Hospital security
Matrix SARVAM UCS is an enterprise-grade (SME and ENT) unified communication solution that offers collaboration, communication, messaging, and mobility. It brings diverse users from multiple locations to a common platform for real-time collaboration and communication. Improving agility and productivity It unifies all the communication networks and devices to provide users the flexibility of accessing the calls, messaging, and voicemails from any of the devices irrespective of their location....
Global security manufacturer, Gallagher Security has added another manufacturing accolade to its list, taking home the award for Security Manufacturer of the Year at the 2024 Fire & Security Matters Awards held in Coventry. Manufacturer of the Year The Manufacturer of the Year award recognises a manufacturer of security systems that have gone above and beyond in its commitment to innovation and/or its systems meet the highest standards. This recent award win follows a string o...
Automation Anywhere, a pioneer in AI-powered automation, expanded its collaboration with Microsoft through the integration of Microsoft Azure OpenAI Service within Automation Anywhere's new AI + Automation Enterprise System, to help enterprises automate complex end-to-end processes across enterprise applications using AI Agents. This announcement expands the existing integration of Automation Anywhere's enterprise automation platform with Azure AI Document Intelligence. AI Studio solution Aut...
More than ever in 2024, attackers are crossing siloes to find entry points across the full spectrum of devices, operating systems, and embedded firmware, forming the basis for the report, The Riskiest Connected Devices in 2024. Forescout Technologies, Inc., a global cybersecurity pioneer, delivers this fourth annual review of data sourced from nearly 19 million devices through its research arm, Vedere Labs, an international team dedicated to uncovering vulnerabilities and threats to critical in...
Morse Watchmans, the industry pioneer in key control and asset management systems, is proud to be showcasing its line of key control and asset management solutions at Expo Seguridad Mexico 2024, April 16-18 at the Centro Citibanamex, Mexico City. Morse Watchman’s new Emergency Key Grab (EKG) EKG will be on display alongside additional key control and asset management solutions at stand # 1837. New and award-winning products “Following a successful showing at ISC West,...
An upcoming seminar for security professionals, hosted by Synectics on 14 May 2024 in London, aims to help public space operators make the right decisions regarding AI surveillance technology. AI-driven video surveillance ‘Navigating the Future: AI in Public Space Security’ is free to attend and will discuss how AI-driven video surveillance analytics can be used, proactively and forensically to protect members of the public. It is aimed at anyone responsible for security in a publ...
News
Morse Watchmans, the industry pioneer in key control and asset management systems, adds emergency management to its long list of core competencies with the presentation of its Emergency Key Grab (EKG) Kit at ISC West, April 10-12 2024 at the Venetian Expo in Las Vegas. The EKG Kit, designed to facilitate swift emergency response in the event of a facility lockdown, will be on display at booth #11109 alongside a range of the company’s pioneering key control and asset management solutions. Crisis preparedness solution “In a crisis scenario, time is of the essence as every second first responders waste locked out of a building is a second lost that could have been spent saving lives,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “That’s why we created the EKG Kit, to provide facilities of all types with a comprehensive solution for improved crisis preparedness and emergency management.” KeyWatcher Touch System Using a unique PIN code or other provided credentials, emergency personnel can swiftly retrieve the required keys At the heart of the EKG Kit is a one-module or greater KeyWatcher Touch System. The KeyWatcher Touch stores facility keys in an electronic cabinet, only to be accessed by those with the proper permissions (i.e., facility managers and first responders). Using a unique PIN code or other provided credentials, emergency personnel can swiftly retrieve the required keys, such as those for locked rooms or secured areas, enabling them to promptly enter and address the situation. Fast, protected access In addition to the KeyWatcher Touch, the EKG Kit also includes additional materials and support required to provide first responders with fast, protected access to facility keys in the event of an active shooter, natural disaster, or other emergency. With every complete EKG deployment, facilities benefit from both a controlled, known location for master keys as well as the implementation of a complete key control policy developed with the help of Morse Watchmans experts. This significantly improves response times and effectiveness during critical incidents and gives stakeholders peace of mind, knowing that the space they are occupying is equipped with robust security measures to handle emergencies efficiently. EKG kit applications EKG Kit is ideal for any facility where lockdown procedures are enacted during critical events The EKG Kit is ideal for any facility where lockdown procedures are enacted during critical events. This includes schools, hospitals, airports, public venues, government buildings, critical infrastructure sites, data centres, and more. Additional solutions on display Additional solutions on display at ISC West 2024 from Morse Watchmans include: SmartKey® electronic locker systems, are the ideal solution for securing, tracking, and controlling access to larger objects. Set up SmartKey Locker systems as a personal metal locker storage space for one or multiple users. SmartKey metal locker cabinets are engineered for complete interactivity with other business systems such as access control. KeyBank® Touch key access control system, a secure way to manage large quantities of keys with touchscreen convenience. The bright 7″ touchscreen key organiser system gives users an easier-to-use interface for the management and control of up to 18,000 keys and 10,000 users per site. These solutions, coupled with Morse Watchmans’ industry-pioneering software, service, and support, ensure the safety and security of a variety of physical assets.
