Improving safety at healthcare facilities

1 August 2019 Editor's Choice, Surveillance, Healthcare (Industry)

Every South African healthcare facility must provide reasonable security to create and maintain a safe atmosphere to protect the lives and property of the staff, patients and visitors. This generally entails a varying degree of deployment of security officers and installation of CCTV.

However, the security measures in place at healthcare facilities are routinely called into question following incidents of abuse, violence or theft.

The reality is that healthcare facilities can be doing more to protect their staff, patients and members of the public. One such solution is Active Eye, Active Track’s articial intelligence software. By using Active Eye, an IP camera with as little as 2 MP can be used as a camera analytics system. When implemented correctly, the software transforms into a virtual employee or controller who is permanently on duty managing your healthcare facility.

What sets Active Eye apart from other analytics systems is the articial intelligence software itself. The articial intelligence learns the patterns and movements of persons and vehicles on site, and views and patrols your site on an uninterrupted basis. Where multiple cameras are in use, the feeds from all cameras are analysed simultaneously. Unlike a human, Active Eye does not sleep, take breaks or miss any potentially suspicious activities.

During its site analysis, if the software detects an activity that is out of your site’s ordinary events or times, it will send an image of the unusual activity to a human operator to determine whether the unusual event is actionable or not. At this stage, appropriate steps will be taken, such as notifying the control room and on-site security ocer to investigate the potentially suspicious activity on site, at the precise location pinpointed by the camera. With Active Eye, what constitutes abnormal on site is an absolute. The controller’s function is therefore limited to managing the exceptions.

The outcome is that suspicious activities cannot be missed. Moreover, they can be detected before they occur, thereby empowering the relevant persons to stop the occurrences before they transpire. The result is a substantially safer environment, without any capital expenditure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.