You are at : Search > Articles Search Results

Articles Search Results

1388 Articles and 372 related Products found for access control

Integration is the key to healthcare solution

Integration is the key to healthcare solution

Editor / Provider: Michelle Chu | Updated: 10/20/2014 | Article type: Hot Topics

In the terms of security for healthcare vertical, there are different phases needed to be taken care of. Unauthorized access to the patient's medical record or expensive medications and equipment will not only cost the hospital a great fortune but also jeopardize their reputation. However, it is important to make sure that the visitors, patients, and injured are easy to go around in the hospital.

The multifaceted security challenge that the healthcare organizations are now facing now is to maintain flexible access and safe environment for patients and visitors while increasing protection on confidential data, staffs, equipment, and medications, suggested by Brian Song, Managing Director at IDIS Europe.

However, facing a more competitive market, many hospitals are demanded to upgrade infrastructure and heavily invest in IT systems in keeping accordance with regulations, and even expand into new areas beyond the hospital, according to Josh Phillips, Director of Marketing of Enterprise and Critical Infrastructure at Verint. “All new projects are selecting IP to match extensive investments hospitals are making in IT infrastructure,” Phillips emphasized. “Those with analog are considering migration strategies.”

Regarding to the complex security demands from healthcare sector, asmag.com is going to present some highlights from the industry aspects.

Integration of Key and Facilities Management
The high staff turnover rate in a hospital can lead to unauthorized copies of keys distributed to people. Meanwhile, different security levels are in demand throughout the hospitals – from perimeter security for the surrounded area to personal storage. It is crucial to be able to distinguish individual access authority; in the mean time, making sure that patients and visitors are at their most convenience during their staying in the hospital. Therefore, instead of manual managing procedure, a comprehensive access control system that can effectively assist the manager to cope with urgent incidents is preferable.

“Having a master key system that can be managed centrally allows staff with the necessary authority to access rooms, without having to waste time trying to locate the correct key or find out the correct pass code,” said Tina Hughan, Marketing Director for ASSA ABLOY UK. Furthermore, the systems need to be easy and intuitive for less experienced users to manage.

Nothing can be more troublesome when it comes to physical key management. Imagine how much trouble you will have to go through if a person who possesses the key to the medication cabinet has left the building. “Integrating key management with access control allows businesses to meet their key and asset protection needs by implementing advanced key management and locker systems to provide a total solution for security and facilities management,” mentioned Ross Bale, Business Development Manager in the UK at Nedap.

Meanwhile, better management on the lockers can also reduce the physical lockers and space needed. “By seamlessly integrating electronic locker management into the access control platform, it ensures that the maximum numbers of lockers are available for staff to use,” Bale continued.

IP System and Video Analytics is Dominating
Hospital is one of the sectors that require high efficiency the most. When it comes to bring out the utmost efficiency, IP system is definitely the most convenient option. “In today's market, a majority of healthcare facilities seek out IP-based surveillance solutions. These technologies offer far more functionalities and return-on-investment than their analog counterparts,” stated Jack Meltzer, Senior Director of Global A&E Program at DVTEL.

Not only CMOS sensor is able to deliver high-resolution images with more details, but the real-time recording can be used for video analysis and integrated with alarms, access control, and other systems, helping end users to take appropriate actions on emergency immediately. For instance, IP surveillance systems can integrate with infant tagging systems at the nursery section in a hospital, providing live monitoring and deterring potential criminal activities, according Meltzer.

“Video management software is suggested to install considering that the recording, live media data, and instant playback can be operated on a single computer or separate computers according to the client's preferences,” said Steve Ma, Executive Vice President at VIVOTEK.

Speaking of surveillance camera deployed by healthcare sector, other than superior low-light performance, a discrete design of the camera is often highlighted due to the demand not only on ensuring patient's privacy and also for blending into surrounded design. “Small form-factors cameras and cameras with WDR function and good low-light performance are suggested since they can be easily blended into the interior design and able to capture clear image quality under challenging lighting conditions,” recommended Ma.

PSIM Has You Fully Covered
Besides adopting surveillance and access control systems that come with added values, integrating all security systems under the same platform is trending in this vertical.

Lacking of prompt response to emergency may cost tens to hundreds of life in a hospital, leading to devastating consequence. In order to shorten response time to incidents, it is essential to have comprehensive preparation for any possible emergent scenarios.

“A PSIM based security management system offers healthcare environments with a wide range of benefits such as increased situational awareness, which enables a Common Operating Picture for all security operatives, as well as correlating intelligence for real time verification of alarms. It also provides improved efficiencies, which can be achieved from a reduction in false alarms, the prioritization of the most appropriate security resources, and better guidance of response teams using both audio and visual intelligence and helps to reduce training requirements,” said James Candy, VP Technical Services, CNL Software. “Sophisticated post incident reporting and dashboards also provide valuable insights helping to improve the overall performance of security personnel, processes and infrastructure.”

What's Coming Up

Home Care Market is Full of Potential
A promising growth on IP surveillance can be expected in the healthcare sector. As the budget remains a main concern for most of the hospital security manager, IP solution, coming with lower cost of ownership, is much more attractive.

Moreover, while the global population continues to grow and it will be even more difficult to provide sufficient rooms for all of the patients, a new healthcare market is rising. “It will become more common for the elderly and sick people to stay at home and receive treatment and support from the comfort of their home environment,” Johan Åkesson, Business Development Director for Retail at Axis Communications. “Within the home care market the use of network video surveillance plays an important role, making it possible for hospital staff to monitor patients in their home, follow up on treatment and take action in case something happens.”

RFID Propels Innovative Applications
“The recent launch of Apple's long-awaited tap-to-pay technology on its new iPhone 6, using NFC (near field communication) based technology, makes the residency of contactless access control on smartphone seem quite tangible and not too far away. The innovative world of gesture technology is also set to make an impact on how individuals will be able to control a variety of RFID devices,” suggested Hughan.

