Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside the Business: My Turn: John McDonald’s Upgrade Mission

July 1, 2006
“We had to get buy in from IT – marking a different way of doing business,” said John McDonald.


Security Magazine profiles John McDonald, director of security at Northside Hospital, with facilities in Atlanta.



Security Magazine: Describe Northside Hospital: overall, as well as your background.


McDonald: My business mission is to secure a 455-bed community-based hospital with a primary focus on Women’s Services by a combination of officers, policies, procedures and technologies. With more than 1,700 physicians serving more than 300,000 patients annually, Northside Hospital provides medical services on multiple campuses in North Metro Atlanta. It ranks first in the nation among community hospitals in the number of babies delivered annually. I have been in the healthcare industry for 20 years, 16 in service to Northside Hospital.



Security Magazine: What is a key to your business success when integrating security technologies into your business?


McDonald: In that time we have partnered exclusively with one systems integrator (Securitas Security Systems, Norcross, Ga.). The benefits and upside of this decision continue to pay dividends to this day.



Security Magazine: Describe the challenges and goals your team faced when deciding on an upgrade.


McDonald: The biggest challenge or decision we were faced with had to do with existing wiring. Do we use what we have and limit the cost or do we completely rewire our campus? We decided to go with new wiring based on Project Engineer Glenn Vickery’s recommendations. Glenn also explained the value engineered benefits of a new access control and integrated security system.



Security Magazine: Describe who else within your organization worked with you and your systems integrator and the existing infrastructure you are using.


McDonald: We had to get buy in from our IT department. It marked a different way of doing business for us at the time. We were crossing into and sharing IT infrastructure for the first time. Due to the quality of the product proposed and flawless execution by my systems integrator, it was and has been a positive experience. Other than that, we worked with facility services to pull cable.



Security Magazine: Describe the business benefits of the new installation.


McDonald: Our primary interface is with the Hugs Infant Protection System. The system design integrates access control, security video and infant protection. We are the largest birthing hospital in the country and our integrated infant protection system has to be flawless. Flawless execution is often sold and rarely executed; we have the best of both.



Security Magazine: Describe what you feel are the benefits to your customers.


McDonald: My customers are primarily internal. The benefits were evident immediately in that we increased processing speed via the new system. Its reliability has virtually eliminated errors and non-performance issues.



Security Magazine: What’s in the future?


McDonald: We will see an expansion of the facility in terms of satellite campuses and would like to control multiple campuses from a central location. I believe we are right on track.

Northside Hospital’s John McDonald worked with its systems integrator to upgrade its Hugs Infant Protection System to cover doors and elevators using Lenel panels and special readers covering the Women’s Center.

SIDEBAR: Successful Strategy: An Integrated Upgrade

Serving his business, John McDonald, director of security at Northside Hospital, worked with his long-time systems integrator to bring in a Lenel Access Control System that interfaces to Northside’s unique Hugs Infant Protection System by delivering access, security video and infant protection. Started in 2002, among Hugs key features are active monitoring and cut band technology. According to integrator Securitas Security System’s Brent Anderson, “We seek to understand their needs and business from their point of view, not ours. The end result has been a long-term relationship built on trust and confidence.”















Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Inside the Business: My Turn: Scott Maxson

    See More
  • My Turn: Breaking the “Mystery” of Investigations Success

    See More
  • My Turn: Planning’s the Integration Key

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • November 13, 2025

    Inside the 2025 Security Benchmark Report

    ON DEMAND: The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing