ISC West
Artificial Intelligence Technology Solutions, Inc., through its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced expanded industry recognition for SARA™, the Speaking Autonomous Responsive Agent. SARA is prominently featured in the May/June 2025 issue of Security Today magazine, where the cover story explores AI’s growing role in transforming traditional security roles. Alongside the editorial coverage, a full-page ad introduces SARA’s c...
“Secutech 2025” kicked off at the Taipei Nangang Exhibition Centre. To celebrate its 25th anniversary, the pioneering security solution provider VIVOTEK Inc. has chosen the theme “MAKE TOMORROW EASIER, TODAY!” to showcase groundbreaking innovations in AI and cloud technology. One of the highlights is VIVOTEK’s new AI-powered cloud surveillance platform, VORTEX, which created a buzz at ISC West in April. Now, it’s on display at Secutech, where visitors can exp...
Suprema, a pioneer in AI-powered access control and security solutions, officially announced the launch of BioStar Air, the first and only cloud-based access control platform designed to natively support biometric authentication. Featuring true zero-on-premise architecture, BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings. Cloud-based access control First showcased at ISC West 2025, BioStar Air sets a new standard for cl...
With over 29,000 attendees walking the showroom floor, ISC West 2025 marked another eventful year for the security industry and a standout event for the Gallagher Security team. Gallagher’s booth was busier than ever before as attendees packed in to experience the manufacturer's latest innovations, reconnect with familiar faces, and engage in thoughtful conversations about what’s next for security. Gallagher’s security solution Changing attitude was exemplified by the...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime and catastrophe prevention, announces that the company was selected this month as one of three finalists for The Monitoring Association’s (TMA) 2025 Excellence Awards. The prestigious program nominated Elite for its highest honour, Monitoring Centre of the Year. The TMA Excellence Awards recognise any FM-Approved, Intertek/ETL or UL‐Listed monitoring centre a...
Mission 500, the security industry's non-profit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, ended ISC West 2025 on a high note with its annual awards ceremony, which celebrated individuals and organisations making a meaningful impact through service and philanthropy. The Mission 500 Awards Ceremony took place on Thursday, April 3rd, at The Bridge within the ISC West exhibit hall. This year’s Mission 500 Humanitarian Award was presented to...
ISC West news
Nanodems, a pioneering provider of Physical Security Information Management (PSIM) software, proudly presented its latest innovations at the ISC West 2025, drawing strong interest from security professionals, integrators, and enterprise customers. At this year’s event, Nanodems showcased two game-changing features of its critical event management platform: AI-Powered Health Check and security-focused digital twins, both designed to revolutionise the way organisations monitor and manage complex security environments. IT and security teams Health Check offers real-time insights into the operational status of all connected security devices Health Check offers real-time insights into the operational status of all connected security devices, including cameras, DVRs, access control units, and sensors. The intuitive dashboard provides instant visibility into device performance, offline status, and fault history, allowing IT and security teams to proactively resolve issues before they escalate. The newly introduced security-focused digital twin feature is a tool powered by 3D maps within the NDIS platform, offering users a completely visualised way to monitor their environments. Operators can navigate through floors, zoom into specific zones, and instantly view device statuses or trigger events. This spatial awareness enhances response times and supports faster decision-making during critical incidents. Integrated physical security management “Visitors were especially impressed with how easily they could identify issues with thousands of devices using our Health Check module, and how naturally they could navigate complex infrastructure with our 3D interface,” said Asli Citak, Marketing Manager at Nanodems. “These features align with our mission to make PSIM not just powerful, but also user-friendly and highly visual.” Nanodems continues to set the standard in integrated physical security management, enabling organisations in critical infrastructure, banking, transportation, and public safety to centralise operations, reduce complexity, and increase situational awareness.
The Physical Security Interoperability Alliance (PSIA) hosted a well-attended cocktail reception and live demonstration during ISC West 2025 to unveil its latest advancement: the PKOC 3.0 specification, an exciting solution for secure, open credentialing in physical access control systems. Jason Ouellette, Chairman of the PSIA and Corporate VP of Innovation and Technical Partnerships at ELATEC, led the presentation. He shared an overview of PKOC’s progress, key developments in the 3.0 release, and demonstrated a range of interoperable devices—including readers, cards, and mobile applications, built on the freely available, non-proprietary PKOC specification. Broad industry collaboration This year’s demonstration highlighted broad industry collaboration, with support and technologies provided by PSIA member companies including: ELATEC, EMSI, INID Readers USA, Johnson Controls, Kastle Systems, Last Lock, rf IDEAS, Sentry Enterprises, Taglio, and Universal Smart Card. There is a growing list of manufacturers actively supporting the PKOC specification, but these 10 companies showcased products at the event, highlighting its interoperability and real-world applications. Deloitte’s own proof-of-concept The project features PKOC certificates working seamlessly across readers, physical cards, and mobile devices At the reception, Jeff Longo, Director of Software Development at Kastle Systems, announced that the company will officially make the PKOC card its standard card offering—further solidifying its commitment to open, secure, and interoperable access control solutions. Keith Kelly, Chief Security Officer at Deloitte Canada, shared insights from Deloitte’s own proof-of-concept implementation of PKOC at its Toronto office. The project features PKOC credentials functioning seamlessly across readers, physical cards, and mobile devices. Kelly emphasised that PKOC represents “a new generation of access control,” aligned with Deloitte’s priorities around open, flexible, and secure credentialing. Simplicity, security, and scalability David Bunzel, Executive Director of the PSIA, noted, “PKOC is widely recognised as one of the most exciting solutions for secure credentials. Because it is based on an open specification, it is cost-effective—but just as important, it is secure and highly flexible.” Unlike many legacy credential technologies, PKOC is completely open source, with no fees, royalties, or membership requirements. Its simplicity, security, and scalability are fuelling growing interest across integrators, manufacturers, and enterprise users.
VIVOTEK (3454-TW), the pioneering security solution provider, celebrates its 25th anniversary by reaffirming its commitment to pioneering AI and cloud-based technologies. At ISC West—the largest international security technology expo in the western United States—VIVOTEK introduced the latest innovations in its cloud-based VORTEX platform and premiered a commemorative video marking 25 years of global impact. Smarter security with AI-powered search One of the key highlights at ISC West was the unveiling of AI-Hub, the newest addition to VORTEX One of the key highlights at ISC West was the unveiling of AI-Hub, the newest addition to VORTEX. This centralised platform integrates a suite of AI functions—Deep Search, Event Insight, Re-Search, and Case Vault—into a seamless user interface. Designed to simplify operations and improve response time, the AI-Hub enables users to swiftly identify incidents, track individuals or vehicles, and generate comprehensive event reports. VIVOTEK at user-centric AI innovation At the core of AI-Hub lies its Search by Text function, powered by a cutting-edge Vision-Language Model (VLM). This technology enables users to conduct video searches using natural, everyday language, eliminating the need for complex filtering or manual review. By linking video content with descriptive text input, VIVOTEK has created a more intuitive, accessible way to interact with surveillance data. The feature captured strong interest from both attendees and media during the expo, positioning VIVOTEK at the forefront of user-centric AI innovation. 25 years of innovation: From lab to global impact VIVOTEK premiered a point-of-view video titled, Journey Through the Lens To mark its 25th anniversary, VIVOTEK premiered a point-of-view video titled, Journey Through the Lens, which traces the company’s evolution from a small research team at National Taiwan University to a globally recognised brand in IP surveillance. The film revisits pivotal moments in VIVOTEK’s history, including its instrumental role in the dramatic 2010 Chilean mine rescue, where its technology helped locate and rescue 33 trapped miners. VIVOTEK reaffirms its mission The video also highlights the brand’s ongoing pursuit of innovation through AI and cloud technologies. Looking toward the next 25 years, VIVOTEK reaffirms its mission: to work hand-in-hand with global partners and employees to create a smarter, safer, and more connected world.
Hailo, the pioneering provider of edge AI processors, will demonstrate smart security cameras empowered by its vision processing units (VPUs) as well as video management systems empowered by its AI accelerators at ISC West 2025 in Las Vegas, Nevada at booth #31065 of the Venetian Expo. At the heart of Hailo’s showcase is its full suite of AI processors, including the Hailo-15 vision processors, which integrate seamlessly into pioneering security cameras to deliver superior image quality and real-time analytics. Generative AI applications Its powerful AI capabilities enhance image quality while also efficiently handling multiple complex classic and generative AI applications at full scale. Alongside them, the Hailo-8 and Hailo-10 AI accelerators, selected by the world’s top security brands, power video management systems and other next-generation applications that require high-performance AI at the edge. What’s possible in AI for security Hailo will also demonstrate some of the industry’s most advanced models running entirely on camera Pushing the boundaries of what’s possible in AI for security, Hailo will also demonstrate some of the industry’s most advanced models running entirely on camera, at low power and independent of cloud connectivity. Demonstrations include zero-shot classification for real-time image search and query, and Vision-Language Models (VLMs) for automatic video captioning. Visitors will be able to experience edge-deployed chatbots powered by LLMs such as DeepSeek-R1 operating offline and locally on-device, ensuring privacy and security without compromising on AI capabilities. Advanced video analytics “As AI continues to revolutionise security and surveillance, Hailo is at the forefront, delivering the most widely deployed edge AI processors to a vast community of thousands of developers,” said Orr Danon, CEO of Hailo. “By removing compute limitations, we are enabling smart cameras to feature both best-in-class image quality and advanced video analytics, making security systems more intelligent, efficient, and responsive than ever before.” Hailo’s leadership in edge AI Hailo’s leadership in edge AI is further reinforced by the cutting-edge solutions showcased in cooperation Hailo’s leadership in edge AI is further reinforced by the cutting-edge solutions showcased in cooperation with its partners at the booth. Demonstrations include a Digital Watchdog VMS integration, real-time facial anonymisation by AlgoFace, AI-powered crowd and drive-through monitoring for retail applications by AT&T and Capgemini, live video stream analysis using semantic segmentation on a Dell 3200 gateway, and a Deep Perception analytics solution running on an HP Engage Flex Mini G2 connected to a Milestone VMS, among others. Hailo’s processors unmatched AI performance Hailo’s processors deliver unmatched AI performance in terms of both power-efficiency and cost-efficiency, making it the go-to choice for security solutions providers, ranging from low-power smart cameras to large-scale video management systems. With hundreds of customers and tens of thousands of developers driving innovation on its platform, Hailo continues to set the standard as the #1 edge AI processor provider, powering the future of AI-driven security. To experience the next generation of edge AI in action, and for more information, visit the website and stop by Booth #31065 at ISC West 2025 between April 2 and April 4, 2025.
ISC West 2025, organised by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. ISC West innovations and ideas “ISC West truly showcased the power of innovation, connection, and collaboration within the security industry,” said ISC Event Vice President Mary Beth Shaughnessy. “From the groundbreaking technologies on display to the meaningful discussions in our education sessions and keynotes, this year’s event underscored the remarkable progress we’re achieving together as an industry. We are incredibly proud of the innovations and ideas shared here and look forward to building on this momentum for future ISC events.” ISC West trends and challenges ISC West broke new ground with its robust and grew SIA Education@ISC program, which opened one day ISC West broke new ground with its robust and expanded SIA Education@ISC program, which opened one day earlier to give attendees even more opportunities to connect and learn. With the largest slate of sessions to date, the program featured packed rooms and sparked lively discussions led by industry experts. The sessions addressed emerging trends and challenges, offering attendees valuable knowledge to apply within their organisations. SIA Education at ISC West conference program “ISC West 2025 was a tremendous success. I heard very positive feedback from our members and have seen a lot of excitement about this show this year,” said SIA CEO Don Erickson. “The SIA Education at ISC West conference program had record-breaking attendance and featured a robust array of insightful, engaging content from our speakers and instructors. SIA saw fantastic turnout at its events and offerings during the show, and attendees benefitted from the top-quality expertise shared by our speakers, at events ranging from lively tech debates to in-depth conversations on critical infrastructure and the return on security investment." "We were also thrilled to see great presence and enthusiasm at the show from the security practitioner community. SIA is proud to be the premier sponsor of ISC West each year and looks forward to offering even more at the show in 2026.” ISC West Keynote Series Microsoft’s education lead, Kate Maxwell, closed with an inspiring session on authenticity The ISC West Keynote Series brought powerful insights to the Main Stage, starting with Rachel Wilson, director of cybersecurity at Morgan Stanley Wealth Management, who explored the shifting cyber threat landscape. Day 2 featured Will Bernhjelm, vice president of security for Mall of America, giving a behind-the-scenes look at protecting a major retail hub. Microsoft’s worldwide education lead, Kate Maxwell, closed with an inspiring session on authenticity. The Main Stage transformed into a place of celebration on Wednesday evening, where attendees and exhibitors enjoyed a performance by Gin Blossoms at the ISC West Concert. SIA New Products and Solutions Awards Another standout moment was the prestigious SIA New Products and Solutions Awards. This distinguished program highlighted the latest security advancements. Another standout moment was the prestigious SIA New Products and Solutions Awards Vaidio’s Vaidio 9.0 AI Vision Platform earned the Best New Product Award, while Robotic Assistance Devices received the Judges’ Choice Award for SARA – AI Security Agent for Autonomous Threat Detection and Response. Each innovation reflected the industry’s commitment to staying ahead of evolving threats and delivering smarter, more efficient solutions. Experts from the cyber and physical security sectors With an expanded focus on cybersecurity and enhanced educational opportunities, ISC West 2025 introduced a new RSA @ISC: IT for Security Professionals track, in partnership with RSA, alongside its core education tracks. Among the many insightful sessions was “Two Worlds Colliding: How to Prevent Cyber-Physical Attacks,” held at The Bridge. This thought-provoking panel brought together experts from the cyber and physical security sectors to examine the power of collaboration in countering modern threats. Following the discussion, attendees had the opportunity to meet Deb Radcliff, cybercrime journalist and author, and receive signed copies of her thrilling novel, “Breaking Backbones: Information Is Power.” Later this year, ISC East 2025, the pioneering security event in the Northeast, will be held Nov. 18-20 at the Javits Centre in New York City.
ADI | Snap One is demonstrating its expansive portfolio at ISC West 2025 from April 2 – 4, at The Venetian Expo in Las Vegas, Nevada, USA. In Booth #12043, visitors can explore an assortment of technologies and solutions across multiple product categories, including security, video surveillance, automation, power, networking, remote management, data communications, fire and life safety, smart living, and more. ADI | Snap One exhibits at ISC West 2025 “As a combined business, we're focused on expanding our portfolio, enhancing our distribution capabilities, and accelerating our product innovation to ensure we meet the diverse needs of our customers,” said Marco Cardazzi, Senior Vice President (SVP), & Chief Marketing Officer, ADI Global Distribution. He adds, “At ISC West, we're excited to showcase our broad selection of products, including both our top-tier distributed brands and our own exclusive brands. This combination allows us to offer a comprehensive range of solutions, giving customers a variety of options that empower them to succeed.” ADI | Snap One’s 2025 product roadmap Attendees can get a first-hand look at ADI | Snap One’s 2025 product roadmap Attendees can get a first-hand look at ADI | Snap One’s 2025 product roadmap that includes a host of new innovations tailored to the evolving needs of security and integration professionals. Some of the technologies on display include: Control4 X4 ADI | Snap One is showcasing a significant milestone in customised control and automation – Control4 X4. This next generation of the Control4 experience for users will offer a refined interface that is designed to deliver enhanced personalisation of security and automation settings, richer engagement, and intuitive navigation, benefiting both end-users and integrators alike. Control4 X4 delivers a way to manage a smart home ecosystem with a streamlined Home Screen, curated and customisable Routines, and Widgets for quick access to key functions — whether across the entire home or in a single room. OvrC Pro Attendees can explore how the integration of the OvrC Pro remote monitoring platform with Control4 CORE and CA Controllers enhances system visibility and management within a complete Control4 ecosystem. This includes Luma X20 Series surveillance cameras, WattBox 820 Series power distribution units, and Access Networks Wi-Fi components — all of which feature native OvrC integration for seamless remote monitoring and control. Luma Surveillance ADI | Snap One evolves its Luma camera line to meet the growing security needs As surveillance technology continues to advance, ADI | Snap One evolves its Luma camera line to meet the growing security needs of both residential and commercial environments. The recent introduction of the new line of Luma 4K Hybrid cameras and the X20 Fisheye Camera delivers enhanced performance with versatile designs. The Hybrid 4K camera features Active Deterrence, which utilises built-in LED lights, a microphone, and a speaker to enhance security. These added security measures are powered by the camera’s advanced AI technology, allowing it to distinguish between people and vehicles and capture crucial, defining details like vehicle colour, and more. Araknis and Access Networks with OvrC Integration ADI | Snap One will showcase how the successful integration of OvrC remote monitoring with advanced Wi-Fi networking solutions from Araknis and Access Networks enhances efficiency for systems integrators while delivering a superior connectivity experience for customers. With OvrC, integrators can remotely configure, monitor, and manage home and business networks via the cloud, streamlining deployment and ongoing support. Outdoor Audio Surroundscape series is designed to deliver greater durability, scalability, and simpler installation Building on the legacy of Episode’s landscape speaker offering, Surroundscape series is designed to deliver greater durability, scalability, and simpler installation for outdoor environments. Episode Radiance, which combines audio and lighting on a single wire to create beautiful ambience for outdoor projects, will be on display, as well as Episode Extreme, a weatherproof indoor and outdoor speaker designed to withstand the toughest conditions. Mission 500 Security 5K/2K Run Additional distributed product brands on display in the booth will include Resideo, Honeywell Fire, Napco, Axis Communications, Pelco, HID, Yale, ProdataKey, eero, and more. In addition to activities on the show floor, ADI | Snap One is participating in the Mission 500 Security 5K/2K Run on Thursday April 3, helping to raise funds for children in need across the country.


Wise words
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organisers globally have cancelled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was cancelled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theatre offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local/national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions. Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business. Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices. From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets. At the top of the game While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees. The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.
ISC West attendees include physical and IT security professionals; dealers, installers, integrators, end-users (from various vertical markets), law enforcement/government officials, consultants, specifiers, architects, engineers, consultants, and more. Within the ISC brand, we are continuing to diversify and grow the number of attendees by attracting international visitors, as well as encouraging physical and IT/IoT teams to visit the show together. Our VIP programme, branded the ISC Executives' Club® programme, attracts the highest level attendees who have buying power for their organisation. Members include: high level end-users from government, education, healthcare, retail, casino gaming (and other verticals), national integrators (along with their End User customers), specifying security consultants, and independent dealers/installers with open projects and decision-making power. Some examples of Executive Club clients attending this year's event are the Department of Homeland Security, Apple, Google, San Francisco 49’ers, Sephora, AirBnB, and United Airlines, just to name a few. “We are so honored to have such dedicated and influential customers in our Executive Club programme. They are among the top thought leaders of the physical/IT security industry, and we are truly grateful for their loyalty to our event brand”, said Sharon Kelley, ISC Attendee Relations Manager. The show floor The show floor has six featured areas to mirror the evolution of the converged security industry. The areas include: Public Safety, Smart Home, Connected Security, Emerging Tech, Drones & Robotics, and (new for this year) Loss Prevention & Supply Chain. The Emerging Tech and Loss Prevention & Supply Chain areas will be located in the Venetian Ballroom, along with the International VIP attendee lounge, and Venetian Ballroom Theatre, which will feature complimentary Drone & Robotics and Loss Prevention education sessions, along with the Mission 500 5k run/2k walk awards ceremony. At the show, you’ll see a new ISC re-brand that has created more identifiable segments and will assist with easier show floor navigations for attendees.The ISC Executives' Club® programme attracts the highest level attendees There is never a shortage of special events at ISC West. Below are a few you won't want to miss: Charity Events (AIREF Golf Classic, Mission 500 5k run/2k walk) Awards Ceremonies (Sammy Awards, New Product Showcase Awards) Industry parties (SIA Market Leaders Reception, ISC West Customer Appreciation Party at TAO). These events are designed to enable attendees and exhibitors network with peers and forge new connections. Visit the ISC website for a list of all our Special Events taking place. Women in security SIA Women in Security Forum is thrilled to be hosting the second annual breakfast at ISC West In addition, the SIA Women in Security Forum is thrilled to be hosting the second annual breakfast at ISC West. “It’s great to see the security industry embrace this initiative and we hope signature events like this will continue to raise awareness of the importance of gender diversity as a competitive differentiator” states Kim Landgraf, SIA Liaison for the Women in Security Forum. This year’s breakfast will feature keynote speaker, Jaime Paris Boisvert, GM for Siemens Smart City Infrastructure. Jaime will share her insights on leading strategy, sales, and operations whilst working closely with clients to deliver solutions that optimise buildings and infrastructure by improving energy efficiency, comfort, safety, and security. Looking beyond ISC West this March, the ISC Security Events portfolio for 2020 also includes the Expo Seguridad event in Mexico City in April, ISC Brazil in Sao Paulo in June, and ISC East in New York City in November (co-located with Infosecurity North America).
ISC West has been on a strong momentum path over the last 3 years, and has evolved to a comprehensive and converged security event – covering the spectrum of physical security, public safety, cyber-physical convergence, IoT/connected security, emerging technologies such as AI and Lidar, and advanced detection technology. Its notion of 'comprehensive security for a safer, connected world' encompasses both the integration of key technologies along with the need for cross-functional teams collaboration – and themes of workforce development and diversity in security. Along with its premier sponsor SIA (Security Industry Association), a highlight of ISC West is the SIA Education @ ISC West conference programme. With over 80 sessions (via a paid conference pass) and high-profile keynotes (open to all badge types), the event provides a strong combination of education/training along with a large expo floor (over 300,000 of exhibit space) and a total of 30,000 expected attendees. Here are some examples: Day 1 Keynote: Wednesday, March 18, 8:30-9:30 a.m. Scaling Enterprise Risk Management at the Speed of Global Transportation Charles Burns, head of security – new mobility, Uber, will explain how Uber navigates a challenging landscape by using technology to enable their business, secure company assets and ensure the safety of riders and drivers globally. Day 2 Keynote: Thursday, March 19, 8:30-9:30 a.m. On the Edge of Transformation: Securing a Connected Future With IoTBrought to you by: Amazon Web Services (AWS) Michael MacKenzie, general manager, Amazon IoT Connectivity & Control, AWS, will explain how AWS IoT enables organisations to protect the evolving security-focused Internet of Things ecosystem, built on the rapidly progressing marketplace underscored by the convergence of our digital and physical worlds, in order to secure the connected world of tomorrow. March 18, 2020, 9:45 AM - 10:45 AM "I Dreamed a Dream": Leading in the Smart/Safe/Connected City Revolution: There are millions of devices already deployed in cities across the country and around the world. With billions more coming, those devices have a significant impact on the delivery of a range of services including safety and security. In this session, there will be a discussion of how to form a smart/safe/connected city strike force to create a positive business environment and mitigate public safety threats. March 18, 2020, 9:45 AM - 10:45 AM Security on The Ledge: Transforming Willis Tower, an American Icon: As a DHS SAFETY Act designated site, balancing the demands of the building’s distinction with the competitive leasing market and trends toward open, collaborative workspaces is a challenging feat. This session will explore how the design team weaves physical security and technologies into the renovation, embracing a five-star operational experience in this high-population, high-throughput symbol of Chicago. March 19, 2020, 1:00 PM - 2:00 PM How Robotics Enables Cybersecurity With a Human Touch: Access control is a vital element of any cybersecurity programme. It can tell you who has badged into the system, but not who is actually on the premises. By integrating robots into a security team, it can capitalise on robotics technology with a human factor to help security managers know who is in the facility after hours, and to protect an organisation from cyber breaches. March 19, 2020, 11:00 AM - 12:00 PM Diversity & Inclusion in the Security Industry – Your Questions Answered!: Do you know the meaning of (and the difference between) “diversity” and “inclusion”? Do you know how diversity and inclusion (D&I) can contribute to your business goals and help achieve competitive advantage? This session will explore the importance of D&I to the success of the security industry now and in the future. March 19, 2020, 3:30 PM - 5:00 PM DHS Town Hall Meeting @ ISC West: Enhancing Security and Doing Business at the Speed of Life: DHS is changing the way they do business in areas of contracting, tech-scouting, and experimentation. They are seeking new ideas and partners to enhance security and accelerate technology solutions. This meeting will explore what DHS is doing to ensure things like passenger checkpoints, cargo container screening, and first responder operations. (note: OPEN TO ALL BADGE TYPES) “SIA and ISC West deliver the most robust and compelling educational programmeming possible through the SIA Education@ISC West conference programme,” said Dr. Elli Voorhees, director of education and training at SIA. “Each year, SIA volunteers review many expert conference proposals to determine the most cutting-edge sessions and topics that will drive success for the industry.” See the full list of education sessions.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
The Security Industry Association (SIA), PSA Security Network and ISC Security Events have announced the keynote speakers for the upcoming Cyber:Secured Forum – an event centered on how to improve and maintain the cybersecurity of integrated solutions and physical security systems. At this inaugural event, June 4–6 in Denver, CO, Suneeta Hazra, chief of the criminal division of the Colorado U.S. Attorney’s Office, and Judy Smith, chief of the Colorado U.S. Attorney’s Office’s Cybercrime and National Security Section, will discuss the cyber threat landscape both nationally and locally, including lesser-known cyber threats that impact our daily routines. They will also share the motivation behind the creation of the office’s Cybercrime and National Security Section and provide insight into how the office can assist private and government partners. Cyber:Secured Forum, hosted by PSA Security Network, ISC Security Events and SIA, will explore the ramifications of cybercrime Cyber:Secured Forum Cyber:Secured Forum, hosted by PSA Security Network, ISC Security Events and SIA, will explore the ramifications of cybercrime, the strategies for cyber hardening and new technologies and tools designed to improve the security of solutions and systems and provide a framework for developing new business opportunities. “Cyber:Secured Forum is about practical advice that manufacturers, integrators and the security practitioner community can take back to their businesses and put into action right away,” said SIA CEO Don Erickson. Cybersecurity “Integrators who are going to be deploying products onto an end user’s network have a responsibility to be literate when it comes to cybersecurity,” said Bill Bozeman, president and CEO of PSA Security Network. “Cybersecurity challenges are not going away, and while they certainly present a liability, they also present opportunities for integrators who choose to be progressive and find new ways to support end users in the ongoing race to stay in front of cyber issues.” It’s going to be different from a lot of other cybersecurity events because a lot of the cyber events in the industry are focused more on cyber in a silo" Attendees of Cyber:Secured Forum – whether physical security and IT leaders, systems integrators or cyber professionals – will have the opportunity to interact with peers, share lessons and learn how to make their businesses more resilient, their systems more secure and their cyber practices standardised. Physical security and IoT “It’s going to be different from a lot of other cybersecurity events because a lot of the cyber events in the industry are focused more on cyber in a silo,” said Will Wise, group vice president of the ISC Security Events. “What we’re really embracing here and uniquely bringing together through our partnership is the mixture of the physical security, IoT, integrators and manufacturers together with IT and cyber.” This event will highlight cyber-hardening of integrated security systems, how to improve your firm’s cyber posture, new cybersecurity tools and resources for integrators and the business of cyber from liabilities to opportunities.
Friday marked the closing day of ISC West 2018. ISC West, sponsored by the Security Industry Association (SIA), the largest converged security event of the year, experienced its biggest and most successful year to date. On the heels of ISC West being named to Trade Show Executive’s Next 50 List for Attendance Growth in 2017, this year included a larger show floor with more exhibits than ever before (an additional 4K square feet from last year), growth in featured areas (Unmanned Security & Safety Expo sponsored by Knightscope, Connected Security Expo, Public Security & Safety Expo, and Connected Home sponsored by Alarm.com, plus the addition of the brand new Emerging Technology Zone that had 40 companies participate), 120+ new products displayed in SIA’s New Products Showcase, six percent growth in overall attendees and 10 percent growth of the coveted ISC Executive’s Club. Security education programme This year, ISC West had the pleasure of offering over 85 sessions throughout the SIA Education@ISC programme, spanning a range of topics that impact security professionals across physical, IT and IoT security – from biometrics to drones to leadership skills.The enthusiasm of our attendees, loyal returning exhibiting companies and the 250 new exhibiting companies inspire us to put on the best show" Some of the most highly-attended sessions were Access Control and Video in the Cloud, The Evolution of Credentials and their Use in the IT, OT, and Physical Security Environment, Connected Home – The Future is Now, and The Future of Physical Security: The Decade Ahead. Providing comprehensive education is one of the cornerstones of ISC West, and more attendees are leveraging these offerings each year, learning from one another and networking with their peers. “Another successful year in the books,” said Sherida Sessa, Industry Vice President of ISC Security Events at Reed Exhibitions. “The enthusiasm of our attendees, loyal returning exhibiting companies and the 250 new exhibiting companies continue to inspire us to put on the best show we can. We’re so pleased with the turnout and want to formally thank everyone – attendees, exhibitors, speakers, our media partners and sponsors, and most importantly, SIA, for helping to make this year the biggest and best show we’ve had yet.” Re-inventing cybersecurity This year’s keynotes were unparalleled. Each one had a packed house, with Dr. Douglas Maughan of the Department of Homeland Security explaining how the DHS Science and Technology (S&T) is re-inventing cybersecurity, and Jeff Crume, Distinguished Engineer and Master Inventor, IT Security Architect at IBM talking about the dark side of the IoT.ISC West 2018 featured the SIA Women in Security Forum to mentor and empower other females to enter the industry ISC West 2018 also had several special events on the agenda, including the 23rd SAMMY Awards hosted by Security Sales & Integration, honouring dealers and integrators for their sales, marketing, business and installation excellence; tours of the new Emerging Technology Zone to showcase next-generation products on the market; SIA’s New Products Showcase awards ceremony, where over 120 product entries were pitched to leading industry experts and winners were selected in nearly 30 categories; the Security 5K Run/2K Walk, where all proceeds were donated to Mission 500, a non-profit charitable organisation focused on the security industry and dedicated to serving children and families in need across the U.S.; the SIA RISE Happy Hour and SIA Autonomous Security Robotics Reception where security industry professionals had the chance to network with each other; and the inaugural committee meeting of the SIA Women in Security Forum, a place for women to engage, mentor and empower other females to enter the industry. Business impact “There’s nothing better than hearing someone on the show floor say, ‘ISC West is like the Super Bowl of security events',” said Will Wise, group vice president of the ISC security portfolio. “At the end of the day, it’s so rewarding knowing that exhibitors and attendees – from end-users to integrators to dealers/installers to consultants and engineers – feel that ISC West made a measurable business impact for them. We’re looking forward to the Cyber: Secured Forum in Denver in June and are already setting our sights on ISC East in New York City in November!”