 

Editor's Highlights - Case Studies

SALTO Systems safeguard Antrim Area Hospital in Northern Ireland

Nedap keyless drug storage for Darent Valley hospital

Hospital in India kitted out with VIVOTEK cameras

AXIS helps you keep an eye from home on baby in the hospital




Nedap responds to market demands with software and open standards in security solutions

Nedap responds to market demands with software and open standards in security solutions

Editor / Provider: Nedap | Updated: 10/17/2014 | Article type: Security 50

Nedap responds to new challenges in the field of security with the use of software components in security systems. These challenges arise from changing laws and regulations – such as the Act on Privacy, proposed by the European Commission – and increasing external threats, such as hackers. Under the influence of these changes, Security Managers have to deal with a completely new reality. During Security Essen, Nedap demonstrated how security systems can be directly adjusted to meet new requirements in the field of security by modifying software. Together with other opinion leaders in the industry, Nedap also considered the question of how to respond to new trends. Open standards and new software solutions play a crucial role here.

‘The security world is constantly changing and new laws and regulations can have a major impact on the design of a security system. The number of threats a security system must offer protection against is also constantly increasing. This is difficult with systems that are based on hardware and which are therefore fixed and closed. These systems cannot adapt to the new reality of the Security Manager', says Ruben Wegman, CEO of Nedap. ‘The only way to solve this is with software. Software modifications not only allow you to respond flexibly to current requirements, but also to new security issues in future.'

During Security Essen, Nedap showed that it is possible to respond easily to existing and future requirements by separating hardware and software. For example, by offering anti-passback as a software component, the security system can be adjusted directly to changing rules, without having to adjust hardware. Anti-passback ensures that a person cannot re-enter a building using an access badge unless the badge has first left the building. This prevents the access badge from being lent to other people.

Open standards for more flexibility
The use of open standards can also result in greater flexibility in organisations. For example, SOAA – the open standard for electronic offline locks – provides organisations with greater choice when it comes to offline locks and a more secure system. Until recently, it was hardly possible to combine multiple electronic offline locks from different suppliers into a single access control system. However, this is a requirement for many large European companies, who indicate that they will no longer be investing in these locks until there is some form of standardisation. During Security Essen, companies such as Assa Abloy, Uhlman & Zacher and Nedap showed what this standard means in practice. The open standard allows companies to easily integrate different brands of offline locks, meaning companies can now choose the product that best fits their needs. This provides the company freedom of choice and saves costs, as they are no longer tied to one supplier. The combination of open standards and software-based solutions enables companies to build on their current system, without having to constantly buy completely new systems.

Companies need a partner who can help them make a risk-free investment, and who will act as an advisor and keep them informed about new developments. Effective collaboration between suppliers is also important, partly to avoid integration problems. The integration of the new AXIS A1001 Door Controller with AEOS software is a good example of this.

Thailand picking up the pieces

Thailand picking up the pieces

Editor / Provider: Steve Chin, a&s Asia | Updated: 10/17/2014 | Article type: Hot Topics

At first glance, with its beautiful attractions and large populations of tourists, the Kingdom of Thailand might not seem all that bad or unstable. However, in the last year, political instability and corruption have ransacked the country and slowed economic growth to a halt. With a recent military coup and a new prime minister installed, Thailand looks to stabilize and rebuild its industries. “For the past few years, there have been lots of conflict and fighting. There has been little progress in the country. Right now though, with the military coup happening, the country has cooled down and is more stable. There are now strong indications that the Thai economy will recover,” said Suwich Chitkasemsuk, MD for Digitalcom.

A Glance Back
2013-14 have been two years of economic and political turmoil for Thailand. Stemming from the influence of Thaksin Shinawatra on Thai politics, the majority of the Thai population viewed Thaksin as highly corrupt and damaging to Thailand's democracy and economy. Coupled with the fact that political parties allied to Thaksin have won majorities in every election since 2001, the political hotbox became an issue of fierce debate and turbulence. With the aim of removing Thaksin's influence on politics and the creation of an elected “people's council” to oversee reforms, anti-government protests began in November 2013 calling for the resignation of Yingluck Shinawatra, sister of Thaksin. The protests eventually resulted in the Royal Thai Army declaring martial law throughout the nation, followed by the removal of power from Yingluck, a military coup d'état, and the establishment of a military junta. In recent events, Prayuth Chan-ocha, army chief of Thailand, has now been established as the new interim prime minister.

A BETTER OUTLOOK
Overall, the general consensus regarding the coup seems to be a positive one. Somchai Prajaksoot, MD of Digital Focus explained, “After the coup, the political situation is stable and the economic outlook is better. The security industries have still increased.” There is a definite sense of renewed, if wary, optimism that the new government will reinvigorate economic scenarios as well as the security industry, launching new projects, and creating a better, safer Thailand.

Projects Lead the Way
Key for the Thai security industry lies in government projects. Understandably, they have been few and far between. Feelings across the security market seem to be that one of the most harmful things during the periods of unrest was lack of government projects as well as broken promises. As Johnny Trivitayakhun, MD for Security Communication Center put it, “What was felt, and seriously impacted security companies were government-related projects, where payments were delayed extensively during the periods of unrest.” Pointing once again to the political factors, it's easy to Market Dynamics understand why government projects have been scarce or delayed, as the government's focus has been on quelling unrest and ensuring stability. Further complicating problems, Nuttawaj Chieobangyang, CEO for Coretech, also pointed out that many company projects in the past year have been lost, because the new government evaluates everything to a very fine degree. Every project will be under review, and if the price is too high, an auction will be held, which will shake the whole market. He further added that many companies are not very happy about this.

However, the general belief is that the new government will pursue what the previous governments have left undone. “Since the majority of the spending has to come from the government sector, in order to help drive the economy, I see no reason why there will be any negative impact. On the contrary, I believe that the current government is truly aware of how to best drive the economy, bringing peace and stability to Thailand,” said Trivitakaykhun. The transportation sector, city surveillance, and administration buildings are some government projects to keep an eye out in the future, he added. On the commercial side of things, feelings seem to be somewhat split. Another area of big impact for the security industry is that there seems to be overall more stability. According to Prajaksoot, commercial projects including banks, hotels, retail, and hospitals are still a big factor, as he cited Digital Focus' established dealer and SI network. Tanakrit Rojanasiraprapa, MD for Bacom Internetwork, also added, “Many big projects have been announced. After the coup, the commercial sector invested nearly US$1.5 billion in commercial projects including big groups of condos, department stores, and large buildings.” Trivitakaykhun echoed a similar feeling, “Commercial projects which were put on hold as a result of the coup, will eventually resume towards early next year.”

Arnon Kulawongvanich, MD for Bangkok OA, commented on a different side, explaining that he expects good movement from the private sectors. “The military government is busy trying to reshape everything, not only in the way they run the country, but the fact that they want to clean up everything. And cleaning up takes time,” he said. Because of this, it is of importance that the private, commercial sectors remain strong, being able to offer up larger scale projects. Kulawongvanich also mentioned that Bangkok OA, with 12 years of partnership with Samsung Techwin, continues to promote their solutions in car parking structures, access control, and visitor management. The company is also the exclusive partner of NUUO, working with local Thai software companies to further promote PSIM solutions.

Rollouts of 4G Postponed
The elephant in the room right now in Thailand is a question of how big of an impact the political situation has affected the Thai infrastructure. Because of delays in government projects, adoption of new technology and phase-outs of older ones have not occurred in some aspects yet. A very important factor critical to the Thai economy seems to be the adoption of LTE (4G). Originally promised a while ago, 4G technology and adoption in Thailand are still in its trial periods and are also still delayed. Trivitakakyhun also added, “4G in Thailand has yet to be officially seen, let alone reliable 3G services. Wireless communication obviously plays a drastic and important role when it comes to modern security solutions. Bureaucracy and political instability have cost Thailand dearly.” To add to this, Reuters also reported that in July, Thailand's military government postponed an auction of 4G mobile phone bandwidth for one year, potentially causing billions of dollars of lost investment and sales in a sector that accounts for a tenth of the economy. According to the same article, “Mobile network providers were banking on extra bandwidth to enable faster data communications services, creating an opportunity to increase revenue.”

Regardless of the project delay, 4G development still remains an important indicator to the country's development of network devices. “We do know that the respective bodies in the communication industry have done reviews to analyze the mobile management spectrum in 4G. Recently, there have been trials of LTE that is aimed at bringing the latest telecommunications knowledge and technological experience to the public and private sectors. We believe that this technology will be implemented in Thailand in due time,” said Nafis Jasmani, Regional Business Development Manager for South Asia Pacifc at Axis Communications.

MIGRATION OUT OF ANALOG
Tied into the issue of bandwidth, the adoption of IP-based solutions has also been impacted by the political situation. Nevertheless, with the political climate finally settling down, and the military government coming to terms with the economic scenarios, things are looking up. As William Ku, VP for the International Business Division at VIVOTEK mentioned, “At the current stage, most of the Thai users still use analog systems. The adoption of IP-based security solutions has not been totally prevalent yet. However, with increasing demand for clear and detailed footage in order to enhance security and intelligent video solutions for strengthening organization operation, the move from analog systems to IP-based security solutions is happening in the Thai security industry.” Another trend noted by Rio Mao, Sales Director of APAC at Dahua Technology is the fact that easy-to-use and affordable cost solutions will be ideal, and new functions to facilitate sales lie in value-added products in video surveillance systems. One thing worth keeping an eye out for, however, is the fact that city surveillance projects being touted by various city governments in Thailand are now aiming for IP-based solutions that are easy to integrate with existing solutions. According to Prajaksoot, “For city surveillance government projects, they now require certain specs of IP cameras. They are just now switching from analog to IP. Cameras are now very cheap,” which drives higher adoption of IP cameras.

HD-over-Coaxial a Factor
Another important factor to point out is the transition to HD-overcoaxial solutions and to IP from older analog systems. Recently, a number of Asian manufacturers, especially from Taiwan, China, and Korea, have been strongly promoting their latest HD-over-coaxial products, with very high price-effectiveness and long transmission distances. Some of the existing IP video surveillance providers have started to feel the decrease in their growth rates, because of the latest HD-over-coaxial products on the market. In the future, not just Thailand, but the entire Asian continent might start facing competition between IP and HD-over-coaxial, especially in the SMB sectors. This may result in the SMB sectors slowing down the migration to IP-based solutions.

China Grows its Market Shares
Tied directly into the surveillance markets, and hot on the heels of the video surveillance industry in Thailand, and indeed the rest of the world, is the giant that is China. In the analog video surveillance world, China is arguably number one in the world. With many large, established companies in China, they leave large footprints in the Thai industry. As Prajaksoot explained, Chinese companies are very competitive, very strong. They have also impacted the industry in more ways than one, forcing many distributors and providers across Thailand to slash prices and play catch up.

Because of the price factor as well as the notion of China's ever-improving quality, China will continue to play a very important and big role. “Cost consciousness is obviously the prime focus, from the client's point-of-view. China has a lot to serve and provide. Today, we are experiencing a level comfort when it comes to quality improvement and technological know-how, which makes Chinese manufactured products more attractive, especially when compared to other neighboring countries,” said Trivitakkayhun. Kittichai Samittwuttikul, Director for SMC Group, also brought up another factor in China, where he mentioned that price competitions with companies from Shenzhen are very high. A point elaborating on is the fact that some Shenzhen companies can even offer 720TVL cameras at the price of a 360TVL without sacrificing quality. By taking an aggressive approach to gaining the market, these companies are now putting FOB prices online and offering longer-term payment plans. In order to stay competitive, SMC Group has started to promote its own brand, establishing franchised outlet shops, as well as project design and installation shops for different projects.

