading. Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. Long-read applications The credentials can be read through badge holders, handbags, pockets, and backpacks, supporting touch-free, highly hygienic physical access control. “For today’s most critical pandemic-era environments, Identiv is focused on providing solutions that support the safest, most hygienic physical access control,” said Stephane Ardiley, Director, Product Management. “Our new uTrust UHF Credentials harness ultra high-frequency technology for long-read applications - meaning your access card never has to leave your pocket as you enter gates, buildings, or controlled areas in schools, hospitals, or other hands-free locations. Beyond access control, uTrust UHF Credentials can be utilized in emergency situations or in the medical field for real-time people and object tracking.” Radio frequency identification cards uTrust UHF Credentials can keep track of people to increase personal safety and facility security Identiv’s uTrust UHF Credentials provide multiple options for durable, interoperable radio frequency identification (RFID) cards. UHF technology (operating in the 860 - 960 MHz frequency range) delivers outstanding performance for long-distance, multiple, reliable readings of credentials, including cards and tags. Leveraging the short wavelength of UHF technology, they are the ideal solution for reading people or items from a significant distance (i.e., more than 18 – 21 feet). uTrust UHF Credentials can keep track of people to increase personal safety and facility security, capture guest/visitor data, and can support 125 KHz low frequency (LF) and/or 13.56 MHz high frequency (HF) interfaces. The credentials are EPC Class-1 Generation-2, ISO/IEC 18000-63:2013, and RAIN UHF RFID-compliant and are compatible with a huge selection of second-generation UHF readers available on the market today, including handheld, stationary, or desktop readers. Time and attendance Offered in regular credit card plastic format (CR80) for corporate or government personnel, uTrust UHF Credentials are available in two models: ISO PVC UHF LF Card and ISO PVC UHF DESFire EV2 2K Card. Identiv’s cohesive collection of touchless solutions are focused on reopening public venues and workplaces as safely as possible. Identiv’s portfolio of credentials, ID cards, and smart cards are available in a variety of form factors for physical and logical access control, converged access solutions for building and computer access, transit payment, brand protection, time and attendance, cashless vending, and Internet of Things (IoT) applications. Solutions are available as single-technology, multi-technology, or credentials with a contact chip.
Interface Security Systems, together with Sally Beauty and Whereable Technologies will host a webinar called: ‘5 Actionable Steps You Can Take to Safeguard Your Lone Workers Now’. Recently, a wide range of businesses including retailers, restaurants, banks, hospitality chains, and real estate companies are having to adapt their business models while operating with reduced staff. While lone employees play a critical role in keeping these businesses up and running, they are more at risk of encountering life threats at work. Increasing safety measures In times like these, more attention needs to be placed on increasing safety measures for lone employees. Security professionals are looking at ways in which they can add another layer of protection for their associates when they are working alone, for locations with limited or no existing protection, or to expand security coverage outside a business’ building. This webinar will discuss how to roll out a cost-effective lone worker security strategy to cope with lower staffing levels and the increased risks they are facing. During the one-hour-long event, attendees will learn about: Who is a lone worker and why should businesses worry about them now? How to put in place a lone worker safety policy and why it’s important to do it immediately. How to train lone workers to deal with emergencies and put in place a training What options should be considered when rolling out a lone worker safety solution. Why lone worker safety devices should be integrated with a comprehensive monitoring Key speakers will include: Jim Mires, Vice President Loss Prevention and Safety at Sally Beauty, Jim Van Law, President & Board Member at Whereable Technologies, Matt Smitheman, Sr. Solutions Consultant at Interface Security Systems.
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mounting. Using automatic face detection, it locates the best areas for temperature detection, taking a reading that’s accurate to within 0.5oC, then calculating core body temperature through a rapid test procedure of approximately two seconds. Thermal imager camera The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms It provides an effective solution for scanning visitors at entry points into hospitals and healthcare facilities, commercial areas, education facilities and public spaces, transportation entry points, offices and manufacturing locations, and sports and leisure sites. Designed to screen visitors at an entry point without slowing the flow of people, the VIRALERT 3 scans temperatures without any person-to-person contact, keeping both parties safe from disease transmission. The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms alerting when high temperatures are discovered. To ensure the highest levels of accuracy and reliability, it has a blackbody calibration source fitted on the same platform as the integrated thermal imager/visual camera. This makes for a compact system that won’t get in the way of queueing people and can be easily wall-mounted. Infrared measurement instruments The VIRALERT 3 builds on AMETEK Land’s proven expertise in temperature technology. The company has been developing high-accuracy infrared measurement instruments since 1947, and has been creating human body temperature screening systems since responding to the SARS outbreak of 2003. Set-up is simple; with no complex software configuration required, the system can be up and running within 30 minutes of delivery.
ASSA ABLOY has signed an agreement to acquire FocusCura, a provider of technology solutions for senior care in the Dutch market. FocusCura has developed a software platform, which in combination with other products and technology services, enables elderly care organizations to focus on care. "I am very pleased to welcome FocusCura and their employees into the ASSA ABLOY Group. FocusCura is a strategic technological addition to the ASSA ABLOY Group. The company will reinforce our current offering within Senior Care and will provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. Digital solutions for care providers “FocusCura is a true innovator in digital solutions for care providers and senior people. The FocusCura offering is a good fit with our solutions in Phoniro and together we will continue to support people to stay independent for longer and live enriched lives,” says Christophe Sut, Executive Vice President and Head of Global Technologies business unit Global Solutions. FocusCura was founded in 2003 and the main office is located in Driebergen-Rijsenburg, Netherlands. The acquisition will be dilutive to EPS from start. The acquisition is expected to close during the third quarter of 2020.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organization. Risk Stratification And Control Objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-Factor Authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organization can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organization. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organization. This issue is so important – once we institute risk acceptance, our organization suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions.Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organization? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organization to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
The general public doesn’t give much thought to the important role of security officers in creating and promoting safer environments. The low-profile work of security officers is vital to protecting people, places and property. During the pandemic, newer aspects to that role have emerged. Security personnel have been called on to perform diverse tasks such as managing queues at the supermarket, safeguarding testing centers and hospitals, ensuring food deliveries, and supporting police patrols. The British Security Industry Association (BSIA) and two other organizations in the United Kingdom are joining forces to raise awareness of the work of security officers and to recognize the vital importance of the duties they perform. BSIA, a trade association, includes members who are responsible for 70% of privately provided UK security products and services, including security guarding, consultancy services, and distribution and installation of electronic and physical security equipment. BSIA, the Security Institute and the Security Commonwealth Joining BSIA in the awareness campaign are the Security Institute, a professional security membership body; and the Security Commonwealth, which is comprised of 40 organizations from across the security landscape with common objectives to build professionalism, raise standards and share best practices. “The recognition of security officers as key workers is the start of a re-appraisal of what service they provide to the community in keeping the public safe and secure,” says Mike Reddington, BSIA Chief Executive. “As we exit lockdown and have to navigate public spaces again, [security officers] will have a crucial role in supporting public confidence. We are working closely with the Police and all other public bodies to find the best way to achieve this.” Security officers acknowledged as key workers The campaign will showcase security professionals as a respected, valued, professional service provider and a key worker that is acknowledged and embedded in daily lives. The British Security Industry Association (BSIA) and two other organizations in the United Kingdom are joining forces to raise awareness of the work of security officers “Great effort has been invested in the professional standards and capabilities of frontline [security] officers, and they have proven their worth during the coronavirus crisis in the UK,” says Rick Mounfield, Chief Executive, the Security Institute. “They, along with the wider security sector, deserve to be recognized, respected and appreciated for the safety and security they provide across the United Kingdom.” “[We are working to] build professionalism, raise standards and share best practices, and I hope this campaign can make more people recognize the changes we have all made and continue to make,” says Guy Matthias, Chairman of the Security Commonwealth (SyCom). The industry will be reaching out to companies, professionals, and organizations in the sector to participate in the campaign. The hope is that, over the coming weeks as lockdown is eased, the industry can play its part to ensure that the country emerges with confidence to start to recover and build for the future. Private security more important than ever The campaign will showcase security professionals as a respected, valued, professional service provider Across the pond in the United States, law enforcement professionals are facing a crisis of confidence during a time of civil unrest as protestors call to “defund the police” and to otherwise undermine and/or recast law enforcement’s role in preserving the peace and ensuring public safety. If an upshot is that public policing is starved of resources, the role of private security to supplement their mission is likely to increase. In short, the role of private security is more important than ever on both sides of the Atlantic. Public recognition of that role is welcome, obviously. In any case, the importance of their role protecting people, places and property has never been greater.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimization Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licensing With a simple licensing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
