Hospital & Healthcare Security Systems: A Healthy Approach to Security & Beyond

Medical Security Solutions

Healthcare security systems involve far more than basic security products. These systems, when integrated with logical, comprehensive solutions and technology, keep a hospital or facility’s people and assets safe. When everything is secure, a hospital can confidently move forward in achieving its real mission: providing patients the best possible care in the safest environment possible.

Security as a Means to Protect Patients and Staff

Unified Access Control

Unified access control allows you to assign levels of facility and area access based on staff function. Paired with video surveillance, it allows for active medical facility monitoring and recording activity, as well as global and departmental lockdown capabilities. Integrating access control and video provides centralized control for easy administration and management.

IP Video Surveillance

Take advantage of your existing network by connecting IP video surveillance to it. Strategic installation offers a clear view of patients and facilities. Surveillance signage can deter unsafe and would-be criminal acts. Captured images can be used as evidence and to identify individuals.

Staff Security & Protection

Staff’s badges can be equipped with wireless call functionality. Paired with wall-mounted devices, staff can discreetly summon help over your wireless network or current Wi-Fi. With an active-RFID, RTLS badge, staff members press or pull it when they need assistance or are facing a threatening situation. RFID technology detects their specific location, so responders can arrive quickly.

Intrusion Detection Systems

Your healthcare facility’s needs and layout determine recommendations for the latest options in intrusion detection. Many options, ranging from minimum to maximum solutions, are available to fit staff and patient needs.

Emergency Notification Devices

Quickly and concisely guide people out of harm’s way whether they’re inside your hospital or on the grounds or parking areas. Incidents are triggered via buttons, consoles, panels and inputs. Designate notification channels. Then, provide emergency directions through communication systems, such as media displays, phone, text, PA systems and more.

Wandering, Elopement and Fall Detection

Track patients or residents with technology features that give them a better quality of care, give families and staff peace of mind, and allow your operations to flow more smoothly. Once sensors and tags are in place and the detection system is deployed, users receive an alert and quickly respond if someone wanders, strays or falls to improve care and minimize risk.

Infant Protection

Protect your most vulnerable patients and give staff and new parents peace of mind. Through comfortable tags with tamper alarms and integration with infrastructure, such as access control systems, door locking systems and security cameras, staff can protect infants and focus on their care.

Security as a Means to Create the Safest Healthcare Environment Possible

Asset & Equipment Management

Mark mobile medical equipment with asset tags, which seamlessly communicate with existing systems to provide exact location and condition. In addition to controlling inventory, medical staff can quickly locate then access critical medical equipment, speeding up workflow and delivering better overall patient care.

Environmental Monitoring

Meet compliance standards and prevent product loss with environmental monitoring. Record and track temperature and condition data of mission-critical medicines, vaccines, blood and lab samples to ensure all are safe and ready for patient use. Save time and money by eliminating the need for manual reporting and recording data remotely.

Global Threat Reduction Initiative (GTRI)

Prevent terrorists from obtaining materials that can be used in radiological attacks by implementing security requirements established in the GTRI framework of convert, remove and protect. Hospitals support the initiative with remote monitoring, access control systems, alerting local law enforcement of an event, disposing properly of unused radiological and nuclear materials, and protecting radiology and nuclear medicine equipment still in use.

When it comes to hospital security systems, there are many factors to consider – from the type and size of your facility and the type of medical inventory to the people who work and visit there every day. The goal is to secure people and assets from every imaginable internal and external threat. Yet, unless regulations, your equipment or your surrounding community dictates it, you want your hospital secure, yet a welcoming space where your staff can carry out your true mission, caring for patients in a safe environment.

Schedule your hospital security systems consultation by calling us at 816-842-3700.

The Kenton Brothers Retail Counter [Video]

By Ryan Kaullen

Kenton Brothers can trace its customer service roots back to 1897. Our Retail Counter, customer-facing environment is at the forefront of service for our customers. Every day, our customers are coming in with various needs as a result of their businesses growing and evolving. That’s where the Kenton Brothers Retail Counter comes in. It’s a resource for their overall facilities physical security needs. Those needs come in the form of keying, part repairs, parts ordering, security needs, and knowledge database.

Our customers rely on the Retail Counter to be the gatekeepers for physical security at their facilities. Our internal database of records is guarded by checks and balances specifically outlined by our customers. Approvals must be followed every time. The Retail Counter staff works tirelessly to make sure requests are correctly followed and delivered on time.