An expanded range of edge AI cameras and a new, highly robust 2MP video intercom will be showcased by IDIS at The Security Event (Birmingham NEC, 30 April – 2 May, stand 5/N80), a range that is part of IDIS’s end-to-end solutions offering which encompasses everything needed for the widest range of video surveillance projects, from cameras, NVRS, AI box devices, and network accessories, to a choice of VMS. IDIS, South Korea’s largest in-country manufacturer of video tech, will lead the field at TSE 2024, demonstrating how it’s easier than ever for customers to benefit from industry-best deep learning video analytics, with applications spanning commercial premises, public spaces, and perimetres. NDAA-compliant CCTVs Plug-and-play and NDAA-compliant IDIS edge AI range will reduce the nuisance of false alarms IDIS has expanded its business in 2023, supporting its integration partners in a wider range of projects, from NDAA-compliant public area CCTV monitoring and video systems for the NHS to powerful but affordable solutions for the education sector, hospitality, casinos, retailers, and small to medium commercial businesses. Highly accurate, plug-and-play, and NDAA-compliant IDIS edge AI range will reduce the nuisance of false alarms, improve the responsiveness of security teams, and support greater efficiency with faster forensic search and investigation thanks to metadata. IDIS Deep Learning Engine Equipped with the up to 98% accurate IDIS Deep Learning Engine on the edge, the nine new models including 2MP, 4MP, and 5MP bullets, domes and turrets, and PTZs deliver accurate and dependable detection and auto-tracking of suspicious individuals and vehicles enabling a rapid response to alerts for intrusion, line cross, and loitering events. The new models feature NIR Lightmaster technology for evidential image capture in the dark, true WDR, H.265, and IDIS Intelligent Codec offering significant storage and bandwidth savings. Video intercom DC-I6212WRX can withstand extreme temperatures and harsh environmental conditions Meanwhile, IDIS’s new 2MP outdoor-ready video intercom (DC-I6212WRX) is the first NEMA 4X, IK10, and IP66-rated product of its kind offered by any video surveillance vendor. Housed in the toughened casing with two colour options and a choice of flush and surface mount options, the DC-I6212WRX can withstand extreme temperatures and harsh environmental conditions such as heavy rain, dust, and pollution. It gives systems integrators an affordable yet powerful new access control device and their customers a host of performance benefits, including advanced user functions from the cost- and licence-free VMS, IDIS Centre, and unmatched durability. High-performance and robust video solutions “IDIS will once again be taking the lead, showcasing high-performance and robust video solutions at The Security Event in Birmingham,” says James Min, Managing Director, IDIS Europe. “Our team is looking forward to meeting systems integrators and end-users and showing how the latest innovations. These include a choice of AI analytics options to meet project requirements of any size, scope, and scale that strengthen security, enhance safety, and deliver business intelligence in retail and hospitality settings while delivering increased operational efficiency to any surveillance solution.”
The UK’s carers should be cautious of using unregulated AI bots, according to researchers from Oxford University. Study findings A pilot study by academics at the University of Oxford found some care providers had been using generative AI chatbots such as ChatGPT and Bard to create care plans for people receiving care. That presents a potential risk to patient confidentiality, according to Dr. Caroline Green, an early career research fellow at the Institute for Ethics in AI at Oxford, who surveyed care organisations for the study. Substandard AI-generated care plan She said carers might act on faulty or biased information and inadvertently cause harm Speaking to The Guardian, Dr. Caroline Green said, “If you put any type of personal data into (a generative AI chatbot), that data is used to train the language model. That personal data could be generated and revealed to somebody else.” She said carers might act on faulty or biased information and inadvertently cause harm, and an AI-generated care plan might be substandard. Revisit care plans But there were also potential benefits to AI, Dr. Caroline Green adds, “It could help with this administrative heavy work and allow people to revisit care plans more often. At the moment, I wouldn’t encourage anyone to do that, but there are organisations working on creating apps and websites to do exactly that.” Resisting mass AI adoption Cybersecurity expert, Oseloka Obiora, CTO, RiverSafe said, “Health professionals must resist the temptation to embrace mass AI adoption without proper protocols and cyber protection in place." Oseloka Obiora adds, "Tight budgets and heavy workloads are no excuse for allowing unchecked technology to run riot, triggering potential breaches of privacy, personal data, and inaccurate outcomes for patients.” Using generative AI responsibly Green, who convened the meeting, said they intended to create a good practice guide within six months While people who work in creative industries are worried about the possibility of being replaced by AI, in social care there are about 1.6 million workers and 152,000 vacancies, with 5.7 million unpaid carers looking after relatives, friends, or neighbours. In February 2024, 30 social care organisations, including the National Care Association, Skills for Care, Adass, and Scottish Care met at Reuben College to discuss how to use generative AI responsibly. Green, who convened the meeting, said they intended to create a good practice guide within six months and hoped to work with the CQC and the Department for Health and Social Care. AI in healthcare Stuart Munton, Chief for Group Delivery at AND Digital said, “With frontline staff under pressure, the case for adopting AI in the healthcare sector is compelling, but this research is another reminder of the risks associated with unchecked technology being allowed to make recommendations for patients." Stuart Munton adds, "The truth is that on balance AI will bring huge benefits to health professionals in the long term, but this demand needs to be juggled alongside mitigating error, cyber risks, and privacy concerns.”
HID, the worldwide renowned company in trusted identity solutions has announced a collaborative self-service patient engagement and facial recognition offering designed to enhance healthcare operations and administer an improved patient service at every touchpoint. The technology triad involves: HID: The major company in biometric technology across various use cases and vertical markets CERTIFY Health: A provider of modernised solutions to optimise patient care and experiences CTS: A premium manufacturer of kiosks for the healthcare industry Advanced, secure self-service experience HID embeds its U.ARE.U™ Camera Identification System featuring highly accurate facial recognition capabilities This advanced, secure self-service experience will be spotlighted at the HIMSS 2024 Global Health Conference and Exhibition, March 11-15, 2024 in Orlando – Booth #863. What: HID embeds its U.ARE.U™ Camera Identification System featuring highly accurate facial recognition capabilities with CERTIFY Care software running on CTS patient check-in kiosks. This state-of-the-art patient engagement platform is currently in use across major healthcare organisations. Key functionalities include patient onboarding, biometric authentication, patient communications, digital forms, appointment scheduling and management, and payment collection. Biometric-based patient verification is fast and accurate Why: Biometric-based patient verification is fast, accurate and easy to use. When biometric verification is administered within healthcare environments, there’s a significant boost to the well-being of patients and practices. Overall engagement is elevated on both sides of the reception desk with: Convenient self-service for patients: Intuitive, simple solutions empower users with fast, convenient identification and decreased wait times. Positive patient identification: Authenticate and verify patient identity before treatments to improve patient care and safety. Accurate medical records management and de-duplication: Drive efficiencies by tying one-face to one-record to avoid multiple patient files due to human error, changes in name/address/email, etc. Medical fraud prevention and investigation: Deliver irrefutable proof of presence when it comes to patient identification and verified eligibility of care. Touchless, hygienic authentication: Propel patient safety with high-performing facial recognition that’s swift, seamless and straightforward for patients and practitioners. HID’s U.ARE.U Camera Identification System How: HID’s U.ARE.U Camera Identification System fuses AI with multispectral imaging (MSI) technology and modern machine-learning algorithms to accurately identify and authenticate individuals. HID’s U.ARE.U Camera Identification System delivers a secure, frictionless patient experience Combined with CERTIFY Health’s platform and CTS’ customisable self-service kiosk, the HID’s U.ARE.U Camera Identification System delivers a secure, frictionless patient experience, while offloading the burden on administrative staff and shortening patient wait times. Additional points of excellence afforded by integrating the HID U.ARE.U Camera Identification System into major software platforms and self-service kiosks include: Top NIST ranking for face-matching performance and accuracy Ethically trained and built AI to reduce matching bias Advanced ‘in-the-wild’ recognition (precise capture and authentication regardless of variances in lighting, backgrounds, pose, expression, etc.) Robust presentation attack detection against spoofs (PAD detects spoof attempts using 3D masks, high-quality photos or digital images to trick the system) On-device (edge) biometric processing (reduces bandwidth constraints, improves performance, and enhances security and privacy) Flexible, customisable and cost-efficient patient engagement upgrade When: This progressive patient-centric offering will be on display at HIMSS 2024, March 11-15, 2024, from the CERTIFY Health Booth #863. Join their industry and technology experts in the booth for Happy Hour from 4 pm – 6 pm on March 14, 2024.
The Matrix Multi-Location Solution caters to the contemporary needs of businesses, providing the adaptability to unify dispersed offices within a singular network. This solution presents optimal and practical choices for inter-office communication and long-distance calls. Using our highly scalable and advanced Unified Communication platforms like ETERNITY GENX, ETERNITY MENX, and ETERNITY LENX, connect multiple and distantly located offices, seamlessly. Virtual network The various branches establish connections through branch office communication systems utilising peer-to-peer connectivity, creating a virtual network that interlinks all systems. This network enables streamlined, one-touch calling accessibility for users, facilitating calls to colleagues regardless of their location, as well as on the move. Cost-efficient communication Matrix has catered to industrial verticals like Hospitality, BFSI, Education, Manufacturing, etc. This setup contributes to sustaining business operations seamlessly, offering a readily available contact list of all users and cost-efficient communication via a secured VOIP network. Matrix has catered to industrial verticals like Hospitality, BFSI, Education, Manufacturing, etc. focussing on location solutions to unify their geographically dispersed offices. Key benefits Workforce collaboration across different geographic locations. Centralised management by streamlining communication through the Unified Communication Platform. Maintain business continuity by centralising communication tools and integrating redundancy measures. Investment optimisation in long-distance communications. Optimise Capital and Operational expenses by consolidating communication infrastructure.
Zenitel, the renowned provider of critical communication solutions, proudly launches unified critical communication solutions for healthcare customers. Hospitals and healthcare facilities must manage stressful situations from a high number of emergency services, staff, patients, and visitors. In addition, staff shortage and burnout have put immense strain on hospital operations. Zenitel’s healthcare solutions Ensuring a safe environment for patients, staff, and visitors is a key priority for every healthcare facility. Security teams must remain informed to mitigate risks and to ensure that all essential operations remain functional. Medical staff requires the right tools to deliver patient care effectively while ensuring a safe and secure environment. Zenitel is engaged to giving unified critical contact solutions that empower medical security teams Zenitel’s healthcare communication solutions are designed to assist healthcare facility owners by automating daily tasks which reduces demand on healthcare workers. With more than 120 years of audio experience, Zenitel is committed to delivering unified critical communication solutions that empower medical security teams and contribute to the overall safety and well-being of patients and staff. Zenitel’s critical communication solutions With integration into other security platforms, like video management, surveillance, access control and building management system, Zenitel’s unified critical communication solutions, including the Turbine Extended Intercom, IP Operating Room (OR) Master Station, IP Network Ceiling Speaker, Turbine Extended Intercom with Card Reader, and more, offer better situational awareness within hospitals and allow hospital teams to act on what they see and hear. “By incorporating audio into the security mix, healthcare facilities can add value to video-based security system and transform from being reactive to proactive for any security threats within hospital facilities,” says Sri Sutharsan, Head of Marketing and Segment Solutions, Safety and Security, Zenitel.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Milestone Systems wants to double its revenue in the next five years while also setting a new standard of how technology companies behave, spotlighting more responsible use of technology. In short, the open platform video management system (VMS) company seeks to revolutionise the industry, deploying data-driven video software in security and beyond. Milestone is also shifting the approach from tech-centric to emphasising business outcomes; that is, focusing on solving problems that keep their customers up at night. Integration partner program “Technology companies have a bad habit of falling in love with their own products,” says Thomas Jensen, Milestone CEO. “But if we cannot convey to customers what the products will do for them, then shame on us. We want to focus on business outcomes as the way we address our customers, drive business, and add value to companies. We want to focus on outcomes rather than the functions products perform.” We want to focus on business outcomes as the way we address our customers" At the MIPS 2022 Partner Summit in Minneapolis, Milestone outlined for their integrator and technology ‘partners’ the path to achieving these lofty goals. The vision includes revamping the integration partner program to eliminate two-thirds of their dealer count, with the remaining third more focused on Milestone and equipped with new marketing tools to succeed at even higher levels. Market development personnel MIPS (Milestone Integration Platform Symposium) is a combination education seminar, pep rally and mini-trade show. The yearly event continued virtually during the pandemic and is back in 2022 as a fully in-person experience — first in Dubai and then in Minneapolis for the Americas market. Milestone is also dramatically increasing its head count as an investment in the future, emphasising a ‘people-first’ mindset that sets the company apart, says Jensen. In the Americas market, Milestone has increased the size of the organisation by 75% in the last year. They have increased sales personnel 100% during that time, upped pre-sale technical personnel by 150%, and increased market development personnel by 200%. Cloud-based setups The future of data-driven video technology will include a mixture of on-premise systems, cloud-based setups, and a combination of the two (hybrid) Milestone intends to spend more money on marketing to reflect the evolving ‘buying journey’ of business-to-business customers, who often do more online research before reaching out to vendors. The new Milestone vision also requires a heightened focus on vertical markets, including applications beyond traditional security use cases. It also embraces cloud systems for small- to medium-sized businesses. The future of