Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside the Business: My Turn: John McDonald’s Upgrade Mission

July 1, 2006
“We had to get buy in from IT – marking a different way of doing business,” said John McDonald.


Security Magazine profiles John McDonald, director of security at Northside Hospital, with facilities in Atlanta.



Security Magazine: Describe Northside Hospital: overall, as well as your background.


McDonald: My business mission is to secure a 455-bed community-based hospital with a primary focus on Women’s Services by a combination of officers, policies, procedures and technologies. With more than 1,700 physicians serving more than 300,000 patients annually, Northside Hospital provides medical services on multiple campuses in North Metro Atlanta. It ranks first in the nation among community hospitals in the number of babies delivered annually. I have been in the healthcare industry for 20 years, 16 in service to Northside Hospital.



Security Magazine: What is a key to your business success when integrating security technologies into your business?


McDonald: In that time we have partnered exclusively with one systems integrator (Securitas Security Systems, Norcross, Ga.). The benefits and upside of this decision continue to pay dividends to this day.



Security Magazine: Describe the challenges and goals your team faced when deciding on an upgrade.


McDonald: The biggest challenge or decision we were faced with had to do with existing wiring. Do we use what we have and limit the cost or do we completely rewire our campus? We decided to go with new wiring based on Project Engineer Glenn Vickery’s recommendations. Glenn also explained the value engineered benefits of a new access control and integrated security system.



Security Magazine: Describe who else within your organization worked with you and your systems integrator and the existing infrastructure you are using.


McDonald: We had to get buy in from our IT department. It marked a different way of doing business for us at the time. We were crossing into and sharing IT infrastructure for the first time. Due to the quality of the product proposed and flawless execution by my systems integrator, it was and has been a positive experience. Other than that, we worked with facility services to pull cable.



Security Magazine: Describe the business benefits of the new installation.


McDonald: Our primary interface is with the Hugs Infant Protection System. The system design integrates access control, security video and infant protection. We are the largest birthing hospital in the country and our integrated infant protection system has to be flawless. Flawless execution is often sold and rarely executed; we have the best of both.



Security Magazine: Describe what you feel are the benefits to your customers.


McDonald: My customers are primarily internal. The benefits were evident immediately in that we increased processing speed via the new system. Its reliability has virtually eliminated errors and non-performance issues.



Security Magazine: What’s in the future?


McDonald: We will see an expansion of the facility in terms of satellite campuses and would like to control multiple campuses from a central location. I believe we are right on track.

Northside Hospital’s John McDonald worked with its systems integrator to upgrade its Hugs Infant Protection System to cover doors and elevators using Lenel panels and special readers covering the Women’s Center.

SIDEBAR: Successful Strategy: An Integrated Upgrade

Serving his business, John McDonald, director of security at Northside Hospital, worked with his long-time systems integrator to bring in a Lenel Access Control System that interfaces to Northside’s unique Hugs Infant Protection System by delivering access, security video and infant protection. Started in 2002, among Hugs key features are active monitoring and cut band technology. According to integrator Securitas Security System’s Brent Anderson, “We seek to understand their needs and business from their point of view, not ours. The end result has been a long-term relationship built on trust and confidence.”















Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Inside the Business: My Turn: Scott Maxson

    See More
  • My Turn: Breaking the “Mystery” of Investigations Success

    See More
  • My Turn: Planning’s the Integration Key

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • November 13, 2025

    Inside the 2025 Security Benchmark Report

    ON DEMAND: The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing