<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>EMA Archive - NOX SYSTEMS | Security beyond limits</title>
	<atom:link href="https://noxsystems.com/en/category/ema-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://noxsystems.com/en/category/ema-en/</link>
	<description></description>
	<lastBuildDate>Mon, 27 Oct 2025 16:27:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</title>
		<link>https://noxsystems.com/en/increased-risks-for-kritis/</link>
					<comments>https://noxsystems.com/en/increased-risks-for-kritis/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 13:45:53 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10471</guid>

					<description><![CDATA[<p>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well? Torsten Hiermann: "The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: "We are not at  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1" style="--awb-text-color:#000000;"><p><strong><em>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> &#8220;The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: &#8220;We are not at war, but we are no longer at peace either.&#8221; Malicious manipulation is no longer a marginal phenomenon but rather a strategic method of disrupting economic, political, and social processes. The office for the protection of the constitution and the federal office for civil protection define this approach as deliberately impairing or destroying structures to weaken or influence them. This is not just about &#8220;classic&#8221; attacks on buildings, but also subtle attacks, such as disruptions to supply chains, targeted espionage, manipulation of public perception, and spreading uncertainty to influence political decision-making or encourage anti-state attitudes.</p>
<p>Therefore, the perpetrator landscape is broad. According to police statistics, left-wing extremist groups in particular tend to carry out attacks on infrastructure and provide instructions on how to build incendiary devices online. We also see state actors working through &#8220;proxies,&#8221; or recruited helpers who appear inconspicuous at first but are actually pursuing foreign interests. We must also not underestimate the danger from within. Employees who are frustrated or feel unfairly treated can become saboteurs.</p>
<p>Additionally, we are now dealing with hybrid threats. These attacks are not only physical, such as cutting a cable or attacking a transformer station, but also combine cyberattacks, social engineering, and classic physical attacks. Perpetrators intercept data, manipulate processes, or use social media to obtain information. That&#8217;s why I say the protection of objects doesn&#8217;t end at the fence.</p>
<p><em><strong>You mentioned the importance of information. Could you elaborate on that?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> Many people underestimate how valuable publicly available information is to a potential attacker. Social media profiles often reveal interesting information: For example, LinkedIn profiles often reveal not only where someone works, but also the projects and technologies they are involved in. This information is an excellent recruitment and evaluation tool for external services. The fact that Google Earth can be used to evaluate the initial vulnerabilities of a location is nothing new.</p>
<p>Added to this is careless handling of internal information. For example: In a critical infrastructure facility, tradespeople and service providers are given a detailed site plan with corresponding facility designations as part of their safety training. This provides potential perpetrators with precise information for planning an attack. This illustrates that protection against saboteurs also requires preventive information protection. What data should I publish? How restrictive should I be when naming contact persons? Is there a social media policy? How do I educate employees so they understand they are part of the security chain?</p>
<p><em><strong>Drones have recently come into focus as a security risk. How do you see the role of airspace in the overall concept?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> The threat posed by drones has reached a new dimension. They can film, collect reconnaissance data—for example, on processes or response times—record digital signatures, and transport objects and &#8220;weapons,&#8221; which they can drop. The war in Ukraine has shown how rapidly technology and its applications are advancing.</p>
<p>Nevertheless, I advocate a differentiated approach. Not every company needs to invest in expensive anti-drone systems right away. The key factor is risk analysis. A &#8220;normal&#8221; production facility without drones poses a lower risk than an energy supplier, chemical plant, airport, or military property, for example. In particular, KRITIS operators must now &#8220;take airspace into account&#8221; in their security concepts.</p>
<p>Remember that drones often complete their task before being detected. Therefore, the key questions are: How do we detect drones, and how do we respond to them? Rather, the security concept must be thought out from the perspective of the perpetrator. What information will a drone be able to see and access? How can that be prevented &#8220;on the ground&#8221;?</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img fetchpriority="high" decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-2 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p>&#8220;Comprehensive protection is not just about defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.&#8221;</p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-3" style="--awb-text-color:#000000;"><p><em><strong>What specific countermeasures do you recommend in terms of organization and technology?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It&#8217;s about a holistic approach. First, the organizational side: prohibitions on filming and photography on company premises, employee training, and checking vehicles and people for items they are carrying. Access controls must also be reliable and effective. Depending on the level of protection, this may involve biometric procedures. In short, if I don&#8217;t check at the gate to see if a service provider is bringing in something undesirable, I don&#8217;t need to worry about drones above.</p>
<p>Technically, we have a wide range of options, including perimeter sensors, video surveillance, motion detectors, and tamper-proof devices. Drone detection systems can also be useful. In critical areas, active defense measures, such as jammers or interceptor drones, may be considered. At the same time, however, it&#8217;s important to consider resilience, such as redundant power supplies, emergency generators, and secure supply chains. Business continuity is always part of overall protection!</p>
<p><em><strong>What role does integrated alarm and security management play in this context?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> A crucial one. We can introduce as many individual measures as we like, but if they are not integrated, we will end up with a patchwork again. To create an effective 360-degree security concept, all vectors must be taken into account.</p>
<p><em><strong>Does that mean that, in the future, all companies—not just KRITIS operators—will have to address attacks more intensively?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It depends on the risk analysis and the level of protection. A medium-sized mechanical engineering company may not face the same threats as a network operator. However, they can still be crippled by physical or IT attacks. Just think of cyberattacks, disrupted supply chains, or power outages. Production at the Tesla Gigafactory was crippled not by a highly complex operation but by a simple arson attack on a supply line. So, the question is, &#8220;How vulnerable am I?&#8221; How resilient are my processes? Have I taken precautions to remain operational in the event of an attack or minimize damage?</p>
<p>This is precisely why business continuity is important. Comprehensive protection is about more than just defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-10471-1"><div class="fusion-panel panel-default panel-dd1174c726c71b95d fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_dd1174c726c71b95d"><a aria-expanded="false" aria-controls="dd1174c726c71b95d" role="button" data-toggle="collapse" data-parent="#accordion-10471-1" data-target="#dd1174c726c71b95d" href="#dd1174c726c71b95d"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="dd1174c726c71b95d" class="panel-collapse collapse " aria-labelledby="toggle_dd1174c726c71b95d"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CrisisConsult, a consulting firm that specializes in crisis and security management. He advises companies, local authorities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis management teams. Torsten is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. He is also an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and the potential threat are proportionate.<br />
www.criseconsult.de</p>
</div></div></div></div></div></div></div></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left" style="--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);--awb-item-margin-bottom:40px;" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:rgba(255,255,255,0);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper link-area-link-icon link-type-text content-icon-wrapper-yes icon-hover-animation-fade" data-animationOffset="top-into-view"><div class="heading icon-left"><a class="heading-link" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self"><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:24px;--fontSize:24;line-height:1.4;">NOX SYS</h2></a></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Systems like NOX SYS integrate intrusion detection technology, access control, video surveillance, and alarm management onto one platform. This allows events to be recorded and evaluated holistically and targeted measures to be initiated. NOX SYS is EN 50131 Grade 3 certified and suitable for use in KRITIS environments. The modular system can easily be supplemented with new technologies, such as drone detection. Additionally, encrypted communication between components and a high level of tamper protection ensure manipulation is detected and prevented.</p>
</div><div class="fusion-clearfix"></div><a class=" fusion-read-more" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self">Read More</a><div class="fusion-clearfix"></div></div></div><div class="fusion-clearfix"></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/increased-risks-for-kritis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Signal to Action: Rethinking Alarm Management</title>
		<link>https://noxsystems.com/en/rethinking-alarm-management/</link>
					<comments>https://noxsystems.com/en/rethinking-alarm-management/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Tue, 20 May 2025 12:05:07 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[360-degree security]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure Security]]></category>
		<category><![CDATA[intrusion detection system]]></category>
		<category><![CDATA[KRITIS-Sicherheit]]></category>
		<category><![CDATA[security system integration]]></category>
		<guid isPermaLink="false">https://noxsystems.com/alarmprozesse-in-der-praxis/</guid>

					<description><![CDATA[<p>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-4" style="--awb-text-color:#000000;"><h5>Intrusion detection systems are often the first technical component of a security infrastructure, but without an effective alarm management process, they remain limited in their effectiveness. In a fully integrated, 360-degree security approach, it is essential to combine detection, evaluation and response to create a seamless process. This is the only way to avoid fragmented solutions and manage security efficiently.</h5>
<h5>Torsten Hiermann of CriseConsult explains how intrusion detection can be embedded into an effective alarm management strategy, and why regular alarm drills are a frequently overlooked success factor.</h5>
<p><em><strong>How should effective alarm management be incorporated into a 360-degree security framework, and how can it prevent the development of isolated solutions?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>In military settings, we use the term &#8216;actionable intelligence&#8217;, which means: Information must be reliable and timely enough to be processed and acted upon. In this context: There is no such thing as a 360-degree security approach without functional alarm management. What use is precise detection if the downstream structures don&#8217;t work? The process begins with planning a system that aligns with the defined protection level. Only then can the technical components be considered. Most importantly, detection must be linked to predefined actions, whether technical, such as building automation, or organisational, such as deploying security personnel.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-2 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-5 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>“If the alarm chain fails as a single point of failure, the entire process behind it loses its effectiveness.”</em></p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-6" style="--awb-text-color:#000000;"><p><em><strong>What are the most common weaknesses of intrusion detection systems, particularly in critical infrastructure environments?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>The issue rarely lies with the technology itself. The challenge lies in ensuring that detection leads to action, ideally in the form of timely intervention. However, when personnel are required to respond on site, security teams quickly reach their limits. Response times and available manpower are key constraints. Intruders don’t wait. Therefore, their movement patterns must be tracked and relayed in real time to internal responders. Ideally, their movement should also be restricted, for example via lockdowns. This is technically feasible, but requires investment. This brings us back to the point that technical capabilities must be aligned with risk assessments. Let me add this: Alarm management deals with what happens after an incident is detected. However, the ultimate goal should always be to prevent – or at least delay – the incident from happening in the first place.</p>
<p><em><strong>Can intrusion detection systems actually increase risk, for example by triggering false alarms?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>Even the best systems can be rendered ineffective by poorly coordinated processes. Frequent false alarms can reduce situational awareness. Consider, for instance, a fire alarm that goes off every week – people will eventually stop reacting. Reliability is paramount: if your system triggers unnecessary alarms, the real ones may be overlooked. This undermines the entire subsequent response process.</p>
</div><div class="fusion-text fusion-text-7" style="--awb-text-color:#000000;"><p><em><strong>So, how can modern technologies like AI-based detection improve alarm management?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>We’re seeing rapid technological advances, especially in AI. This is already shaping security systems. Behaviour-based video analytics is one example. Predictive policing is another example. In short, the earlier a threat is detected, even in its early or potential phase, the sooner you can respond or take preventive action. That’s the good news. The bad news is that bad actors are evolving too. Modern technologies are powerful tools. However, they should never replace physical protection, but rather enhance it.</p>
<p><em><strong>How important is regular testing of alarm procedures (e.g., alarm drills) for the real-world effectiveness of a security concept?</strong></em></p>
<p><strong>Torsten Hiermann: </strong>That’s easy to answer – with Benjamin Franklin: <em>“If you are failing to prepare, you’re preparing to fail.”</em> Special forces train. So do emergency physicians, pilots, security teams, and industrial site operators. Alarm drills are among the easiest exercises to conduct – and yet, if the alarm chain fails as a single point of failure, the entire response process collapses. In short: practice matters.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8632-2"><div class="fusion-panel panel-default panel-02d3bd6797c7e8dfd fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_02d3bd6797c7e8dfd"><a aria-expanded="false" aria-controls="02d3bd6797c7e8dfd" role="button" data-toggle="collapse" data-parent="#accordion-8632-2" data-target="#02d3bd6797c7e8dfd" href="#02d3bd6797c7e8dfd"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="02d3bd6797c7e8dfd" class="panel-collapse collapse " aria-labelledby="toggle_02d3bd6797c7e8dfd"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CriseConsult, a consulting firm that specializes in crisis and security management. He advises companies, municipalities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis response teams. He is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. Additionally, he is an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and potential threat are proportionate. www.criseconsult.de</p>
</div></div></div></div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/rethinking-alarm-management/">From Signal to Action: Rethinking Alarm Management</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/rethinking-alarm-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Securing a Hospital</title>
		<link>https://noxsystems.com/en/securing-a-hospital/</link>
					<comments>https://noxsystems.com/en/securing-a-hospital/#respond</comments>
		
		<dc:creator><![CDATA[Niklas_Schroeder]]></dc:creator>
		<pubDate>Thu, 05 Dec 2024 15:48:22 +0000</pubDate>
				<category><![CDATA[Access control]]></category>
		<category><![CDATA[All-in-one management]]></category>
		<category><![CDATA[Case studies]]></category>
		<category><![CDATA[EMA]]></category>
		<category><![CDATA[Integration]]></category>
		<category><![CDATA[SIMS]]></category>
		<guid isPermaLink="false">https://noxsystems.com/securing-a-hospital/</guid>

					<description><![CDATA[<p>Fast Facts  The goal was to build a large, scalable security system while replacing the old system without disrupting hospital operations. On the one hand, the hospital needed integrations for the pneumatic tube system, the laundry system and the elevators (KONE). On the other hand, it needed a system that could handle special  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/securing-a-hospital/">Securing a Hospital</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Fast Facts</h4></div><div class="fusion-text fusion-text-8" style="--awb-text-color:#000000;"><p>The goal was to build a large, scalable security system while replacing the old system without disrupting hospital operations. On the one hand, the hospital needed integrations for the pneumatic tube system, the laundry system and the elevators (KONE). On the other hand, it needed a system that could handle special requests, either as a solution in the native system or as an external application.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_4 1_4 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Solutions Used</h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/#einbruchmeldesysteme"><span class="fusion-button-text">Intrusion Detection System</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/#zutrittskontrolle"><span class="fusion-button-text">Access Control</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-3 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/#allinonemanagement"><span class="fusion-button-text">All-in-One Management</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-4 fusion-button-default-span fusion-button-default-type button_nopointer" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/en/security-solutions/#integrationen"><span class="fusion-button-text">Integrations</span></a></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_4 1_4 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">NOX Products</h4></div><div ><a class="fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-5 fusion-button-default-span fusion-button-default-type" style="--button_accent_color:#000000;--button_border_color:#000000;--button_accent_hover_color:var(--awb-color7);--button_border_hover_color:var(--awb-color7);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color1);--button_gradient_bottom_color_hover:var(--awb-color1);--button_padding-top:0px;--button_padding-right:0px;--button_padding-bottom:12px;--button_padding-left:0px;" target="_blank" rel="noopener noreferrer" href="https://noxsystems.com/wp-content/uploads/2024/11/240902_Onepager_DE_Nox_Printfile_CMYK_rendered80.pdf"><span class="fusion-button-text">NOX SIMS</span><i class="fa-arrow-right fas button-icon-right" aria-hidden="true"></i></a></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Overview</h4></div><div class="fusion-text fusion-text-9" style="--awb-text-color:#000000;"><p>Skåne Region is investing heavily in the expansion and modernization of security solutions at Helsingborg Hospital. Helsingborg Hospital has been under renovation since 2015. It was important for the region to have a transparent and efficient system that meets the hospital&#8217;s high security requirements.