data-driven video technology will include a mixture of on-premise systems, cloud-based setups, and a combination of the two (hybrid). To expand their cloud offerings, Milestone announced the introduction of Kite, a Milestone-branded version of the cloud system developed by Arcules, a Canon sister company built on the Google cloud. The ‘pure cloud’ system, targeting small- to medium-sized businesses, will be offered in addition to a previously announced version of XProtect hosted by AWS (Amazon Web Services). The new Milestone vision also requires a heightened focus on vertical markets Safe cities applications Examples of applications ‘beyond security’ include use of video technology in safe cities applications to learn traffic patterns, adjust traffic flow, etc. In 2023, Milestone will launch XProtect Hospital Assist, targeting the healthcare vertical with applications beyond hospital security. For example, the system will address the shortage of nurses using video systems that can help to monitor patients remotely and detect falls. Blurring technology, applied per camera and in real time from a smart camera interface, will be used with video to protect patient privacy. Industry-based solutions “Each industry has different use cases, especially beyond security,” says Anders Bo Rasmussen, Director Product Direction at Milestone. “The demand is also increasing, which makes it difficult for a generic product to succeed. We are investing in finding more industry-specific use cases and transitioning to industry-based solutions. We must understand the language and the need to create intimacy that will eventually give us the business. We can be more competitive, more focused, and stand out more.” Another new vertical market product will address the hospitality industry, including gaming Another new vertical market product will address the hospitality industry, including gaming. Among other capabilities, the system can use video and facial recognition to recognise compulsive gamblers. Supporting casinos to meet legal requirements, the system will create value beyond video and beyond safety and security. Promoting human rights For one customer, a Milestone system ties together connected video and sensors on a cruise ship to respond to silent alarms without alerting guests that there is a problem. Another example involves using video in remote therapy sessions with children on the autism spectrum. Expanding in markets beyond security depends on Milestone being able to map the right stakeholders and broaden the appeal to other departments in a company. Security will continue to be the ‘gateway’ to additional business, at least in the near term. Security will continue to be the ‘gateway’ to additional business, at least in the near term Related to the responsible use of technology, Milestone subscribes to the United Nations Guiding Principles on Business and Human Rights, embracing emerging awareness of the responsibilities of business to promote human rights around the world. In practice, the commitment guides Milestone to avoid unconscious bias in products and recruitment and to perform due diligence when approving projects to ensure they do not impact human rights. Acceptable standards of surveillance Milestone has also taken a deliberate stand not to do business with companies that violate human rights. Another concern is responsible use of data. “Here is a warning for our industry: The Wild West is over,” says Jensen. “It’s our responsibility to use data in a responsible way. Now is the time to act to protect our current and future generations.” Responsible technology also extends to uses of artificial intelligence (AI), ensuring that a human directs system intent and complying with acceptable standards of surveillance throughout the world.
Case studies
Country Court, a respected care home provider in London, has recently completed the opening of its latest and flagship care home, Camberwell Lodge, in collaboration with Jacksons Fencing. Nestled in the heart of Southwark, London, this partnership represents a significant milestone in combining state-of-the-art security measures with sophisticated living spaces within the care sector. A sanctuary of security and style As the newest jewel in Country Court’s crown, Camberwell Lodge expands the organisation's impressive portfolio, now counting over 35 residential care and nursing homes across the UK. The facility, embodying Country Court’s ethos ‘our family, caring for yours,’ is not just a care home but a beacon of community and warmth, accommodating up to 98 residents. It offers a diverse range of services including nursing, residential, respite, and specialised dementia care. Raising the standard of safety Central to ensuring the security and safety of residents and the aesthetic appeal of Camberwell Lodge is Jacksons Fencing’s installation of 154 metres of Barbican Imperial vertical bar railings. These railings, standing proudly at 1.8 metres high, blend robust security with sleek design, demonstrating that safety and style can go hand in hand. 25-year guarantee The railings are hot dip galvanised and polyester powder-coated black, ensuring long-lasting durability and a finish that complements the lodge’s contemporary architecture. Each railing comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and trust. Elegance at the Entry Further enhancing Camberwell Lodge’s secure yet elegant ambiance, Jacksons Fencing also installed an automated, 3-metre-wide sliding gate adorned with a matching Barbican Imperial infill. This gate serves as a secure yet inviting and accessible entrance and parking area for staff, residents, and visitors, embodying the blend of robust security and aesthetic appeal. Its vertical bar design, employing a welded pale-through-rail construction, not only deters climbing and vandalism but also adds a touch of sophistication to the facility’s overall appearance. Coexistence of security and elegance Reflecting on this successful project, Peter Jackson, Managing Director at Jacksons Fencing, expressed, “We are immensely proud to have partnered with Country Court in the development of Camberwell Lodge, a project that not only enhances their remarkable portfolio, but also stands as a beacon of how security and elegance can coexist harmoniously to benefit the care sector." He adds, "A care home is more than just a facility; it’s a community space that needs to feel safe, welcoming, and comfortable, and we’re delighted to have played a role in bringing this vision to life and blending robust security with sleek design.”
Overview: Due to the pandemic and Delta cases in Israel, the first hospital in Israel for treating coronavirus patients was established. The hospital needed to offer more beds and create more special wards for the infected patients. The head of the hospital requested for an advanced system that could monitor patients on-site or remotely to protect the doctors and nurses from cross-infection in the hospital. Non-contact communication Challenges: Lack of devices for contactless communication: The hospital did not have enough equipment to realise non-contact communication between staff and patients, which could have increased the risk of cross infection. Insufficient remote surveillance: The hospital needed to build larger wards for infected patients, which a 24/7 monitoring system must cover. Installing the right cameras for such a large space could be very challenging. Video intercom solution Highlights: Video intercom solution: The patient’s bed is equipped with Dahua's VTO. Once an emergency occurs, the patient can directly call the VTS management device at the nurse’s station through the VTO. At the same time, through the real-time preview function of VTO, the staff in the nurse station can remotely monitor the patient's condition and communicate with the patient in real-time to provide necessary care. Monitoring & management system: Through Dahua's DSS management platform, the entire CCTV monitoring system and video intercom system in the hospital can be unified and managed. For the hospital managers, it not only improves the efficiency of monitoring and management, but also provides additional security for hospital workers to a great extent! Professional CCTV devices Significance: Dahua provided the hospital with video intercom products and Dahua professional CCTV devices that greatly helped them prevent direct contact with patients to reduce cross-infection inside their premises. With the help of Dahua’s solution, the hospital was able to centralise all their surveillance systems for easy management.
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. Challenges The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," said Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. He adds, "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. Larry Kadin adds, “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at.”
A local neighbourhood hospital, unfortunately, plagued by significant gang violence, recognised the inadequacy of its current security system. Committed to serving the community, the hospital staff also sought protection from potential aggression that patients may bring in, their friends or family members. Upgrading surveillance With territorial disputes, robberies, carjackings, and displays of force occurring daily, the hospital urgently needed to upgrade its surveillance and enhance its alert/notification process to safeguard both patients and visitors. The possibility of a visitor instigating a dispute within the hospital's premises is of particular concern. Hospital's challenges Given the occurrence of visitors illegally carrying firearms, it was crucial to have better oversight The Director of Security recognised the need to update the existing surveillance systems for improved detection capabilities, particularly in camera analytics. The goal was to enhance the monitoring of individuals entering the hospital premises around the clock. Given the occurrence of visitors illegally carrying firearms, it was crucial to have better oversight when a concealed weapon became visible, especially in common areas, external parking lots, and garages, as well as the emergency room. Need to update detection “You might ask yourself, who would want to have a gunfight in a hospital? We are where people heal,” said the Director of Security. After an active shooter incident occurred in which a gun was produced to threaten a patient, the security team quickly realised there was no way to keep the staff out of harm’s way unless his security team could quickly minimise or mitigate the problem. Solution By layering in the AI app, they would have access to important data on firearms entering the facility Since the hospital was already a Konica Minolta customer, during a review meeting the Video Solution Services Executive (VSSE) took the opportunity to introduce the REACT platform and its suite of modules, specifically Visible Weapon Detection (VWD). This artificial intelligence (AI)-driven detection solution would enable the hospital to use its existing cameras and video management system (VMS). By layering in the AI app, they would have access to important data on firearms entering the facility. The software would also integrate with facility alarms and door lock-downs. Visible Weapon Detection (VWD) Additionally, the hospital determined that entry points were not the only places they should utilise VWD, there were also some key floors where they previously experienced some scares with violent behavior and gun threats. “We see a lot of gunshot wounds in the ER, and sometimes the altercations are not finished in the street with aggression continuing in our hospital," Director of Security. Real-time alerts via Cloud VMS VSSE recommended additional cameras for the perimeter and parking lots to ensure there were no security gaps "While we cannot stop an armed person without law enforcement, we can better notify staff and enable them to take shelter versus walking right into a situation,” Director of Security. The VSSE also recommended additional cameras for the perimeter and parking lots to ensure there were no security gaps. The Director of Security wanted alerts on mobile devices so the team suggested a Cloud VMS to enable the alerts on any type of device. Outcome The hospital adopted the proposed program with the REACT-VWD, Cloud VMS, and additional cameras. Through one of their regular hospital security drills, the Director of Security could more easily locate the armed unauthorised visitor and implement a quick action protocol for the facility. Detection capabilities and automated notifications The hospital purchased 20 MOVE micro dome cameras and 10 PTZ MOVE cameras “With these upgrades, our security platform is better equipped to address possible active shooters. Our staff knows we cannot put cameras in every patient room, but these new cameras and the VWD software will give us more detection capabilities to at the very least provide notifications,” Director of Security. The hospital purchased 20 MOVE micro dome cameras and 10 PTZ MOVE cameras. The Director of Security felt confident his security team was equipped with better capabilities and automated notifications for events that occur. REACT, visible weapon detection This solution applies nationwide to organisations that want better oversight of their facilities, are interested in REACT, visible weapon detection, utilisation detection apps, and have clear, high-resolution video documentation for insurance or legal purposes. The story is simple, Konica Minolta can help to provide security via its Mobotix cameras, its camera apps, and REACT offerings.