Over the years, the Retail Counter has grown from a key shop to a full service solution for our customers.

The Retail Counter can help customers create and manage key systems, duplicate keys, re-key, order parts, repair parts and the list goes on. We welcome local walk-ins every day, but not all of our customers are local. We have customers across the country that rely on our knowledge and products to protect them. One day the Retail Counter Staff is cutting keys for a customer in Texas and the next they’re working with a customer in Arizona. We have thousands of key blanks and cylinders on hand, thousands of lines of in-stock product, as well as thousands more available through our vendors, and decades of experience to back it up.

From the entire Kenton Brothers staff, we invite you to allow Kenton Brothers and the Retail Counter Staff to help protect the people, property, possessions, you hold dear.

Partnering with Homebase to offer Multi-Family “Smart Home” Technology

By Neal Bellamy, IT Director at Kenton Brothers

Smart home technology has been around for a few years. It’s the ability to control lights, thermostats, locks and more in your home using an app or a remote control. It’s building automation for your home. If you own a condo or an apartment complex, how can you offer the smart home experience to your tenants? Can you use the same products as a single-family home or a commercial building?

Let me show you how partnering with the right people can make smart home tech another bonus for your complex.

First of all, the typical smart home and commercial products aren’t a great fit for multi-family buildings. Most of the building is made up of individual “homes” with each home needing to have their own control over locks, lights, etc. However, there are also common areas in a commercial building including a gym, pool or front entrance that every tenant will need access to.

Kenton Brothers: Homebase LogoYou may need an intercom system to call a tenant if they have a visitor. To accomplish the task, you need two experts. One in Smart Home and the other in commercial security systems. Partnering with Homebase, Kenton Brothers has helped several multi-family facilities offer smart home tech to their clientele.

Homebase offers a tenant all of the smart home features like automatic locks, lights and thermostats. However, they also solve the problems associated with an apartment or condo like move in/move out, demo unit access, dog walker or cleaning service access through the front and tenant doors. They also offer a maintenance ticketing system and shared space access for all tenants.

Kenton Brothers: Smart Home SolutionsKenton Brothers makes sure that the right locking hardware and other security systems are in place and integrated.

Not every “smart” lock is ready for this application. Different doors will have different needs for intercom, access control, and/or smart home. An electrified lock on the front door of the complex will be very different than the door to a unit, but both need to be compatible with the building automation, or smart home system. The intercom system needs to call tenants wherever they are because many people no longer have land lines.

For more information, click here to download our guide for “Top 11 Solutions for Multi-Family Properties”

If you want to offer smart home functionality for your tenants, give us a call. We’ll partner with you and Homebase to integrate the different systems and features to create the right environment for you and your tenants.

How does a security integrator design their own security systems? Part 3

By Neal Bellamy, IT Director at Kenton Brothers

In the last couple of months, we’ve been designing our intrusion system, network infrastructure, and video surveillance systems. Now it’s time to design the access control system.

Access Control

There can be lots of advantages to Access Control.

Because the doors are controlled electronically, we can:

  • Automate the open and close time of the business or areas
  • Stop handing out keys that might not be turned back in or lost
  • Track who goes where, etc.
  • Use access control doors for business reasons, not just for security.

Kenton Brothers: Access Control and LocksFirst, let’s talk about the components of access control. A couple of the components are obvious, but others are misunderstood. Today we’ll talk about card readers, locks, door position sensors, request to exits, and credentials. Exciting, right? Maybe not, but these are incredibly important details for a commercial security system.

Card Readers

Card readers are the most obvious component required in an access control system. The card reader is what reads your access control card and identifies you to the system. Your card is unique to you within your access control system. However, a card reader doesn’t have to be just a card reader.

There are lots of ways to identify yourself to the system. Fingerprint readers, vein readers, pin pads, iris scanners, and face scanners are all possible ways that you could be identified. Some of these are more secure than others. Pin numbers can be shared, so we highly suggest not using them, or make sure that whatever you have behind the door is not valuable.

Fingerprint readers are more hackable (YouTube Video about that here) than a vein, iris or face scanners. The highest level of security is two-factor authentication. You would use two of these kinds of credentials to enter the door at the cost of being less convenient.

Locks

Kenton Brothers: LocksLocks are the next most obvious component. You need to be able to lock and unlock the door electronically. Common electronic locks are Electrified Panic, Electrified Levers, Strikes and Mag (magnetic) locks.

All electronic locks can be broken into two categories, “Fail-Safe” or “Fail-Secure”.

Fail-Safe locks unlock when there is no power going to them. When the power “Fails” the lock is “Safe”. In this case, “Safe” means someone can get out. Unfortunately, that also means that the door is unlocked, so someone could come in if the power fails.

Fail-Secure is the opposite; when the power fails, the lock is secure or locked. There are times when codes require a Fail-Safe lock, like in a stairwell of a large high rise, however, at Kenton Brothers we prefer fail secure locks.

Electrified Panic, Electrified Levers, Strikes can all be Fail-Secure or Fail-Safe, but mag locks are always Fail-Safe. Mag locks usually require two forms of egress, meaning that there are two ways to leave the building through a mag lock. Mag locks generally are also required to be connected to the fire alarm. Although Mag locks themselves can be cheaper than other types of locks, by the time you connect the two forms of egress and the fire alarm, you could have installed a Fail-Secure lock.

Door Position Switches

Now you can authenticate at the door with a reader and unlock the door with an electrified lock. But how do you know if someone propped open the door, or forgot to shut it? That’s where the third component at the door comes in, the door position switch.

This switch is generally a magnetic switch mounted in or on the door that tells the system if the door is open or closed. You can use this information to drive alerts if a door is left open too long, which circumvents the security that you are trying to establish with access control.

Wouldn’t it be nice to know if someone opened the door that was unauthorized?  With the door position switch, we can tell the door opened without a card read, but it would also alert us when anyone leaves the building.

Request to Exit

We use a second type of switch to tell us when someone is leaving the building called a “Request to Exit”. This can be a motion detector that triggers when someone gets near it, or it can be built into a lever or exit bar. That way, if the doors opens, but the request to exit was not triggered and the reader was not used, we know someone came in from the outside and was not authorized. This is called a “Door Forced”. The door was forced open with key or crowbar.

Credential

The last component is a credential. We say credential, not card, because we can use a key fob, iris, face, fingerprint or other identifying feature to authenticate to the system. Most systems use a card or key fob, because of cost and ease of use. However, not all cards and key fobs are the same.

There are dozens of technologies that can be used to store and transmit the credential number to the system. Some are proprietary, some are open, some are not-encrypted and some are. Generally, we advise clients to use a “Smart Card” technology that is encrypted, but not proprietary. It provides the security of encryption while allowing the technology to be compatible with most access control systems. Some options even guarantee that your exact credential number will never be available to any other company in the world, while also being non-proprietary and encrypted.

So What Will Kenton Brothers Be Using?

Whew, that was a lot of info! Now let’s talk about the solution we’re going to use at Kenton Brothers.

Our exterior doors need to be secure, while some of our interior doors are really just for traffic control. We will control our space while also controlling the tenant space. There’s an overhead garage door leading from our space to a space shared with the tenants. We also have an overhead garage door for loading and unloading material that we don’t want to have to get out of the truck to open.

For the exterior doors, we’ll install an electrified exit bar with a built-in request to exit. The exit bars are heavy duty and allow a large number of people to get out of the building. The built-in request to exit also gives less false triggers than motion detectors, because instead of triggering when someone gets close, it only triggers when someone actively leaves the building by presses the bar down. These doors will also get a door position sensor.

The interior doors will be strikes or electrified levers. Although these locks are still rated as “Heavy Duty” they are a little less expensive and won’t see as much use.  We will still use request to exits in the electrified levers, for the same reason as the exit bars. We’ll still use a door position sensor to make sure the doors are closed.

The overhead doors will be controlled by door operators, kind of like your garage doors at home. We’ll tie those into the access control system.

For the readers, we’ll use HID iclass SE. These are non-proprietary, encrypted readers, which can also be used with Bluetooth credentials. Right now, they will connect with the Weigand protocol, an open standard communication between readers and access control systems. They can also use a newer, more secure OSDP protocol when the access control systems are ready.

For the long range reader at the exterior overhead door, we’ll use a Nedap reader that can read a special credential at distances up to 33 feet away. That way, the door can be opened without leaving the comfort of the truck.

Thanks for joining me on this physical security journey for our new building. We are really excited to create a showpiece of security layers and technologies.

Please stop by this summer to see everything we’re integrating to create a holistic security stance!