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Challenge</h4></div><div class="fusion-text fusion-text-10" style="--awb-text-color:#000000;"><p>The task was to improve care and the working environment, and to create an emergency hospital that would be ready for the changing needs of the future. The new hospital should be flexible with an infrastructure that can grow with the times.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Solution</h4></div><div class="fusion-text fusion-text-11" style="--awb-text-color:#000000;--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);"><p><span data-contrast="auto">Region Skåne has chosen the NOX System as the new intrusion detection and access control system for the hospital. The main reasons are the flexibility of the system, the ability to integrate with other systems in the organization, and a scalable system architecture without recurring licensing costs. </span></p>
<p><span data-contrast="auto">In the hospital, the NOX System was installed in both the old and new buildings, along with card readers, Simons Voss radio doors on the medicine cabinets, and locking cylinders from the same manufacturer on the medicine carts. </span></p>
<p aria-level="4"><strong><i>NOX SIMS &#8211; a threat detection system for all areas</i> </strong></p>
<p><span data-contrast="auto">The overarching NOX SIMS platform tracks all users in conjunction with the hospital&#8217;s schedules, from which alarm and access control systems can be controlled. NOX SIMS is also integrated with the hospital&#8217;s other systems, including elevator control and the pneumatic tube system. </span></p>
<blockquote>
<p><i><span data-contrast="auto">&#8220;We chose NOX because we wanted an open system with the capacity for large facilities. The system is very flexible and we were able to influence the development, which was a requirement from the beginning,&#8221; says Tord Johansson, operations expert at Region Services.</span></i></p>
</blockquote>
<p aria-level="4"><strong><i>Unique codes for card readers &#8211; practical security solutions for hospitals</i> </strong></p>
<p><span data-contrast="auto">ARAS Security and Swedsecur also provided a one-time code solution for the hospital&#8217;s card readers. This solution arose from the need for staff to escort and grant access to visitors and patients between departments. The solution, a web application developed by ARAS Security, allows staff to easily create temporary codes tailored to the individual visitor. </span></p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Result</h4></div><div class="fusion-text fusion-text-12" style="--awb-text-color:#000000;"><p><span data-contrast="auto">ARAS Security continues to work on the digitalization of the hospital and together with Swedsecur has developed integrations between the NOX Systems and the hospital&#8217;s pneumatic tube, waste and laundry systems. Integration with the elevator system is also planned. </span></p>
<blockquote>
<p><i><span data-contrast="auto">&#8220;We were really able to show how powerful NOX is as an open system and how good it is to develop integrations and other technical solutions for our customers ourselves.</span></i> <i><span data-contrast="auto">We prefer to start with the customer&#8217;s needs rather than the technical requirements of the system. This ensures that our development is relevant and that the end result is always better. Both Region Skåne and Swedsecur have challenged us in a good way, and I have the feeling that everyone is satisfied so far,&#8221; says Victor Siösteen, CEO of ARAS Security. </span></i></p>
</blockquote>
<h2 class="fusion-responsive-typography-calculated" style="--fontsize: 32; line-height: 1.4;" aria-level="2" data-fontsize="32" data-lineheight="44.8px"></h2>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:24px;margin-bottom:24px;width:100%;"><div class="fusion-separator-border sep-single sep-solid" style="--awb-height:20px;--awb-amount:20px;--awb-sep-color:#d2d2d2;border-color:#d2d2d2;border-top-width:1px;"></div></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-text-color:#000000;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">About ARAS</h4></div><div class="fusion-text fusion-text-13" style="--awb-text-color:#000000;"><p><span data-contrast="auto">ARAS Security is a recognized, value-added distributor of physical security and building management products. ARAS provides comprehensive support, development and project management to large companies and installers in the Nordic region. The ARAS product range includes the NOX integrated security system, key boxes, CCTV, card readers and much more. <a href="https://aras.dk">www.aras.dk</a></span></p>
</div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/securing-a-hospital/">Securing a Hospital</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/securing-a-hospital/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
