Enriching access control management

October 2010 Access Control & Identity Management, Healthcare (Industry)

Vanilla access control technologies can be extended to add value to healthcare environments.

Hospital security is experiencing a major review. Generally acknowledged as an open, customer­focused environment, the changing demographics of hospital visitors is driving security managers to re-assess existing security systems and capabilities.

Gallagher Security offers a new concept in security management with Identity Analytics. Delivered via the Cardax FT access control system, Identity Analytics provides a high degree of control and certainty by ensuring the right people are in the right place at the right time. The system asks, ‘Does this person requesting access have the correct training for this area, are they licensed or competent and therefore compliant with regulations?’ If the answer is no, access is denied and system operators are alerted to exceptions. This greatly mitigates the risk of accidents, theft and corporate liability.

Regulatory compliance with every decision

What was once considered a security access control decision can now be thought of in broader terms as a business workforce enablement decision.

Bi-directional information flow between business systems, overlaid with policy and its effect at the point of entry delivers an ongoing impact throughout the organisation. As rules are set, managers are assured that organisational and regulatory policy is automatically enforced. The effect on day-to-day operations can be felt on the ground by every employee – they have the assurance that their co-workers are fit for work and their working environment is safe. Encouraging news for an environment facing an increase in threats from external factors such as third party assaults, domestic violence or general theft.

Activity of employees can be monitored and measured through a real-time audit trail. This unprecedented transparency means business decisions can be adjusted and actioned quickly in response to their effect. Traditionally, if a person is denied access they have little or no understanding as to the reason. They are left with the frustration of having to report their situation to their manager or security personnel. Identity Analytics provides intelligent access control decisions communicated in a meaningful way on distributed hardware at the door. Staff can be warned via a door reader screen of any upcoming expiry of their licences or competencies, so they can proactively address these issues and prevent them from becoming an impediment to their access. For example, a nurse can be denied access to specialised equipment stores if they have not completed the appropriate training. If denied access, staff are immediately informed of corrective action they should take in order to have access to an area re-instated.

Controlled flexibility

As well as enforcing compliance with business and regulatory policy under a normal operational situation, exceptions can be accommodated, for example, in emergency situations certain staff need access to areas they otherwise could not access, others need to be kept out and a full audit trail of all access events is required. The ability to accommodate exceptions means personnel flow and safety are optimised, no matter what the situation.

Identity Analytics ensures a company’s safety, security, compliance and regulatory policies are enforced before breaches occur. It provides the ability to enforce healthcare providers’ safety and security processes via intelligent access control decisions on distributed hardware ‘at the door’. Enforcement at the mercy of on an online server is now a thing of the past.

Traditionally, this level of functional sophistication has been available only to those with significant ERP (enterprise resource planning) infrastructure. Gallagher, with Cardax FT, is enabling any size healthcare provider to benefit from this functionality. Implementation is at the organisation’s pace through staged rollouts, utilising standard Cardax hardware, and on the Cardax FT system through software upgrades.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.