An Indispensable Role

An Indispensable Role

Why single source technology integrations join during early phases of construction of hospitals and clinics

Today, there is significant increase in the number of hospitals, clinics and outpatient centers that are being built or remodeled across the country, in part due to the rise in demand for healthcare from an aging population and more access to health insurance. To accommodate this rapid growth, however, requires a sophisticated level of technology integration that goes beyond brick-and-mortar construction to the design and installation of networking, communications, electronic record-keeping and patient/staff security systems.

As a result, the healthcare industry is increasingly turning to single source technology integrators during the earliest phases of construction that can design, install and manage an integrated package of systems while coordinating with other more traditional aspects of construction.

AN INTEGRAL WHOLE

Integration, defined on dictionary.com as “an act or instance of combining into an integral whole,” can be a somewhat vague concept because the combination of parts can be unending, while each individual solution is specific to the application.

What is known is that the best integrators are those that have an extensive knowledge of the available products and component parts of any system and are able to connect them together in a manner that extracts significant added value. In other words, the “whole” [a properly integrated system] should be much greater than the sum of its parts.

In healthcare, with new construction booming, integration has taken on new meanings as well. To start, technology integration in new hospital, medical group or clinic construction now encompasses an array of options from network IT and Wi-Fi access points, to access control systems, physical security cameras, alarms, VoIP phones, nurse call systems and environmental and temperature monitoring – to name a few.

Then, there is integration of effort and coordination with other aspects of new construction when installing such systems.

COORDINATING WITH THE GENERAL CONTRACTOR

Technology integration, it turns out, is not covered under the umbrella of the general contractor. That means technology integrators, often hired by building owners, must coordinate and integrate their efforts with the general contractor and associated plumbers, electricians, drywall installers, painters and other tradesmen in a side-by-side effort.

In addition, technology integrators often coordinate with healthcare company personnel tasked with overseeing specific aspects of the installation, whether environmental control managers, IT staff or physical security experts.

In short, any integration – if not properly coordinated, scheduled and executed with accommodations for last minute changes, etc. – can be a nightmare for those responsible for managing the overall effort and all the contractors.

To avoid this scenario, healthcare companies are turning to single source companies that not only can handle the full array of technologies, but can do so down to the installation of the low voltage wiring, cabling, conduit trays, wireless antennas, hubs, electronic equipment racks and even the locks on the exit doors.

“By working with a single source technology provider that offers a menu of technology offerings, there is an advantage of having a single point of contact for overall system design, installation, management and support,” says Eric Brackett, President of BTI Communications Group, a technology convergence provider serving the healthcare, logistics and aerospace sectors.

Brackett said that this can save healthcare organizations significant time and money in technology consultation, along with saving “a lot of aggravation and headaches” related to managing construction staff.

EVOLVING TECHNOLOGYINTEGRATION

Traditionally, voice, data, network and physical security system purchases have been made independently. Security cameras and access control systems, for example, are implemented by security integrators, while VoIP phone systems are installed by telecom providers. In this approach, each vendor offers a proprietary solution with little consideration as to how it will be converged with other aspects of the network.

However, integration of these applications during new construction or remodeling can offer immediate significant revenue, security, and savings to a healthcare organization’s bottom line, Brackett said.

“If you go to a traditional vendor in commercial security, VoIP or even IT, they may try to interest you in products that are currently promoted,” says Brackett. “It might not end up being a fully operational solution to the business problem they are attempting to solve.”

“Some vendors may not comprehend the full integration potential and so are not able to go the extra mile to deliver advanced functional capabilities that are built into the system,” Brackett said.

For example, an access control system can be integrated with the HR database to coordinate changes in employee status such as termination, to automatically activate or deactivate an employee keycard. If that same employee has remote access to the security cameras, the network can disable the account immediately.

MANAGING COSTS

Although technology integrators sound like a high-end service with a commensurate price tag, that is not the case. An integrated approach to IT with the best-of-breed solutions on the market delivers economies of efficiency and scale that are often passed on to the customer.

When engaging with a managed IT service provider, Brackett says it is also important that customers know what they are paying for with contracts that clearly spell out each installed product, feature, and support item or service they are purchasing.

Technology integrators should bear the cost of providing an initial assessment of their needs. The bid should itemize the costs for equipment and support. The vendor should anticipate future upgrade paths in order to provide transparency to future expenses. In this way, a customer knows their initial, ongoing and upgrade costs and can budget accordingly.

“Pricing transparency was a big factor in our telecom system purchase decision,” said Brett Stephen, director of information systems at Heart Care Centers of Illinois, a 5-center network of cardiovascular clinics, who selected BTI as their telecom partner. “In 14 years of supporting our telecom needs, we have not once been surprised by pricing even as we have upgraded features and added reporting tools.”

ONGOING IT MANAGEMENT AND SUPPORT

It is important to note also that the role of the technology integrator does not end once the system is installed. Proactive monitoring should be employed, so that the system actively oversees technology performance to identify anomalies even before a malfunction occurs. Problems are addressed proactively often without the customer even knowing about it. When site visits are required, the monitoring system dispatches an engineer without interrupting the customer.

“Our 24-hour monitoring system sends me alarms by email, text, and phone. I am always in the know whether I am at work or remote, and I only have to deal with one vendor,” says Charles Lomboy, Director of Physical Plant Management at Los Angeles- based AltaMed, a 46-site health clinic network that serves nearly 1 million patient visits annually. The company uses BTI networks for CCTV, access control and burglar alarms.

With a proactive model, far fewer healthcare IT resources are used. This minimizes the impact on daily operations and enables an IT department to focus on the core business rather than babysitting systems for lower level network needs.

This article originally appeared in the July / August 2020 issue of Security Today.

Featured

  • Facing Facts for Facilities

    Despite the proliferation of constantly evolving security solutions, there remains a troubling trend among many facility operators who often neglect the most important security assets within their organization. Keys and shared devices like radios, laptops and tablets are crucial to successful operations, yet many operators are managing them haphazardly through outdated storage systems like pegboards and notebooks. Read Now

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.