iSpace Environments, a Minneapolis-based commercial furniture and technology dealership, is now using Carousel Digital Signage software to promote its services and amplify its message throughout its showroom as part of a technology upgrade and renovation. A longtime Carousel Digital Signage reseller, iSpace provides furnishing and technology design and integration services to clients in the corporate, higher education, healthcare, and automobile retail sectors. As organizations re-open following the COVID-19 pandemic, iSpace is helping clients reconfigure their workspaces to comply with the new health and safety regulations. Their interior transformation adheres to these compliance standards and demonstrates how furniture and technology can create safe, comfortable work environments. Content creation and management Showing the technology creates awareness of what AV technology offers for workplace design" iSpace is now using Carousel Cloud software to communicate health and safety guidelines, welcome messaging, visitor information, and examples of how clients can apply digital signage to their own environments. All visual messaging is distributed to flat panel televisions and video walls throughout the building, leveraging Carousel Cloud’s interoperability with Apple TV devices to simplify and centralize media playout. iSpace’s AV experts demonstrate the software’s capabilities during tours, including multi-display support, Apple TV interoperability, and ease of use including simplified content creation and management. Communicate competitive advantage “Showing the technology creates awareness of what AV technology offers for workplace design,” said Nate Pesch, Technology Sales Manager at iSpace Environments. “Our customers aren’t always aware of our technology-related products and services, and Carousel Cloud helps us communicate our competitive advantage.” Pesch confirms that the digital signage content they show to visitors often opens the conversation to broader possibilities. “The Carousel content always looks visually impressive and provides an opportunity to share our expertise around technology integration,” he said. “We have many examples of becoming a one-stop shop for customers.” Standalone server infrastructure Those conversations then lead to Carousel Cloud’s benefit in workspace communications. Carousel Cloud gives users the flexibility of being able to update content at any time and from anywhere - a benefit that Pesch says is increasingly critical during as business operations continue to change. He also points to the cost-reducing benefits of Carousel Cloud, which eliminates the traditional expense of a standalone server infrastructure. Instead, Carousel Cloud software is deployed on the organization’s existing IT infrastructure and can use common Apple TV devices or BrightSign media players (including the BSN.cloud platform) on the playout side. Use built-in templates One organization’s safety protocol may different from another, but everybody wants to feel safe" “Carousel software is easy to learn, so an organization lacking in-house design resources can use built-in templates to create content,” said Pesch. “That’s important these days as many content managers are working from home. With Carousel Cloud, content managers can make changes remotely. We can also show how easy it is to use these templates across different aspect ratios, as we display the content on portrait screens, landscape screens, and video walls in our showroom and meeting spaces. It’s very powerful.” iSpace Environments, which has remained open through the pandemic as an essential business, is seeing an increase in traffic as organizations consider how life in the workplace will change. With organizations across the globe updating facilities in accordance with new regulations, many customers are aiming to create environments that communicate how safety is their top priority. Organization’s safety protocol “We’re helping people get back to business any way we can, whether it’s with screen dividers on desks, furniture reconfigurations, or digital signage to communicate the proper safety measures,” said Pesch. “Businesses and schools need to show that they’re thinking about safety, and digital signage is one way to communicate that they’re doing something about it. One organization’s safety protocol may different from another, but everybody wants to feel safe. Digital signage is one of the most effective ways to communicate these messages.”
The tallest building in the European Union, Varso Place in Warsaw, Poland, is now live with Forge Bluepoint visitor management and Inner Range intelligent access control. Forge Bluepoint, Forge’s cloud-based visitor management solution was chosen by Varso Place’s developer HB Reavis after the firm researched the market and found it could provide a great experience for visitors as it was multi-tenant ready, multi-lingual and it could integrate seamlessly with Inner Range’s sophisticated Integriti system. Jakub Kacer, Security Manager at HB Reavis said: “When all tenants use Forge Bluepoint, our receptionists will have less administration work, we will have real-time visitor statistics and it’s a modern attractive visitor system.” Access control system Forge Bluepoint will allow the main reception teams at each building to focus on the experience at Varso Place. Visitors will be invited by tenants via email which will provide them with a unique QR code. Visitors will use this QR code to check-in at the Forge Bluepoint kiosk or with the reception team. The integration with Inner Range’s Integriti access control system allows visitors to also use the QR code to call the lifts, supplied by Schindler, to access the floor of the tenant company and nowhere else. Paul Speariett, Co-founder and Director at Forge, said: “Working closely with the onsite security and building management team at Varso Place, in Warsaw, we were able to implement Forge Bluepoint during the COVID-19 crisis from the UK. It wasn’t ideal, but we overcame the challenges and are proud to see Forge Bluepoint working to give visitors a great experience.” Visitor management supplier Forge is currently rolling out Forge Bluepoint at Nivy Tower in Bratislava and the Agora Tower in Budapest Tim Northwood, General Manager at Inner Range, said: “Our flagship intelligent integrated access control system Integriti provides robust security and sophisticated controls around access to these new buildings. But it also allows trouble-free access for users, including the ability to invite and manage visitors easily via Forge Bluepoint.” With 1.5 million sq ft of leasable space, companies including Cambridge Innovation Center, Bank Gospodarstwa Krajowego (a state-owned development bank in Poland) and the Polish offices of Nvidia, Yves Rocher and Workday will call Varso Place home and use Forge Bluepoint to invite visitors easily, safely and securely. Forge, as the chosen visitor management supplier for HB Reavis globally, is currently rolling out Forge Bluepoint at Nivy Tower in Bratislava and the Agora Tower in Budapest. Access and security solution Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centers and pharmaceutical companies, government and critical national infrastructure. It’s Integriti product is an award-winning intelligent access control and security system that can integrate with a multitude of third-party products to create a sophisticated and highly secure access and security solution while also providing trouble-free access for site users. Varso Place is Warsaw’s largest mixed-use development and consists of Varso 1, Varso 2 designed by HRA Architekci, and Varso Tower, the tallest building in the European Union at 310m high which was designed by celebrated architects, Foster + Partners.
For more than a century, SwedishAmerican Health System, its hospital and medical facilities, have been serving the community of Rockford, Illinois. As a division of the University of Wisconsin Health, the medical staff has been delivering high-quality healthcare and strategies to keep patients and families healthy. What families and patients don’t see is the security systems that have been put in place at all Swedish American medical facilities and outlying satellite healthcare clinics. “In an ongoing effort to provide security at the highest level, SwedishAmerican is upgrading all their servers to include Windows 10,” said Randy Lapp, a regional business development manager at Salient Systems. Reliable security solution “The security team has nearly completed the replacement of old DVRs with new enterprise network servers. This offers a much more reliable security solution tying all the medical facilities together. Each clinic will have a single server, while there will be multiple servers in the hospital. Server types and camera counts will depend upon the needs of each wing of the facility.” In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe. One such effort is the migration from Windows 7 platform to Windows 10 and maintaining compliance in their OS. Utilizing Salient’s CompleteView VMS with Dynamic Resolution Scaling, the security team has more than adequate bandwidth to record and store video for 90 days at each facility. Video surveillance systems The servers replace an obsolete system and have been engineered by Salient System network engineers Because the medical center offers a daycare facility, recording is ongoing, and is stored for 90 days; however, some recordings are held for as long as six months. In locations where there are privacy issues, such as patient treatment areas, no video recordings are made. Still, in spaces such as parking lots and common areas, video recording is essential. The servers replace an obsolete system and have been engineered by Salient System network engineers to accept upgrades in security solutions as technology, and various solutions evolve. Even more important is the fact that the servers are tailormade to fit the specific needs of the various hospital departments and separate clinics. The servers, just like the hospital, have evolved over the years. The PowerProtect platforms extend the limits of operational capabilities for video surveillance systems engineered for continuous access and durability. Various requirements for storage “The reason for the custom build is to fulfill several missions of the hospital system,” Lapp said. “There are various requirements for storage and differing requirements for recording frames per second. The customized nature of these security solutions fulfills the unique needs of the customer.” SwedishAmerican Hospital has video recording requirements that weren’t necessary a few years ago. This is an inner-city hospital system, where there are different and sometimes difficult challenges" Terry W. Gagliano, security manager at the hospital system, said the investment in this server solution would not only help with the upgrade to Windows 10, but it will allow greater recording capacity. “This is an inner-city hospital system, where there are different and sometimes difficult challenges,” Gagliano said. “The clinics also are within the inner city, and we wanted to ensure that we had enough bandwidth to not only record, but to store the images that we are getting. We wanted to be able to effectively record and store video for 90 days.” Mission-Critical video surveillance Recording and storage specifications vary at the hospital. For instance, at the child daycare center at the hospital, recording is active only during hours of operation, and storage of those images last from three to six months. Parking lots also are under constant surveillance, and storage on the servers is ongoing. “We’re thrilled to have these server platforms in place and working,” Gagliano said. “What we had been using is obsolete. The PowerProtect solutions are engineered to accept upgrades as they are needed and as they become available. We expect these servers to last beyond five years before we have to consider replacement.” The servers or hybrid NVRs are a value oriented digital video surveillance system, offering continuous operation with advanced components. They are rack-mounted, and as any end-user would expect, delivers reliability and a processing power required by mission-critical video surveillance. High performance in a flexible platform Because the storage of video images is important, SwedishAmerican sought a single Intel Xeon processor with 16 GB of memory, which also offered the hospital system up to 48 TB of video storage. “We were looking for new servers at our existing buildings, so that meant we were in the market for 40 to 45 servers,” Gagliano said. Our clinics have varied and different missions, so demand for security services are different" “Our clinics have varied and different missions, so demand for security services are different. When we sought customized solutions, we found exactly what we needed.” PowerPlus is a two-unit NVR rack mount used for the installation because SwedishAmerican sought a balance between processing power, storage capacity, and redundancy for high performance in a flexible platform for its existing video surveillance applications. A hospital setting is a 24/7/365 environment, requiring a system that can withstand the rigors of continuous operation. That’s where the enhanced performance of CompleteView 20/20 comes in. Considering performance first and foremost “When we started the process of replacing our servers and NVRs, we considered performance first and foremost,” Gagliano said. “It was mission-critical to have flexibility, and it was important to honor the standard of excellence already offered by SwedishAmerican Hospital.” In recent years, SwedishAmerican has been honored in the medical professional for its commitment to quality, and it has become a gold standard for medical care of any other healthcare system in northern Illinois. The hospital has received a Top 100 Hospital Quality Award, 150 Top Places to Work in Healthcare, and a Distinguished Hospital Award by J.D. Power and Associates, among many other accolades. While there may not be an award or designation for security in the workplace, SwedishAmerican has done its best to ensure that patients are afforded the highest level of safety and security.
Siqura and TKH Security realized a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialized departments, a 32-bed emergency ward, a 3-story rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfill the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Lombardy is one of the regions most affected by the COVID-19 epidemic. Due to the emergency, hospitals remain overcapacity, surgeries postponed, and staff continue to work fatigued because of what they’ve had to sustain over the past few months. In addition to this already critical situation, the Milanese capital suffers from a major blood scarcity. Decrease in blood donation collection In recent months, the Ministry of Health has intervened several times with recommendations to prevent possible interruption or decrease in blood donation collections within the region. This was targeted to improve processes at the donation center in order to aide in the management of blood components and raise awareness of transfusion needs. Many donations made were due to the appeals launched by AVIS Milano. Due to the responses of citizens, even non-periodic donors, who went to the Lambrate headquarters in recent weeks was of generous help. Donors' security The donation candidate with a potentially higher temperature is then escorted to another location To ensure donors’ security and to avoid crowding in the waiting rooms, regulating access and managing the flow became extremely important. AVIS Milano has immediately taken necessary measures. Thanks to MOBOTIX’s donation and the completely free installation by Bergamo-based company, Ideologica, the association is now able to provide a high level of protection before a potential donor is accepted. A MOBOTIX Thermal TR imaging camera has been installed in the room where donors are processed and wait for access to donor acceptance protocols. Radiometric thermal sensor The camera, which is equipped with a radiometric thermal sensor, is able to detect variations in temperature of those present in the access room. It was integrated into AVIS Milano’s existing system by Ideologica in just one afternoon, and was programmed to detect any temperature rise above 37.5 degrees Celsius (as required by law to allow the donation), with an accuracy level of 0.3 degree. We were able to identify the person potentially at risk of COVID-19 through the temperature symptom" If a donation candidate displays any change from this value, an immediate auditory alarm is triggered. The donation candidate with a potentially higher temperature is then escorted to another location and informed of the reasons for their donation refusal and is encouraged to visit his or her attending physician for further investigation. Medical staff immediately receives a report In respect of privacy, the system has not been set up to be viewed remotely with a video image on any external PC. The medical staff immediately receives a report that a person with a temperature above 37.5 degrees centigrade has appeared in the entrance hall. "Thanks to the contribution of MOBOTIX technology, we were able to identify the person potentially at risk of COVID-19 through the temperature symptom from the moment of entry, avoid contact with other donors present and advise the individual on an immediate follow-up with their doctor," commented Sergio Casartelli, General Manager of AVIS Milan. Facilitate solutions with MOBOTIX Technology "Technology should always be seen as positive improvement in any application regardless of how it is used, either to facilitate or to provide a final solution. We as MOBOTIX are committed to promoting and providing through our solutions and our partners as many benefits and opportunities as possible.” “We are extremely proud and humbled that we could collaborate with AVIS and that our technology could support the work AVIS has done to ensure availability of blood in Milan.” “This is one of the most important actions any organization could have taken to provide support at this critical time," concluded Phillip Antoniou, Vice President Sales Europe South / West & MEAPAC.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)