Christ’s Hospital School has a long history. It first opened its doors to 380 pupils in November 1552, at that time located in Newgate Street, London. In 2022 the school needed to replace their obsolete security system with a new solution that would be simple to manage while maintaining the security of the site, staff, and pupils. Requirements The school has around 900 students, over 95% of which board. With 18 boarding houses on site, all requiring different access permissions, as well as the school buildings, dining hall, and other common areas. The school’s new security system needed to be able to manage a huge number of doors and users, while still providing a simple, user-friendly experience. Net2 Net2 is Paxton’s flagship, networked access control solution, designed to make the management of any site James Brookes, Operations Manager at Vistec, said, “I’ve been working with Paxton systems for over 12 years, and as soon as I heard the requirements for Christ’s Hospital, I knew that Net2 would be the right solution.” Net2 is Paxton’s flagship, networked access control solution, designed to make the management of any site straightforward. Features and benefits Easy to use and with a range of features, it moves beyond the basics of controlling the flow of people around a building, offering benefits such as building control and system integration. The Net2 system is easily scalable, making it perfectly suited to the school’s needs. Easy installation James Brookes continues, “There were a few challenges to contend with for this installation, including the need to use existing cabling, limited space for hardware storage, and most difficult time!" He adds, "We needed to install over 280 readers and all of the supporting Net2 plus access control units in only six weeks while the students were on their summer holidays. Thanks to the ease of the Net2 system to install, and the occasional help from Paxton’s Technical Support team, we were able to deliver!” Solution I knew Net2 would be a great choice to manage a site of this size, and this time we got to install the Net2 Marine Readers" David, who is responsible for the security decisions made at the school, has experience with Net2 from a previous job and was pleased with the proposal to use it again at Christ’s Hospital. He said, “I knew Net2 would be a great choice to manage a site of this size, and this time we got to install the Net2 Marine Readers. I’d seen them installed when collecting my wife from work, and I just thought I had to have them. They’re visually appealing, but also provide a clear, lit indication of where the door is, and whether access has been granted or denied. I can’t speak more highly of them.” Read-in/read-out access Christ’s Hospital’s new security system provides simple read-in/read-out access on all doors, helping to maintain the security of the site and its staff and students. As every user needs to present their access token to get in and out of a building, the Net2 software can provide exhaustive reporting on how many people are on-site, in any given building, and even pinpoint the location of specific users in an emergency. The school also has an ingenious alert system to ensure the students’ safety; the security team will get a notification if students leave their dorms outside of hours. Keypad readers After a set time, should a student present their Net2 token to a reader to exit the building, an alert will be flagged in the system and the security team will know who is trying to leave the site (and from which building they’ll be trying to exit). To further support the school’s unique requirements, several keypad readers have also been installed on the external doors of relevant buildings, to allow access and egress to temporary students who board over the Easter and Summer holidays. PINs The use of PINs instead of physical tokens in this instance saves time, admin, and money Students will be issued PINs instead of tokens, which may otherwise be lost or not returned. The use of PINs instead of physical tokens in this instance saves time, admin, and money for the school when the students depart at the end of their term. Net2 plus 1 door controller James from Vistec adds, “To overcome the challenge of the limited space, we used the Net2 plus 1 door controller in the PCB-only format and installed a number of them in a single Haydon PSU cabinet to minimise the amount of wall space required for the installation. This is another reason why Net2 was the best option for this site; its flexibility allows us to make it work to our advantage.” Result The Net2 system has been in use since September 2022. All staff, students, and system administrators are pleased with how easy Net2 access control is to use and have fully gotten to grips with all the features. There are plans to further extend the already vast system to secure all of the internal doors on the higher floors of the boarding houses.
