Medically secure

June 2011 Access Control & Identity Management, Healthcare (Industry)

CEM Systems secures King Khalid University Hospital, Saudi Arabia.

CEM Systems, part of Tyco Security Products, announced that the CEM AC2000 SE (Standard Edition) security management system has been chosen to secure access to King Khalid University Hospital, Saudi Arabia. The contract was awarded to CEM Approved Reseller, Best InfoTech Solutions.

The dedicated university hospital opened in 1982 provides 800 patient beds, over 20 operating rooms and fully equipped/staffed laboratories. The university hospital contains a special outpatient building and provides primary/secondary care services for Saudi patients. The university prides itself on preparing excellent doctors for the future and believe education of medical students, interns and residents go hand­in-hand with patient care.

“The CEM AC2000 SE system was our first choice on this project”, said Marwan A. Khater, director of sales and marketing, Best InfoTech Solutions. “With it being installed in numerous facilities around the world, we knew it was a reliable and flexible system that would suit our customers’ need. CEM was very supportive throughout the project; no request was too much, allowing the project to run smoothly.”

“The CEM AC2000 SE system offers King Khalid University Hospital a powerful and fully integrated security management system that is an ideal solution where security is of paramount importance,” said Andrew Fulton, business development director for CEM products. “AC2000 SE software offers a collection of security applications that enhance security and customer operations including AC2000 AED (alarm event display) and AC2000 VIPPS (visual imaging and pass production system)”. King Khalid University Hospital has integrated the AC2000 SE system with a fire alarm system to control all hospital emergency exits. The integration will increase efficiency as it will release the doors automatically for evacuation.

AC2000 VIPPS will allow security personnel at the hospital to produce permanent and temporary ID Badges for medical staff, intern students, residents and other individuals who may access the building regularly. The hospital can then personalise these badges by including their own logo, background image and badge text fields.

AC2000 alarm event display (AED) module enables security to view a graphical and textual representation of the status of the entire AC2000 system. AED responds to all alarm situations in real-time, therefore if a door is forced at an access point such as the pharmacy, an alarm will trigger on the AED screen, allowing security to respond quickly to the event.

The AC2000 Access Levels application will also allow security personnel to link cardholders to access groups eg, resident doctors may be in a higher access group to first year medical students. Resident doctors may have access to certain areas, such as the pharmacy, that first year medical students or research students working in a laboratory will not.

The King Khalid University Hospital installation utilised CEM eDCM 300 (intelligent two-door controllers). The DCM 300 controllers are designed to interface third-party read heads with the AC2000 system and feature an internal database, which stores cardholder records at the door. This means that even if communication is temporarily lost between the DCM 300 controller and the AC2000 SE server, the controller will continue to validate cards ensuring a zero system downtime policy.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycoacvs.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...