Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside the Business: My Turn: John McDonald’s Upgrade Mission

July 1, 2006
“We had to get buy in from IT – marking a different way of doing business,” said John McDonald.


Security Magazine profiles John McDonald, director of security at Northside Hospital, with facilities in Atlanta.



Security Magazine: Describe Northside Hospital: overall, as well as your background.


McDonald: My business mission is to secure a 455-bed community-based hospital with a primary focus on Women’s Services by a combination of officers, policies, procedures and technologies. With more than 1,700 physicians serving more than 300,000 patients annually, Northside Hospital provides medical services on multiple campuses in North Metro Atlanta. It ranks first in the nation among community hospitals in the number of babies delivered annually. I have been in the healthcare industry for 20 years, 16 in service to Northside Hospital.



Security Magazine: What is a key to your business success when integrating security technologies into your business?


McDonald: In that time we have partnered exclusively with one systems integrator (Securitas Security Systems, Norcross, Ga.). The benefits and upside of this decision continue to pay dividends to this day.



Security Magazine: Describe the challenges and goals your team faced when deciding on an upgrade.


McDonald: The biggest challenge or decision we were faced with had to do with existing wiring. Do we use what we have and limit the cost or do we completely rewire our campus? We decided to go with new wiring based on Project Engineer Glenn Vickery’s recommendations. Glenn also explained the value engineered benefits of a new access control and integrated security system.



Security Magazine: Describe who else within your organization worked with you and your systems integrator and the existing infrastructure you are using.


McDonald: We had to get buy in from our IT department. It marked a different way of doing business for us at the time. We were crossing into and sharing IT infrastructure for the first time. Due to the quality of the product proposed and flawless execution by my systems integrator, it was and has been a positive experience. Other than that, we worked with facility services to pull cable.



Security Magazine: Describe the business benefits of the new installation.


McDonald: Our primary interface is with the Hugs Infant Protection System. The system design integrates access control, security video and infant protection. We are the largest birthing hospital in the country and our integrated infant protection system has to be flawless. Flawless execution is often sold and rarely executed; we have the best of both.



Security Magazine: Describe what you feel are the benefits to your customers.


McDonald: My customers are primarily internal. The benefits were evident immediately in that we increased processing speed via the new system. Its reliability has virtually eliminated errors and non-performance issues.



Security Magazine: What’s in the future?


McDonald: We will see an expansion of the facility in terms of satellite campuses and would like to control multiple campuses from a central location. I believe we are right on track.

Northside Hospital’s John McDonald worked with its systems integrator to upgrade its Hugs Infant Protection System to cover doors and elevators using Lenel panels and special readers covering the Women’s Center.

SIDEBAR: Successful Strategy: An Integrated Upgrade

Serving his business, John McDonald, director of security at Northside Hospital, worked with his long-time systems integrator to bring in a Lenel Access Control System that interfaces to Northside’s unique Hugs Infant Protection System by delivering access, security video and infant protection. Started in 2002, among Hugs key features are active monitoring and cut band technology. According to integrator Securitas Security System’s Brent Anderson, “We seek to understand their needs and business from their point of view, not ours. The end result has been a long-term relationship built on trust and confidence.”















Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Inside the Business: My Turn: Scott Maxson

    See More
  • My Turn: Breaking the “Mystery” of Investigations Success

    See More
  • My Turn: Planning’s the Integration Key

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • The Complete Guide to Physical Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products

Events

View AllSubmit An Event
  • November 13, 2025

    Inside the 2025 Security Benchmark Report

    ON DEMAND: The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing