Source Security

Optimizing hospital security with identity management software

Need for security must be balanced with the individual's need to easily move about the hospital


In a hospital, the need for security must be balanced with the individual’s need to easily move about the facility, according to an article on the Source Security website. 

Intelligent and purpose-built software can provide a solution to address these concerns and can add depth to the hospital’s overall administrative safety and security operation, the article said.

Automated physical identity and access management (PIAM) software is gaining traction in healthcare facilities. PIAM, integrated with IT, can ensure immediate updated physical access privileges for each person.

PIAM aids security reinforcement by providing a means to create an identity in the hospital’s IT system for every individual in the facility. Visitors can be vetted by visitor management operators via display of a friends and family list. Once on site, visitors can be tracked. 

Read the article.

 



August 27, 2014


Topic Area: Safety


Recent Posts

AI Usage for Healthcare Facilities

People in all industries are finding more use cases for artificial intelligence.


Ground Broken on Pelican Valley Senior Living Modernization Project

It is expected to reach completion in early-mid 2027.


All-Electric UCI Health – Irvine Hospital Set to Open

The 144-bed facility will be the nation’s first all-electric acute care hospital, serving the residents of coastal and south Orange County.


The Rising Strategic Value of Owner's Reps in Healthcare

The role of the owner’s representative has evolved beyond project advocate to strategic campus planning consultant.


Lawrence Group Designs Pair of Ignite Medical Resorts in Missouri

They combine cutting-edge physical rehabilitation with the indulgence of a 5-Star hotel.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.