Managing hospital visitors with video intercoms and visitor management systems

October 4, 2019

Current security industry best practices call for a combination of video intercoms and visitor management systems at main entries as the most effective and efficient way to screen and identify visitors, according to an article on the Campus Safety website.

Campus buildings – clinics, offices, labs, treatment centers and other facilities – are often connected to the hospital by walkways and tunnels creating multiple entries to protect. 

Visitors can be screened at a single unlocked public entry for each building entry. That could require multiple visitor management stations to prevent long lines. It might not be possible to staff lesser-used entries. 

Software can manage an unmanned system, while a vestibule with a locked door blocks entry into the building until the background check is complete and an officer in the security operations center uses a video intercom to approve the person and remotely unlock the entry.

Read the article.

See the latest posts on our homepage


Topic Area: Security

Recent Posts
Recent Posts

Swedish hospital reports patient showing signs of Ebola

The hospital has launched an investigation and isolated patient


Art in healthcare facilities can support good outcomes

Art helps to manage pain. Several studies have found that patients' pain levels are reduced by art


Exploring biggest maintenance challenges healthcare facilities

The focus of the maintenance team should be on creating an environment that continuously supports the best delivery of each of these priorities


New Hawaiian hospital to have almost 500 security cameras

A new building for the state’s only psychiatric hospital is currently under construction


California hospitals powered by generators during power outages

A total of 248 hospitals were located in areas where power was turned off


Post Comment


News & Updates • Webcast Alerts • Building Technologies

All fields are required.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.