Traka’s intelligent key management system has been installed at Kingston Hospital NHS Foundation Trust, to achieve its objectives for more efficient security processes to benefit staff on a 24/7 basis. Kingston Hospital Kingston Hospital NHS Foundation Trust cares for more than half a million patients a year, from across Kingston, Richmond, Elmbridge (Surrey), Merton, Wandsworth, and Sutton. In its most recent Care Quality Commission (CQC) review, it was rated as “Outstanding” for overall quality and leadership. And continues a shared objective, to deliver care that connects organisations, within systems and partnerships. Need for an automated management solution To enable success, key management from the main reception area was highlighted as an issue To enable success, key management from the main reception area was highlighted as an issue impacting time and resources, where there was too great a reliance on manual processes including recording key locations on paper. This was a particular problem out of hours. A more automated management solution was required, to provide security managers with instant accountability amongst staff who had keys in their possession, enabling the smooth running of the hospital and the continuation of excellent patient care across all its facilities. Key management challenge Says Liam Topham, Security Manager at Kingston Hospital NHS Foundation Trust, “Hospitals such as Kingston present a complex security challenge. With 48 different buildings covering a large site, and many keys in operation, it was becoming a challenge for our already busy reception area to manage and ensure their safe return, especially at staff handovers." Smarter solution Liam Topham adds, “We needed a smarter solution, but one that was simple to operate and quick to respond, with no disruption to the hospital running. Traka presented standalone resources designed to meet the specific needs of the hospital with excellent technical support." He continues, "The added security benefit is the audit control with alerts sent to our security teams if keys haven’t been returned. The cabinet has been well received and staff are especially happy with the time being saved.” Traka’s intelligent key cabinet Kingston Hospital has installed Traka’s intelligent key cabinet, with accommodation for 50 keys Kingston Hospital has installed Traka’s intelligent key cabinet, with accommodation for 50 keys to operate across the hospital. With specialist software allowing for central management control, a full audit trail is available of all key transactions. This has already saved the reception area time and resources allocated to key management, allowing more focus on patient experience. Minimising risks Ben Farrar, Traka Market Development Manager, stated, “From a patient’s point of view, hospitals are an open facility, where healthcare is provided and family and friends can provide support to those recovering. Behind the scenes, for staff, patients, and visitors, security measures need to be put into place to maintain this atmosphere and minimise any risk of time delays to patient care." Enhanced key management Ben Farrar adds, “Within Kingston’s security portfolio, the adaptability of the Traka technology allowed us to work with the Security team to supply a bespoke solution. Not only can the systems look to enhance key management across the site, but also improve communications, operations, and workflow." He continues, "The audit trail capability adds to better management of keys, and this all combines to operate 24/7/365 for the ongoing benefit and security of all staff, patients, and visitors.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
As the new year dawns, it's a good time for the security industry to look ahead to 2024. We asked this week's Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Verkada workplace safety survey](https://www.sourcesecurity.com/img/white-papers/612/920x533_1706174798.png)
Verkada workplace safety survey
Download![Securing care closer to patients](https://www.sourcesecurity.com/img/white-papers/612/920x533_1695745509.png)
Securing care closer to patients
Download![Essential data security strategies for healthcare](https://www.sourcesecurity.com/img/white-papers/612/920x533_1694190098.png)
Essential data security strategies for healthcare
Download![Video technology strategies for hospitals are moving beyond security](https://www.sourcesecurity.com/img/white-papers/612/healthcare-2.jpg)
Video technology strategies for hospitals are moving beyond security
Download![The future of healthcare security is connectivity](https://www.sourcesecurity.com/img/white-papers/612/healthcare-1-920x533.jpg)
The future of healthcare security is connectivity
Download![Creating a secure and positive healthcare experience](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1658397645.jpg)
Creating a secure and positive healthcare experience
Download![Integrated access control: reap the benefits of connected security](https://www.sourcesecurity.com/img/white-papers/612/image.jpg)
Integrated access control: reap the benefits of connected security
Download![Solve access control challenges in the healthcare sector](https://www.sourcesecurity.com/img/white-papers/612/aa-aperio-reference-overview-healthcare-pr-header-920x5332.jpg)
Solve access control challenges in the healthcare sector
Download![The healthy market for video surveillance at medical facilities](https://www.sourcesecurity.com/img/white-papers/612/healthcare-hikvision-surveillance-620.jpg)
The healthy market for video surveillance at medical facilities
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Hospital security: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download