Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Innovation Applications

By Bill Zalud
February 24, 2003
No matter how you define security integration, numerous organizations are tying together diverse security equipment in ways that are both innovative and practical. This first in a series of Innovations articles stress applications and technology breakthroughs.

Street Patrols and Defibrillators

Security executives and police officers know that not all medical emergencies happen in convenient locations. Medtronic Physio-Control just introduced a rugged automated external defibrillator (AED) called the LIFEPAK 500 DPS. The new AED has been tested to military specifications to operate at higher altitudes and withstand shock, vibration, dust, fog and salt.

There are success stories due to AEDs. Take Mari Ann Wearda, for example. She is alive today because the policeman responder was equipped with an AED in his patrol car. She collapsed from a sudden cardiac arrest while pulling up to a stoplight at an intersection of two highways.

More than 350,000 LIFEPAK devices have been distributed worldwide. The LIFEPAK 500 DPS is fully compatible with LIFEPAK defibrillator/ monitors, used by 80 percent of the emergency medical services.

Says Gregory Dunnavant, MD, medical director of the California Highway Patrol, “Sudden cardiac arrest is an extremely time-critical and usually fatal emergency to which law enforcement officers are frequently the first responders. Police-deployed AEDs have saved lives, and with intelligent implementation of this technology by police agencies, I believe many more lives can be saved.”

According to a study in the medical journal, Circulation, when Miami-Dade County police were equipped with AEDs, response time was cut by almost three minutes and survival rates nearly doubled from 9 percent to 17 percent. A joint position statement by the International Association of Chiefs of Police and the International Association of Fire Chiefs endorsed the use of AEDs by law enforcement personnel. According to Bill Pratt of Medtronics, AED use adds only an hour to basic training or can be conducted through a refresher course.

ID with Hand Biometrics

About 500 users at Troy Beaumont Hospital in Michigan use Recognition Systems’ HandKey readers to positively identify users by the shape and size of their hands to control access to high-security areas. All employees, including doctors, nurses, administrators and housekeeping staff, use the biometric readers.

Instead of verifying a card or code, the HandKey reader verifies the person who is at the entrance. Users enter their unique ID number on the HandKey’s keypad and present their hands to gain entry. Since implementing the biometric solution, Beaumont Hospital has realized a significant improvement in accountability.

“We wanted a system that would provide a higher level of security to prevent entry by unauthorized individuals,” says Beaumont Hospital’s Chris Hengstebeck, director of security and parking and its safety officer. “We primarily use hand geometry readers instead of card readers because they provide both high security and ease of access for our physicians.”

The HandKey readers are networked to a Software House Secure 800 system. Hengstebeck can program the HandKeys as well as his proximity and magnetic stripe systems. At a moment’s request, he can query the system to see who has been at a specific HandKey reader and when.

Sensor, Tripod, Monitor in Integrated Detection Package

Thousands of MilPAC 385 portable intrusion detection transceivers from Southwest Microwave are actively protecting U.S. soldiers and temporary military installations worldwide. These relocate-able sensors fit a wide variety of applications to guard perimeters and vital assets. The transceivers act as the technological equivalent of perimeter sentries and handle extreme weather conditions.

“Everything’s in one package,” says Gus Fitch of Southwest Microwave. “The MilPAC 385 sensor weighs about 45 pounds and it’s single-ended so one person can set it up relatively easily. Just pull out the tripod, point the sensor in the right direction and you’re about done.” The MilPAC 385 consists of a microwave sensor, a light, heavy-duty aluminum tripod and a monitor package. The monitor package consists of a radio frequency (RF) unit to transmit alarms, a meter for sensitivity testing and a rechargeable battery. All of the equipment fits into a fiber carrying case for convenience and rapid deployment.

Integrating Video and the Web

At Kutter Pet Care Center, security video has gone to the dogs and cats

Using the VB-C10 network camera from Canon U.S.A. Inc., a subsidiary of Canon Inc., the facility for pets monitors its patients around the clock with computer-based viewing from down the hall or miles away via the Internet.

“We went with the VB-C10 because we needed a clear, concise picture where we could zoom right down to a toenail,” says Lori Kutter, hospital administrator of Kutter Pet Care. “Our critical care units are four across and three high. The flexibility of the camera allows us to look into each individual unit.”

Total remote control is through VBAdministration Tools software. Adds Kutter, “The camera system we picked had to be easy to use, and I can just click on it on my desktop and it’s right there. Plus, service is a big issue for us, and Canon has a reputation for reliability. We know we will be supported.” With a built-in Web server and FTP server for instant connectivity to the Internet or a LAN, the camera is the all-in-one solution for live, interactive imaging. With 16X optical zoom and sophisticated pan, tilt and zoom control, it can transmit live images up to 30 frames per second. The network camera offers a panorama creation tool, 8 preset angles, image capture and storage along with the ability to transmit video to 20 clients simultaneously.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Passengers purchase the RFID bag tags which provide convenience and unique services for passengers as well as operations data for airlines.

    Just How Versatile is RFID Technology?

    See More
  • ip feat

    Measuring the Next Step in IP-Based Access Control

    See More
  • RFID: The 'Almost Everything' Tool

    RFID: The 'Almost Everything' Tool

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!