HIGH HOPES FOR THE FUTURE
All-in-all, things are looking up in Thailand. Forecasters are predicting mild growth this year with stronger aspects the year after. “I believe that the Thai economy has shown signs of improvements, and growth momentum should pick up late this year. The changes that are happening will ensure both tourists and locals alike will start spending and investing,” said Trivitakakyhun. Ku also brought up the point that Thailand has been one of the founding countries of the Association of Southeast Asian Nations (ASEAN) and also one of the key ASEAN members. “ASEAN is a transnational organization for accelerating economic growth and regional prosperity.” One final factor lies also on the political side. Hopefully, as Prayuth Chan-ocha's government continues to settle in, stability and economic reforms will continue. The launching of better IP infrastructure and 4G will also play a big role. “Foreign investment in Thailand as a result of country reforms will also be a factor,” said Prajaksoot. Hopefully, this rings true and Thailand will again be prosperous and stable.

Phones get smarter as door openers

Phones get smarter as door openers

Editor / Provider: ASSA ABLOY | Updated: 10/16/2014 | Article type: Security 50

Using smartphones for access control has taken a major step forward following a second successful pilot project by HID Global – an ASSA ABLOY Group company – and RFI at on-demand media company Netflix.

The latest pilot showcased the benefits of using Bluetooth Smart and patented HID Global gesture technology for opening doors from a distance.

Pilot participants at Netflix used the HID Mobile Access solution on a variety of Samsung and Apple smartphones and utilized HID Global's patented ‘Twist and Go' gesture technology as a new, more convenient way to open doors.

“This latest project really illustrates how far mobile access control has come over the last couple of years,” says Amy Dee, director of procurement and facilities with Netflix. “The HID Mobile IDs and HID Mobile Access App are extremely easy to use, and HID Global's mobile-enabled readers meet all the needs of our demanding enterprise environment.”

A key element of the latest pilot was the use of Bluetooth Smart, as near-field communication (NFC) was the only short-range communication technology available for mobile access control during the first Netflix pilot in 2012.

Adding support for Bluetooth Smart enables mobile access control to be used with popular smartphones, tablets and other mobile devices, without the need for accessories. Bluetooth Smart also delivers a longer connection range, which, coupled with HID Global's patented ‘Twist and Go' gesture technology, makes it possible to open doors and gates while driving or walking up to a mobile-enabled reader by simply rotating the smartphone.

Adrian Noriega, the RFI field project manager who installed HID Mobile Access for the Netflix pilot, says: “Once participants received the invitation code, they were able to use the app with ease. Also, having the ability to use the ‘Twist and Go' feature was very convenient. This solution really represents technology at its best, and is the next step in security and convenience for access control."

Nedap keyless drug storage for Darent Valley hospital

Nedap keyless drug storage for Darent Valley hospital

Editor / Provider: Nedap | Updated: 10/15/2014 | Article type: Commercial Markets

A hospital obviously needs to rely on safe storage for their drugs. Nedap enables to do so in cost effective, user friendly and keyless way.

‘Before, all of our 65 nurses owned mechanical keys to the 16 cupboards in our ITU ward. In a busy environment like this, the cupboards are sometimes opened 100 times a day. The locks wore out regularly and consequently the nurses bent or broke their keys all the time. Patient safety always comes first, and we had to be confident that the cupboards were secure at all times. We also had to comply with the national NHS policy to securely store the drugs. That's where Nedap came in.' --Tara Laybourne, Manager ITU ward Darent Valley hospital

Patient's safety comes first
‘In the busy environment of our ITU ward we have nurses working in shifts and visitors walking in and out. Consequently, the policy of the NHS trust is that we need to securely store our drugs. Before, we used key based cupboards to do so. Each of our 65 nurses owned a key to operate them, sometimes up to 100 times a day. As a result of the intensive use, the locks wore out regularly. Sometimes the nurses couldn't lock the cupboards properly anymore and bent or broke their keys as a result. Patient safety always comes first, and we had to be confident that the cupboards were secure at all times. We also had to comply with the national NHS policy to securely store the drugs. That's where Nedap came in.'

Recommendation for Nedap
‘When we asked our partner Carillion, facilitator of the NHS trust fund buildings, about a solution to comply with the NHS security policy, they recommended Nedap. They worked with Nedap before in other NHS site projects, for example NHS Crawley & Horsham hospital. Carillion had heard about the locker management functionality of Nedap's security management platform AEOS. They told us that this solution could help us solve our key-management problem in a cost effective way. Not only for us, but also for Carillion themselves,' says Tara.

No more key management
‘Because the mechanical keys and locks wore out all the time, Carillion had to come over very often to replace them. Also, every time you copy a key, the key gets worse. Eventually it didn't fit the lock anymore. It was an ongoing problem. That's why we chose AEOS Locker Management,' says Tara. ‘The main reason is that the locks can be operated with badges instead of keys. All of our nurses now have one single badge which operates every drug cupboard on the ITU ward.'Also from a maintenance point of view the electronic locker management solution is very cost effective; locks and keys don't have to be replaced anymore and as the locks are wired, there's no need to replace batteries. Tara says: ‘Generally, the solution serves a good purpose and is worth for money.'

Track and trace access
‘Apart from the fact that we can now secure the access to the cupboards, we can also track and trace who's accessed the cupboards at what time. That's also one of the reasons why we've chosen for AEOS Locker Management. According to NHS policy, we have to keep our drugs securely stored. They regularly perform audit trails to check if we comply to the policy. In case of an audit trail, we can easily prove that only authorized persons had access to the cupboards,' says Tara. AEOS Locker Management provides access control on micro level. Via an easy to use web application, accessible via every web browser, users can easily define who should have access to which lockable compartment at what time. When asked about the user friendliness of the system, Tara says: ‘We're happy about the system, but still finding our way around it though. Sometimes, when we issue a new badge to a new colleague, we accidently issue a visitor badge instead of an employee badge. Consequently, the new colleague can't open the cupboards. Then we know that we did something wrong. With a few mouse clicks we can fix our mistake; the system is easy to manage. To keep the process of managing the cupboards secure and clear, only myself and someone else are authorised to manage the system and assign badges. In case both of us are out, the others have an algorithm to check user history if necessary.'

