Integrated solution for hospital

November 2012 Integrated Solutions

Nestled at the foot of the Outeniqua mountains the town of George is the heart of the world-renowned Garden Route. Likewise, the George Hospital serves as a regional hospital for the southern Cape and Karoo regions as well as a district hospital for the town of George itself.

In 1918 the community of George started thinking about building a hospital. This idea was triggered by a flu epidemic that had swept over the country. Twelve years later the hospital opened with 10 beds and three staff members. Today, the 266-bed George Regional Hospital provides specialist healthcare to the population of the southern Cape and Karoo regions, totalling 550 000 inhabitants

Even though UTCFS’s fire detection system was installed at the hospital, no other security systems were present. Thus, there was a constant risk of theft from the hospital and of patients and visitors entering restricted areas.

The George Regional Hospital wanted to install an access control system without hampering the flow of patients and staff. A large number of staff members also needed access to specific areas in the hospital at certain times.

UTCFS recommended its Alliance management software, an integrated security platform that incorporates its existing fire detection system. This enables integration of fire detection, access control, intrusion and video into one easy-to-use graphical package.

Using access rights, the hospital grants staff and patients movement as appropriate. The flexibility of the system also makes it easy to effectively change staff’s access rights, for example, if they switched from a day shift to a night shift or vice versa.

By integrating the 95 camera video system into the Alliance platform, security staff tracks visual incidences via the access log, producing detailed stored information of the user with just a single click.

The existing fire network was also integrated into the Alliance graphical user interface enabling integration with other security systems like Alliance. Consequently, when a fire would occur, the relevant emergency doors would automatically open. All in all, the hospital integrates all the tiers of security to produce an efficient, autonomous, user-friendly security management platform.

For more information contact UTC Fire & Security, +27 (0)11 579 7300, [email protected], www.utcfireandsecurity.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...