10 August 2012

Impro’s new IXP220 ideal for protection of medical facilities

Vulnerable to a range of crimes, including assaults on personnel and the theft of drugs, equipment and confidential patient information, modern medical facilities are a challenge to secure.

However, with the launch of Impro’s new IXP220 access control system, hospitals and clinics can enjoy an unprecedented level of security, says Ingo Mutinelli, national sales manager for Elvey Security Technologies.

Lauding the new arrival in Elvey’s stable of cutting-edge security products, Mutinelli says the IXP220 is the answer to the need to secure premises with multiple doors and a steady stream of people in and out of the buildings.

“Today’s medical facilities are characterised by restricted areas, wards, offices and a host of doors as well as the constant movement of employees and patients.  Just controlling the doors and medicine cabinets, let alone the hundreds (if not thousands) of employees who have different duties in different areas with different hours of work, is a major headache for management,” he says.  “This is exacerbated by ongoing incidents and attacks on personnel such as happened at a hospital in Mpumalanga in 2011, when a patient stabbed Dr Senzosenkosi Mkhize in the chest and then a security guard who tried to intervene.  There is an urgent and growing need to safeguard medical facilities as well as to restrict access to medicine storage cupboards and carts, computers, medical records, ambulances and even parking lots.”

The answer to this complex security challenge, believes Mutinelli, lies in the new IXP220, which is designed to track, in real time, the movements of tag holders.  The largest of its three models can control up to 256 anti pass-back door systems as well as accommodate up to 10 000 tags and 100 000 buffered transactions per controller. 



Among the IXP220’s many impressive features is its Tracker application.  Explains Mutinelli: “When a tag holder either a patient or a hospital employee accesses a monitored location, a pop-up message will appear on the computer notifying of the event.  The same will happen in the event that a tracked tag holder accesses any location.”


The Tracker feature, which runs in the PC's system tray and is controlled by an operator username and password, can monitor up to 10 tag holders per site.

Another important feature of the IXP220 is the Archive utility.  “Typically the access, status and alarm transactions take up the most space in the database,” says Mutinelli.  “Large databases can slow the entire system down because reports have to filter through all the transactions just to obtain the required data. The Archive utility moves unused transactions to a blank database for archival purposes, thereby speeding up the system.”

Second generation intelligence

The iTI and iTRT models boast second generation intelligence, supporting full, off-line validation and utilizing onboard memory which allows the door controllers to store information on tag holders. 


Door Mode Patterns, Access Groups and Tag Expiry Data add an additional tier of redundancy to the already robust system.  “This has been developed to maintain system operability should communication be lost between the system controller and the door controller,” he explains.  The onboard memory allows for 10 000 buffered transactions per fixed address, ensuring that the system’s data capturing integrity is maintained even while offline.

The Base Application allows for the configuration of User Data Protocol (UDP) output directly from controllers.  Mutinelli says this has streamlined the communication process by allowing a unicast message to be broadcast to a third party device directly from the system controller, rather than the message having to be sent to the engine first.  The transaction message can now be broadcast even when the engine is not running or communications between it and the system controller are interrupted.

Email enrolment

Another nifty feature of the IXP220 is that tag holders can be enrolled on the system via email.  “Pre-arranged visitors, such as those making supply deliveries to the hospital are considered to be the highest risk, hence the creation of this particular feature, which makes it possible for the administrator to monitor and manage visitors at the touch of a button,” he says. 


An additional security proviso is that the feature has to be enabled and assigned a password before a tag holder enrolment form can be requested from the base application via e-mail. Once the form has been completed, a response e-mail is generated and sent to the base application.  The conditions on the form will allow for the creation of either a new tag holder without a tag, or a tag holder with a personal access code.   

Real time reporting

The feature-rich IXP220 also offers real-time reporting.  Accordingly, says Mutinelli, reports can be requested from the base application via e-mail, which will in turn send a response email with the requested reports in PDF format.





Prepared and submitted by Priyesh Jagjivan

Elvey Security Technologies

Tel: (011) 401 6700



Elvey Marketing