User experiences
When asked about the cooperation with Nedap and its certified Business Partner, Tara says: ‘The cooperation was good. Nedap was available to come over in case of an event. For example, one time, the cupboard wouldn't close. It turned out that the hinges where dislocated. Because the nurses lean on it all the time, we had to renew them. So, it wasn't really due to the system. In the past keys were sometimes lost or misplaced. Since the installation of AEOS Locker Management, they never lost a badge, so that's a great benefit too.'

Future proof
Darent Valley hospital is now ready for the future. In case more drug cupboards should be equipped with Nedap's electronic locks, they can be integrated into the existing AEOS Locker Management system with a few mouse clicks. Because the hospital opted for the solid AEOS security management platform, they can also choose to add on functionalities like access control, intrusion or video management later on. For now, they only use the locker management functionality of the platform and they only pay for the locker management feature they use.

Darent Valley hospital
Darent Valley is a modern hospital in Kent offering professional care, exceptional quality. We provide patients with the latest technology for their treatment in safe, comfortable and clean surroundings. The hospital's team of around 2000 professional and friendly staff provides care for patients across a full range of day-patient, inpatient and out-patient care. We work closely with our local community to improve the standards of our services and welcome all patients both locally or further afield.

 

Nedap modern access control for the Protestant hospital

Nedap modern access control for the Protestant hospital

Editor / Provider: Nedap | Updated: 10/15/2014 | Article type: Commercial Markets

When ‘Christoph 7', the hospitals' quick response emergency team, rushes to an emergency such as a heart attack or a stroke somewhere within the hospital, there is no time to be lost: in the most serious case it can be a matter of life or death. Saving lives has absolute priority and requires unhindered access. The access control management system must therefore be prepared for this eventuality.

So the Team has its own special ‚Christoph 7‘ cards: held in front of any card reader they initiate elevator priority control. The elevator that is specially reserved for the emergency team is ordered to the appropriate floor. Only when a Christoph 7 card is used, the elevator will go to the selected floor with priority. The team can release the elevator for normal operation using the same card. This is just one of many features that the new access control system provides for the Protestant hospital in Mülheim. The system has been realised by the local company GST Gesellschaft für Sicherheitstechnik. Paving the way for flexibility
The foundation of the system goes back to an investment decision made in 2008. Back then the hospital changed from the outdated old system in a migration process to Nedap AEOS.

This comprehensive software-driven platform manages all the security requirements of one or many buildings. As well as access control, this includes identity and authorization management, IP video management and intrusion detection. Add to that the supervision and reporting with web-based alarm administration via a web-based, system-independent graphic interface. The Salto off-line system has been fully integrated into the AEOS security management platform and thereby enables the homogeneous administration of all components, people and functions. AEOS manages a total of 1,580 off-line lock systems. It manages all online doors and online functions, the access doors, the off-line lock system, room doors, patient cabinets and containers, employee cupboards as well as mobile care and food trolleys. New cards including photos are issued using the AEOS software. An ID card can be created on the card printer for every data record in the system and assigned to the corresponding person.

People instead of ID carriers
A particular advantage of the AEOS platform lies in the fact that it is not based on ID carriers but people. The difference is immediately noticeable, for example, if a card is lost. The entire employee record must not be re-entered in the system just because a persons' identification number is missing.

‘This particular criteria can be the deciding factor when choosing the system, above all if there are numerous locations at which the ID features must be distinguished‘, says Dietmar Vetten of GST. This fact permits the issue of multiple identification devices per person. For example, some people have two ID cards in one, that are valid in different hospitals. The cards replace the previously common bunches of keys. They don‘t just open doors and cabinets. Also, the elevator can be controlled with them. Meanwhile long-range readers have been installed near the elevators: these recognise when a bed is moved close to the elevator and permit priority use. The authorization can also be organised differentially so that a priority usage is only available if a member of staff arrives with a bed. If he is alone he will be treated like every other member of staff.

Emergency door monitoring and canteen trolleys
Applications of the security management system can be found everywhere. All doors that are on escape and rescue routes within the hospital are connected to AEOS. Alarms can now be alerted at a central point and forwarded, whereas they used to be raised by pressing an emergency button. The connection also prevents doors being opened without permission. If this happens an alarm is raised in AEOS so that the door can be closed again. An additional connection to the video surveillance system is also planned. The scope of the Nedap software reaches even as far as the catering service: the central food supply service is organised in this Mülheim hospital. The deep frozen food is delivered to the kitchen, divided into portions and stacked in the canteen trolleys. It is then thawed and carefully warmed up on the ward so that it doesn‘t arrive on the plates lukewarm, or even cold, because of the long transport distances. Each of these canteen trolleys has a transponder that automatically opens the door as it passes over the inductive loop in the floor directly below. In this way it is not necessary for a member of staff to manually open a door with their card and the kitchen remains accessible to authorised persons.

Central location – preferred parking
For shopping-lovers it is very practical to use the car park of the centrally located hospital, and so some employees had the idea of using their ID cards outside normal working hours. This is now prevented by a connection to the AEOS software, as Dietmar Vetten of GST explains: ‘The installer has fitted a card reader to the parking lot barrier that is connected to the AEOS system. This has saved having three separate proprietary parking management systems'. The parking spaces can be of ‚mixed‘ use according to an algorithm – that is, by visitors and by staff. The software shows the current occupancy status of each. If one of the staff park there too long an email is sent to the facility management personnel.

Although all the staff from the stand-by team has authorisation for the parking lot, only the person on duty can park there during his shift.

Optimum cooperation
With regard to the implementation of all these systems, no better praise can be given by the customer. This applies not only to the support by GST but also, as Georg Thies and Klaus Domscheit emphasize, for the ‘very good teamwork between Nedap and Salto'. The Salto striker portfolio, that has meanwhile been in use in the hospital for four years, provides an off-line product choice that is hard to beat. Good products alone are not decisive but also good communication within the triangle of manufacturer, installer and customer / user. As Axel Schmidt of Salto points out, this has already been tested ‘in hundreds of joint projects in Europe and worldwide'. During this time the cooperation has been optimised, as Christian Nagel of Nedap confirms: ‘Our emphasis is on the integration of our software because we have an open platform, therefore we work together with experienced partners on a longterm basis.'

HID mobile access included in the Samsung Enterprise Alliance Program

HID mobile access included in the Samsung Enterprise Alliance Program

Editor / Provider: HID Global | Updated: 10/17/2014 | Article type: Hot Topics

HID Global recently announced that it has been named a silver partner in the Samsung Enterprise Alliance Program (SEAP). The partnership brings the company's award-winning HID Mobile Access solution for opening doors using smartphones, and HID Trusted Tag Services that add trusted identities for everyday objects for “Internet of Things” applications, into Samsung's extensive product sales and marketing ecosystem.

“HID Global is pleased to be working with Samsung to offer exciting new secure identity capabilities to its smartphone customers,” said Debra Spitler, vice president, Strategic Alliances with HID Global. “Helping Samsung users transform their smartphones into trusted credentials will deliver a new era of functionality, from opening doors without needing a key or smart card, to authenticating objects in a growing range of consumer uses cases and applications.”

Powered by Seos, HID Mobile Access makes it possible for customers to use NFC- and Bluetooth Smart-enabled Samsung Galaxy and Samsung Note smartphones to open doors by “tapping” the phone to a door reader or electronic lock. The solution also enables users to access doors and gates from a distance via Bluetooth Smart and the company's patented “Twist and Go” gesture technology. Samsung devices also support use of the HID Mobile Access Configuration Application that is used by system installers to quickly dial-in and optimize the read range of Bluetooth-enabled iCLASS SE readers based on environmental conditions. The company's mobile access solution delivers an overall user-friendly deployment experience by enabling users to quickly download the HID Mobile Access App to their Samsung smart device; administrators can also easily issue and revoke Mobile IDs via the HID Secure Identity Services portal.

In addition to HID Mobile Access, Samsung devices can also be used with HID Trusted Tag Services. By combining HID Trusted Tags, NFC technology and secure cloud authentication services, HID Trusted Tag Services offer the innovative capability of adding unique and trusted identities to everyday objects. These objects can be read by NFC-enabled Samsung smartphones for “proof of presence” applications, ranging from tapping a smart poster for an interactive brand experience, to verifying the visit of home health staff in a patient's residence or confirming student attendance on college campuses. The services can also be used for brand protection and other “Internet of Things” applications.

Unifying city-wide surveillance systems

Unifying city-wide surveillance systems

Editor / Provider: Genetec | Updated: 10/15/2014 | Article type: Hot Topics

Pervez Siddiqui, director of strategic markets, explains how cities can take a collaborative approach to improve the safety and security of their citizens.

Thousands, if not millions, of citizens rely on local and national governments to keep them safe. Protecting the public from crime, safeguarding buildings from vandalism, or simply ensuring a city is running smoothly requires multiple public sector agencies to collaborate, consult with citizens and secure buy-in from private enterprises. By combining resources and standardising public safety efforts using Genetec's unified security platform Security Center, cities can break down silos across agencies, cost effectively enhance city-wide operations, expand surveillance coverage, and improve emergency preparedness and response times.

Genetec Security Center combines Omnicast internet protocol (IP) video surveillance, Synergis IP access control and AutoVu automatic license plate recognition (ALPR) systems to deliver greater situational awareness to security and law enforcement personnel. It standardises common security operations from multiple systems – such as monitoring, reporting, alarm management and configuration – and makes all tasks easily accessible via a single intuitive application. Using Omnicast's IP video management system, cities can identify threats and manage hundreds or thousands of high-definition, megapixel cameras, while reducing bandwidth costs. The Synergis IP access control system enables cities to leverage existing network and hardware investments to extend security coverage to municipal and historical buildings. The solution also provides efficient workflows and greater automation, which allows users to focus on monitoring critical tasks. Meanwhile, fixed or mobile ALPR cameras can be attached to intersection lights, buildings or law enforcement vehicles to track stolen cars, wanted felons, or amber alerts around the city. In addition, cities can use Security Center to implement a phased growth plan as each new budget cycle is launched, enabling cities to start by upgrading video surveillance and unify other key systems over time. For example, the solution can be used to improve access control for enhanced security and centralised personnel management; enhance licence plate recognition, hot lists and reads systems; and develop video analytics to identify misplaced objects or trip wires, and count people. Security Center can also be used to unify evidence management systems hosted in Microsoft Azure for Government, as well as Microsoft Aware Consoles for threat, investigation and intelligence management. Furthermore, Genetec's platform can be deployed to establish a multi-stakeholder model that brings together publicly and privately funded security systems in one centrally managed, cost-effective system via the solution's Federation feature. This allows cities to extend security coverage by accessing video streams from private entities in emergencies, while retaining the autonomy of each individual system.

The Federation model also enables public organisations – such as educational institutions, utilities services and municipal buildings – to provide police departments with full control of their security systems at the click of a button. Police departments can then view cameras, lock down facilities and respond to threats in an effective, efficient and timely manner.

To protect citizens' privacy, the Federation model ensures video evidence is managed responsibly by providing both broad and granular system privileges, audit trails, customisable user access rights for cameras or files and monitoring document incident handling. Digital signatures can also be added to video to ensure authentic evidence is used in court.

What's more, Genetec's security platform helps to transform officer smartphones or wearable cameras into mobile monitoring stations, which are linked back to the central control centre via mobile apps. Meanwhile, officers on the road can also tap into the city's systems from their vehicle-based laptops to enable them to proactively assess and prepare for emergency situations and improve response times, while ensuring they remain safe. In essence, cities wanting to capitalise on their existing hardware and multiple networks can use unified security platforms to upgrade analogue technology over time. Solutions like Genetec's Security Center help cities to expand their surveillance systems to include thousands of devices with ease – potentially reaching up to 300 cameras per server – and expand with cloud camera connections, while eliminating the cost of on-site storage hardware and servers.

