Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesAccess Management

Video management within healthcare: Adding value across the enterprise

By Maggie Shein
medical-563427_1920
August 13, 2021

Healthcare organizations must keep staff, patients and visitors safe, while dealing with the public and situations of heightened emotions on a daily basis. Add a worldwide health pandemic into the mix such as COVID-19, and healthcare organizations – particularly hospitals and emergency rooms – are now seeing more traffic and an increase in violence and escalated situations.

The U.S. Department of Justice, which collects incidents of workplace violence, says mental health professionals and medical practitioners experience some of the highest rates of workplace violence in the U.S. Though many healthcare organizations at the start of the COVID-19 pandemic saw fewer patients and visitors, that was quickly reversed as the virus spread and hospitals have allowed visitors back through their doors.

Increased risks have led many healthcare organizations to place a greater emphasis on physical security solutions, says Chris Sessa, Director – Key Accounts at Salient Systems. In addition to an increased emphasis on security from healthcare stakeholders, significant security technology improvements, open architecture platforms and improved integration capabilities with video management systems (VMS) have led to a myriad of possible solutions ideally suited for the healthcare sector. These solutions can allow security leaders to boost safety and improve efficiency, while adding overall value to the entire organization.

“We are seeing more integrations than ever in this space, which provide more security and allow the organization to prove operational value and cost savings in a bigger way,” says Sessa.

Some of the integrations tied to the VMS that Sessa is seeing in the healthcare space include medical equipment and asset tracking, intelligent door hardware, infant abduction systems, nurse/staffing panic or call buttons, gun detection systems, weapons detection screening, and analytics such as hand-hygiene tracking, license recognition within parking lots, and facility mapping.

Converging data from individual technologies under one platform has obvious benefits, not the least of which is greatly improved situational awareness. For instance, with intelligent door hardware, an infant abduction system and video surveillance under the VMS platform, operators can pull up maps, data and video clips all tied to an event in near real-time to quicken incident response time and pinpoint response procedures.

“A lot of what is driving these integrations is there is much more happening within the hospitals and healthcare facilities than ever before and it has exploded that need for deeper information,” Sessa says.

Getting that deeper information and ensuring the organization can capitalize on the benefits of a connected solution, however, require healthcare security leaders to make some key considerations:

Flexibility and Scalability. As Sessa explains, more healthcare organizations are finding value in their VMS by expanding use of its data to other non-security departments, so a system with flexibility and scalability is crucial. For example, night-shift medical employees can check parking lot surveillance before leaving at night; supervisors can track medication dispensing systems such as Pyxis tied to access and video data; and management can monitor on-floor security staff activities.

Implementing a VMS that allows organizations the flexibility to dole out specific access, views and reports based on role and responsibility can increase the value of any VMS. Likewise, a scalable system allows the organization to implement new technologies and integrations as it grows to garner more value and optimize operations.

Simplicity. Having a single pane view of security technologies and systems is beneficial to any security staff or non-security staff alike navigating a VMS. Having a VMS that is user-friendly and simple to use is essential to cut down on training time. In addition, many modern VMSs have the ability to ping or notify security staff and operators when an event occurs, cutting down on operator fatigue that can come from staring at a video wall for hours at a time.

Open Platform. Not only is an open platform essential for easier integrations at any organization, but in the healthcare space, as organizations expand or take over other locations, disparate systems across facilities are particularly common. With an open VMS platform, healthcare organizations can integrate different access control systems and different camera brands all under one view, Sessa says, saving the organization from ripping and replacing everything at once.

Processing and Bandwidth. In hospitals and healthcare organizations where electronic and networked equipment spans far beyond security technology, having a full-scale VMS that doesn’t take up too much processing power and bandwidth is critical. For this reason, many organizations look for dynamic resolution scaling or the ability for the VMS to only send video when needed, eliminating constant processing of high-resolution video that can overwhelm an organization’s networks.

By paying attention to these considerations for a VMS, healthcare security leaders and other stakeholders can reap the benefits of today’s continually improving security technologies by providing greater situational awareness and keeping frontline employees and staff safer and more secure.

KEYWORDS: video management video management system (VMS)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing