Page 32 - Security Today, June 2018
P. 32
devices enhance hospital security personnel’s ability to respond in the event of a crisis. Real-time location systems (RTLS) support security by providing time and locations for patients, staff and assets. RTLS systems also provide a wealth of data that can assist with more than just security, including bed availability, wait times and pedestrian traffic patterns throughout a hospital complex.
Each of these emerging hospital security trends provide a signifi- cant amount of added value in the form of the data they aggregate. These security trends highlight the need for the integration of the systems and data. Hospital security professionals often have current systems in place that they do not have the budget to replace com- pletely. While working to mitigate risks that a security assessment has highlighted, the consideration of both system integration and data integration is key. Visitor management kiosks are valued added, but do not provide value to the security apparatus without the integra- tion with cameras, access control and analytic software that can make use of the data gathered as visitors check in.
Physical security information management systems are one way to allow systems to integrate. More and more often simple modifica- tions can be made to allow the integration of security devices across the spectrum. Hospital security personnel should understand if and how the systems integrate. Information technology personnel should be brought in early in the design phase to ensure the current network infrastructure can support these technology upgrades.
Considering the Integration
While system integration is one consideration, another is how does the integration of these systems support analysis of the data that each security platform provides? Pharmaceutical dispensing access control and building access control could be different systems, but the inte-
gration of data is valuable. If the employee did not access the room where the pharmaceutical dispensing device resides, then they should not be able to access the pharmaceutical. The data integration in this example should create an alert result from the analysis of each of the systems data outputs. It also provides the security team more value than each of the security data feeds independently. System and data integrations increases the security team’s efficiencies and effectiveness and are vital when purchasing security technology equipment.
Overall, hospital security staff have a wide range of threats and vulnerabilities to consider. The increase of active shooter incidents and terrorism-related events combined with the unique security chal- lenges in a hospital environment present security personnel with a difficult job. Budgetary constraints add to the challenges and make identifying the best security solutions critical. Hospital security staff should conduct threat vulnerability risk assessments to aid in identi- fying these risks. Being able to identify what the security concerns are that need to be addressed contributes to identifying the correct se- curity technology solution. The integration of security technologies systems and the data that results from these systems is vital.
Demonstrating the value added by these technology solutions be- comes even more evident when the system and the data can be inte- grated to trigger a security response.
Bill Edwards is vice president of operational/technical security services at Thornton Tomasetti.
Autumn Harris is technology integration director at Thornton Tomasetti.
FREE ONLINE CUSTOM
JUST ONE HOUR
Book your free VMS demo today
Let Milestone guide you through our world-class Video Management Software. Sign up for a tailored demo online and a Milestone expert will be in touch to schedule a demo that meets your needs and requirements, regardless of your organization’s size and complexity.
Book now
milestonesys.com/book-a-demo
28
0618 | SECURITY TODAY
Untitled-7 1
Go to sp.hotims.com and enter 35 for product information.
1/9/18 12:30 PM
HOSPITAL SECURITY