What Genetec's customers are saying about Security Center

Ville de Forbach
Located in France, the city of Forbach chose Security Center to protect more than 100,000 citizens from local crime. Using Omnicast, the city manages a combination of fixed and multi-lens IP cameras suited for different environmental conditions, while Synergis controls access to the command centre. Plus, the map-based interface enables police officers to easily search for and retrieve video evidence, which has helped to justify the future expansion of the system.
“The ease of use and the speed at which we can retrieve information is extremely impressive,” says Michel Fersing, the city of Forbach's municipal police chief. “Today, I can say with full confidence that every national police officer leaves our department with video evidence, within minutes. Security Center has been an instrumental addition to our city's security and we could not be more pleased with our new unified platform.”

Sanford Public Safety Complex
Security Center has also been implemented in the US city of Sanford in Florida as part of a major upgrade at a new state-of-the-art public safety complex. The system comprises more than 80 cameras managed by Omnicast and over 78 access control points controlled by Synergis. As Sanford has several municipal facilities with Genetec solutions, it also used the Federation feature to ensure it can centrally manage all systems from the complex.
“Security Center is a platform that can address all of Sanford's needs, allowing us to create a federated system that serves several types of facilities simultaneously,” says Nicholas McRay, senior project manager at the city of Sanford. “We never need to cross-reference information between discrete solutions across the city because it's all tied in. It works well for us, and it suits the widely varied needs of a municipality.”

 

Pelco names Kim Loy as marketing vice president of video line of business

Pelco names Kim Loy as marketing vice president of video line of business

Editor / Provider: Pelco | Updated: 10/14/2014 | Article type: Security 50

Pelco by Schneider Electric announced the appointment of Kim Loy to the role of Vice President of Marketing for the Pelco Video Line of Business. In this role, Loy will drive strategic marketing initiatives on a global level in support of the company’s continued investment and commitment to its Pelco IP video surveillance solutions. “Kim has a great deal of experience managing global marketing activities and we are pleased to welcome her to the Pelco family,” said Herve Fages, senior vice president, Schneider Electric, Pelco Video Line of Business. “Her knowledge of the security and surveillance industry will be instrumental in carrying out Pelco’s strategic vision and help drive global marketing efforts that amplify our presence as a world leader in the design, development and manufacture of video security systems, software and services.”

“I’m excited to be working with the Pelco team to build upon the company’s prestigious reputation for high-quality, innovative products and exceptional customer service within the surveillance and security space,” Loy said. “We will continue to define a well-planned strategic roadmap and maintain Pelco’s standing as a leader in the video business.”

Loy has more than 20 years of marketing and management success within the security and surveillance industry and previously served as VP of Global Marketing and as the General Manager of the Security Business Unit for Xtralis and held senior management positions with G4S, GE Security, and Siemens. Additionally, Loy has served on the SIA Board of Directors for two years, and served as Chair of the Access Control Industry Group for the Security Industry Association.

As the new VP of Marketing for Pelco, Loy is responsible for managing global marketing activities, including alignment of marketing strategies across vertical markets and developing effective advertising, marketing, and communications for the video business.

Understanding “Real” PSIM

Understanding “Real” PSIM

Editor / Provider: Israel Gogol, a&s International | Updated: 10/15/2014 | Article type: Hot Topics

PSIM (physical security information management) software is a rapidly growing segment in the security market. Its core strengths lie in the ability to integrate disparate systems, creating an intelligencebased situation picture and supplying operators with active policy management. As the market learns more of the benefits PSIM they have the potential to go beyond security and turn into a complete site management platform.

The world market for PSIM (physical security information management) software in 2013 was estimated at US$160.3 million by IHS Research. Despite being a small segment inside the larger security market, PSIM has enjoyed rapid growth — it is estimated to continue growing at 20% and higher growth rates until at least 2018, according to IHS. Price and also end users' level of understanding of PSIM solutions are still main barriers limiting PSIM growth. In addition, the PSIM market's long-term growth is also limited by “competing products successfully being deployed in the mid-tier, a market that has historically been out of reach for the high-end PSIM software platforms due to their prohibitive price tag,” IHS commented.

What is a "Real" PSIM?
PSIM is a software platform that collects and manages information from disparate security devices and information systems into one common situation picture. These can be traditional security sensors like video cameras, access control, intrusion detection sensors, as well as “non-conventional” systems such as networks and building management systems, cyber security hacking alerts, and even weather feeds. A true PSIM solution is vendor and hardware agnostic, giving users the ability to integrate legacy systems and the flexibility and the choice to use best-of-breed technology in the future without limitations.

Being a relative newcomer to the security sector, and displaying a fast growth rate, there is confusion regarding what constitutes a “true” PSIM solution and how it differs from other command and control systems, video management software (VMS), or other security platforms, some of them offering their own integrations between different systems.

The main benefit of PSIM lies in its integration capabilities, being able to connect with existing and planned systems without being “locked-in” to any specific vendor. Usually VMS systems or access control systems use proprietary technology. In these cases, extending a system can only be done by the same vendor. Integrating with a legacy system provided by a different vendor could prove difficult, forcing replacement of existing systems.

In addition to this unique integration capability, PSIM offers another strong differentiator: PSIM is an intelligencebased solution. Collecting and correlating information from different sources means alerts are only raised on events that are important. “A true PSIM has the ability to identify unfolding events, manage them effectively, and mitigate their risk. For commercial, critical infrastructure, and homeland security markets, PSIM provides situation management and establishes the foundation for organizations' operations,” said Jamie Wilson, Security Marketing Manager for EMEA at NICE Systems.

A third important differentiator is the ability to provide active management of events, improving operational efficiency. By using adaptive workflows, the operator knows what is happening, where it is happening, and what needs to be done. Step-by-step action plans can be created to address different situations. This is vital in both making the operators job easier, but also in ensuring the company is following corporate safety and security policies every time and complying with local rules and regulations. “Without adaptive workflows, all you have is a lot of interconnected systems and you are solely reliant upon the experience of the operator to be able to coordinate the management of the incident,” added Wilson.

