Improving safety at healthcare facilities

1 August 2019 Editor's Choice, Surveillance, Healthcare (Industry)

Every South African healthcare facility must provide reasonable security to create and maintain a safe atmosphere to protect the lives and property of the staff, patients and visitors. This generally entails a varying degree of deployment of security officers and installation of CCTV.

However, the security measures in place at healthcare facilities are routinely called into question following incidents of abuse, violence or theft.

The reality is that healthcare facilities can be doing more to protect their staff, patients and members of the public. One such solution is Active Eye, Active Track’s articial intelligence software. By using Active Eye, an IP camera with as little as 2 MP can be used as a camera analytics system. When implemented correctly, the software transforms into a virtual employee or controller who is permanently on duty managing your healthcare facility.

What sets Active Eye apart from other analytics systems is the articial intelligence software itself. The articial intelligence learns the patterns and movements of persons and vehicles on site, and views and patrols your site on an uninterrupted basis. Where multiple cameras are in use, the feeds from all cameras are analysed simultaneously. Unlike a human, Active Eye does not sleep, take breaks or miss any potentially suspicious activities.

During its site analysis, if the software detects an activity that is out of your site’s ordinary events or times, it will send an image of the unusual activity to a human operator to determine whether the unusual event is actionable or not. At this stage, appropriate steps will be taken, such as notifying the control room and on-site security ocer to investigate the potentially suspicious activity on site, at the precise location pinpointed by the camera. With Active Eye, what constitutes abnormal on site is an absolute. The controller’s function is therefore limited to managing the exceptions.

The outcome is that suspicious activities cannot be missed. Moreover, they can be detected before they occur, thereby empowering the relevant persons to stop the occurrences before they transpire. The result is a substantially safer environment, without any capital expenditure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...