Improving safety at healthcare facilities

1 August 2019 Editor's Choice, Surveillance, Healthcare (Industry)

Every South African healthcare facility must provide reasonable security to create and maintain a safe atmosphere to protect the lives and property of the staff, patients and visitors. This generally entails a varying degree of deployment of security officers and installation of CCTV.

However, the security measures in place at healthcare facilities are routinely called into question following incidents of abuse, violence or theft.

The reality is that healthcare facilities can be doing more to protect their staff, patients and members of the public. One such solution is Active Eye, Active Track’s articial intelligence software. By using Active Eye, an IP camera with as little as 2 MP can be used as a camera analytics system. When implemented correctly, the software transforms into a virtual employee or controller who is permanently on duty managing your healthcare facility.

What sets Active Eye apart from other analytics systems is the articial intelligence software itself. The articial intelligence learns the patterns and movements of persons and vehicles on site, and views and patrols your site on an uninterrupted basis. Where multiple cameras are in use, the feeds from all cameras are analysed simultaneously. Unlike a human, Active Eye does not sleep, take breaks or miss any potentially suspicious activities.

During its site analysis, if the software detects an activity that is out of your site’s ordinary events or times, it will send an image of the unusual activity to a human operator to determine whether the unusual event is actionable or not. At this stage, appropriate steps will be taken, such as notifying the control room and on-site security ocer to investigate the potentially suspicious activity on site, at the precise location pinpointed by the camera. With Active Eye, what constitutes abnormal on site is an absolute. The controller’s function is therefore limited to managing the exceptions.

The outcome is that suspicious activities cannot be missed. Moreover, they can be detected before they occur, thereby empowering the relevant persons to stop the occurrences before they transpire. The result is a substantially safer environment, without any capital expenditure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.