How does a security integrator design their own security systems? (Part Two)

By Neal Bellamy, IT Director at Kenton Brothers

In our last story, we designed an intrusion system for the new building. Now we need to design the other security systems including the network infrastructure security and capacity. Then we’ll look at different camera technologies and their uses.

You’re only as strong as your foundation:

All of our systems use the IT network as a foundation. It can often be overlooked and can easily be the weakness of any security system. We need to design a good, solid foundation so that the rest of the security systems can do their job.

VelociraptorThere’s been a lot of press lately about systems being hacked. Multiple companies and products are continually being tested (like an electric fence in the velociraptor cage). The easiest and most secure way of protecting the devices from testing is to separate them from the herd. By taking all the security devices and giving them their own network, and then channeling all network access through computers of your choosing, you seriously limit the devices that can be attacked. The IT Security industry called this idea the “Attack Surface”.

Limiting Access with Network Configuration

We’ll accomplish separating the network with VLANs, or Virtual LAN. A separate physical network is also acceptable. After we separate the networks, we will place rules into effect in our firewall between the networks to prevent anyone from the internet getting directly to the cameras or access control controllers. While we’re at it, we’ll prevent the computers inside Kenton Brothers from getting directly to those devices too. If you need to get to the cameras, you have to go through the Video server. As a result, the attack surface has been reduced to just the video and access servers. Of course, you still need to use best practices for security on individual devices. All of your camera passwords should be unique and strong, firmware should be updated, etc., but we’ve added another layer of defense.

Network Speed

Now that the network is secure we need to make sure it is fast enough. Most people take for granted that their network is fast enough. Most office activity is relatively slow and not much strain on the network. Every business is different, but our servers range from .2 Mbps to 3 Mbps of network utilization throughout the day.

A single 5MP camera, depending on the frame rate and compression, might run close to 7-12 Mbps and that traffic might be used all the time. It doesn’t take too many cameras to bottleneck a gigabit switch or a server with only one network connection. By the way, like the speedometer on your car, just because the top speed is 1 Gigabit, or 1,000 Mbps, doesn’t mean your switch will actually go that fast. Real world results will vary.

Testing your network and server is always advised. I estimate that our 27 cameras will consume about 150-200 Mbps of bandwidth and will need about 20TB of storage based on 40% motion. A couple of 24 port gigabit switches will work for us. I’ll still make sure the server has at least two network cards, one to receive the camera streams, and one to serve video to the clients. While our access controllers will also be on the network, bandwidth is hardly ever a concern for them. They can comfortably ride on the same network as the video.

The right tool for the job

Next, we need to start picking cameras. We always believe you should pick the best camera for the job. While that might mean all of your cameras come from the same manufacturer, it’s not always the case. There are a few challenges we need to overcome in the new building. One is Wide Dynamic Range.

Wide Dynamic Range Cameras

We’ve talked about WDR before, it’s the ability of the camera to see where there is both bright light and dark shadows in the same view. This impacts us the most when the camera is inside, but looking outside. Overhead doors, glass entrances, and parking garages all fit into this category. We need to make sure that the cameras that are looking outside have strong WDR. Most manufactures offer multiple tiers of WDR. Typically the better WDR cameras are on the higher end.

Thermal Cameras

We also have an area behind the building that is hidden from view. It’s pretty dark out there, so it might be a good application for some thermal imaging. Thermal cameras use temperature rather than light for the image. It is great at detecting things, but not so great for identification. In our case, we’ll use it to sound an alarm when there is activity after hours. Adding lighting is just as important as picking a good camera, so we will do that as well. The lights won’t hinder the detection of the thermal camera, and will give other cameras a better image, so it’s a win/win.

Analytic Cameras

In areas that no one should be in after hours, we’ll deploy some analytic cameras. There are various levels of analytics, some detect groups of pixels in an area or crossing a line, but Avigilon actually classifies the object into categories like Person, Vehicle and other. This makes it easier to reduce false alarms due to swaying trees or a random cat walking into our field of view.

We’ll deploy those cameras in the back of the building and high-value areas inside where we want to be notified of unusual activity.  Analytic cameras can also be connected to monitoring centers, who can receive notifications and respond to any events.  It’s worth noting here that analytics are awesome, but you have to have a good procedure to follow too. Having an area where no one should be is much easier to manage than “only if the guy looks suspicious”

This gives us a good start on our security infrastructure and video security. Next time, we’ll talk about access control and intercoms!