Adlan Hussain, VP of Marketing at CNL Software emphasized that dynamic workflows can change based on the time of the day, the threat level, and the number and types of alarms in the system. “This is what makes a PSIM solution an intelligence-based system and not a mere check list of processes to follow,” he explained.

These benefits, combined with growing connectivity, change the way corporations work. PSIM allows for a more centralized command and control, without being tied to a specific site. “In the past the security surveillance and sensors' monitoring had to be on-site at the place of the event. Today we can disconnect between the surveillance and the site. The benefit of a PSIM system is not only in connecting different sites, but thanks to the ability to display the same information in different languages we can connect a company headquarters in Europe with a site in Africa,” explained Hagai Katz, VP of Business Development for Magal Systems. “This connectivity allows the company headquarters to quickly address issues and make sure that the initial response is the correct one. A company can extend the benefit it gets from a PSIM system beyond safety and security. Other company procedures can be incorporated into the SOP, for example, making sure a proper media response is prepared by the PR function. In that sense a PSIM system also contributes to the company's risk management.”

Who should install PSIM?
From the technical point of view, PSIM solutions are intended for easy integration. It is therefore meant for cases when there are several legacy systems that need to be integrated, when there are several control layers (e.g., local and national), and when there are many sensors, or when future integrations with additional systems are needed.

PSIM is mostly needed for critical sites with high security requirements and large sites with many systems/ sensors. It is therefore mostly relevant for national infrastructure, large corporations, government buildings, mass transportation, and city protection projects. All these already have existing legacy systems and can benefit from integration. A city, for example, can integrate video footage from public space video surveillance cameras and traffic control cameras creating a unified situation picture in the control room.

Obstacles Facing Adoption
Though the benefits of PSIM seem natural and logical, there are still many barriers to its adoption. Some are due to lack of buy-in by different stakeholders that refuse to give up control of their systems and information; some are the result of past failures.

One of the biggest challenges faced by PSIM vendors is the availability of IT savvy channel partners. “Limitations to growth are predominantly around the current education levels within end users, consultants, and integrators,” explained Hussain,” We are working hard to increase education levels within each of these groups, and have created programs to address some of these challenges.”

Growing Connectivity and Greater Industry Cooperation
“With everything today moving at light speeds towards connectivity via the network and the Internet, PSIM is also migrating and expanding towards the ‘Internet of Things' via the information management aspects of PSIM,” said James Chong, Founder and CTO of Vidsys. “The open architecture and browserbased PSIM technology is enabling the software platform to rapidly and literally connect with almost any IP-based device, application, and system using open standards and protocols such as XML, SOAP, HTTP, SMTP, and others.”

Recent updates in PSIM software functions and features include integration with mobile devices, allowing ground forces to share and receive information through smartphones and tablets. In addition, there is an industry move towards greater connectivity with other business systems such as HR systems, internal directories, visitor management systems, building automation systems, RFID, intelligent transportation, and more. These will create opportunities for other benefits to be realized from PSIMs beyond safety and security.

“I think people are realizing that PSIMs can provide a lot more than just physical security,” said Michael Mesaros, Group Product Manager at Proximex, a Tyco Security Products brand. “We're being asked by customers to integrate with all kinds of systems — elevators, building management systems, luggage conveyors, and even environmental controls in airport jet ways. There is a combination of market forces at work and PSIMs must be capable of leveraging this data for more and more systems as it becomes available.” He pointed out that Proximex has worked to make their PSIM easier to integrate with — for example, by implementing APIs based on REST (representational state transfer), a standard integration in the enterprise IT world. “Following these standards opens up a lot of avenues for customers to integrate social and web solutions.”

toward greater connectivity and easier integration. CNL has created a PSIM driver development community, which allows other development houses, product vendors, and security integrators to create drivers to connect systems to CNL's PSIM platform. This allows fast production of drivers, and allows product vendors to create their own drivers if they are not able to share their SDK or APIs. In the past five years, CNL has also been running a technological partner program.

Another initiative to foster interoperability between manufacturers and establish industry standards is the Physical Security Interoperability Alliance (PSIA) led by companies such as Cisco, Tyco, Hikvision, and Kastle Systems. PSIA's mission is to develop specifications for physical security technology that will enable plug-and-play interoperability across the security ecosystem. This will make the integration of different systems under a PSIM solution quicker and easier.

Integrating Predictive Capabilities
PSIMs can go beyond event management and post-event investigation. The ability to integrate with media broadcasts, open source intelligence systems, and other information analytics gives PSIM a predictive capability, as well as a strategic advantage in predicting and preparing for incidents.

Earlier this year, Vidsys and HP Autonomy announced a collaboration to develop a solution that combines VidSys' PSIM with HP's advanced information analytics platform. “Social and broadcast media play an increasingly significant role in helping anticipate and mitigate potential security incidents around the world. The nature and profile of threats are constantly changing and this new generation of adversary often leaves a different digital footprint, creating potential gaps in traditional threat detection approaches,” said Chong. “The combination of a vast array of information, including social media chatter, video surveillance footage, emails, case files, criminal records, and physical location data help identify potential threats and take actions to neutralize the danger.”

PSIM to Offer Holistic Management
The benefits of PSIM, especially its ability to incorporate non-security systems, hold within them the promise of expanding beyond physical security and delivering comprehensive information management. A good example is seaport management, explained Katz. A PSIM system can make sure that an incoming truck is cleared quickly using LPR sensors for the truck and a biometric sensor for the driver. The containers can be recorded and stored according to their final destination and video surveillance can make sure the goods are not damaged. Since everything is audited by the system, the port can accurately bill the clients according to how long the cargo was stored before it was loaded on the ship. Usages like this, according to Katz, show how “PSIM allows combining these different work flows into one single story.”

All in all, the data gathered from security systems, combined with other systems can turn a PSIM solution into a comprehensive site control platform; thus demonstrating that PSIMs are not for security alone. In the future, PSIMs will allow for a more holistic management approach, combining safety, security, and management.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page