ISC West, sponsored by the Security Industry Association (SIA), the largest converged security event of the year, experienced its biggest and most successful year to-date. On the heels of ISC West being named to Trade Show Executive’s Next 50 List for Attendance Growth in 2017, this year included a larger show floor with more exhibits than ever before (an additional 4K square feet from last year), growth in featured areas (Unmanned Security & Safety Expo sponsored by Knightscope, Connected Security Expo, Public Security & Safety Expo, and Connected Home sponsored by Alarm.com, plus the addition of the brand new Emerging Technology Zone that had 40 companies participate), 120+ new products displayed in SIA’s New Products Showcase, six percent growth in overall attendees and 10 percent growth of the coveted ISC Executive’s Club. This year ISC West had the pleasure of offering over 85 sessions throughout the SIA Education@ISC program SIA Education@ISC program This year ISC West had the pleasure of offering over 85 sessions throughout the SIA Education@ISC program, spanning a range of topics that impact security professionals across physical, IT and IoT security – from biometrics to drones to leadership skills. Some of the most highly-attended sessions were Access Control and Video in the Cloud, The Evolution of Credentials and their Use in the IT, OT, and Physical Security Environment, Connected Home – The Future is Now, and The Future of Physical Security: The Decade Ahead. Providing comprehensive education is one of the cornerstones of ISC West, and more attendees are leveraging these offerings each year, learning from one another and networking with their peers. Cybersecurity and IoT This year’s keynotes were unparalleled. Each one had a packed house, with Dr. Douglas Maughan of the Department of Homeland Security explaining how the DHS Science and Technology (S&T) is re-inventing cybersecurity, and Jeff Crume, Distinguished Engineer and Master Inventor, IT Security Architect at IBM talking about the dark side of the IoT. ISC West 2018 also had several special events on the agenda, including the 23rd SAMMY Awards hosted by Security Sales & Integration “Another successful year in the books,” said Sherida Sessa, Industry Vice President of ISC Security Events at Reed Exhibitions. “The enthusiasm of our attendees, loyal returning exhibiting companies and the 250 new exhibiting companies continue to inspire us to put on the best show we can. We’re so pleased with the turnout and want to formally thank everyone – attendees, exhibitors, speakers, our media partners and sponsors, and most importantly, SIA, for helping to make this year the biggest and best show we’ve had yet.” Products showcase awards ISC West 2018 also had several special events on the agenda, including the 23rd SAMMY Awards hosted by Security Sales & Integration, honoring dealers and integrators for their sales, marketing, business and installation excellence; tours of the new Emerging Technology Zone to showcase next-generation products on the market. It’s so rewarding knowing that exhibitors and attendees feel that ISC West made a measureable business impact for them" SIA’s New Products Showcase awards ceremony, where over 120 product entries were pitched to leading industry experts and winners were selected in nearly 30 categories; the Security 5K Run/2K Walk, where all proceeds were donated to Mission 500, a non-profit charitable organisation focused on the security industry and dedicated to serving children and families in need across the U.S.; the SIA RISE Happy Hour and SIA Autonomous Security Robotics Reception where security industry professionals had the chance to network with each other; and the inaugural committee meeting of the SIA Women in Security Forum, a place for women to engage, mentor and empower other females to enter the industry. Measureable business impact “There’s nothing better than hearing someone on the show floor say, ‘ISC West is like the Super Bowl of security events',” said Will Wise, group vice president of the ISC security portfolio. “At the end of the day, it’s so rewarding knowing that exhibitors and attendees – from end-users to integrators to dealers/installers to consultants and engineers – feel that ISC West made a measureable business impact for them. We’re looking forward to the Cyber:Secured Forum in Denver in June and are already setting our sights on ISC East in New York City in November!”
Registration is open for Cyber:Secured Forum, a cybersecurity educational summit focusing on integrated systems, in Denver, Colorado, on June 4-6, 2018. The event is being produced in partnership by PSA Security Network, the world’s largest systems integrator cooperative, ISC Security Events (Reed Exhibitions, the world’s leading event organiser) and the Security Industry Association (SIA), a trade association for global security solution providers. Key discussion topics In addition, the organisations revealed the agenda for Cyber:Secured Forum, indicating conference discussions will center around topics including: We have tapped some of the nation’s top cybersecurity advisors, strategists, and technical experts to be part of Cyber:Secured Forum" Cyber-Physical Framework by U.S. National Institute of Standards and Technology Global Cybercrime Trends How to Make Your Business Cyber Resilient New Tools and Technologies for Better Cybersecurity of Physical Security Systems New Standards for Cybersecurity Assurance Right-Sizing Your Company’s Cyber Strategy Cutting-edge Strategies for Cyber-Hardening of Security Systems “The educational program at this event will be unlike anything else the industry has experienced so far regarding cybersecurity,” said Bill Bozeman, president and CEO of PSA Security Network. “We have tapped some of the nation’s top cybersecurity advisors, strategists, and technical experts to be part of Cyber:Secured Forum. They are poised to help physical security and IT professionals navigate the quickly changing cybersecurity environment and understand how best to work together in the face of new threats to evolve response tactics and build new business opportunities.” Confirmed speakers to date include Bob Troyer, U.S. Attorney, United States Attorney’s Office, District of Colorado Judy Smith, Cybercrime and National Security Section Chief, United States Attorney’s Office, District of Colorado Patti Chrzan, Senior Director, Strategic Programs, Microsoft Chris Greer, Director, Cyber-Physical Systems, National Institute of Standards & Technology (NIST) Ed Griffor, Smart Grid Program Office, National Institute of Standards & Technology (NIST) Randall Frietzsche, Chief Information Security Officer, Denver Health Pamela Passman, President and CEO, Center for Responsible Enterprise and Trade (CREATe) John Savarese, Senior Cybersecurity Advisor, Underwriters Laboratories (UL) Terry Gold, Founder, D6 Research Ray Coulombe, Founder and Managing Director, SecuritySpecifiers Cyber:Secured Forum’s event format facilitates a learning and peer-to-peer connections environment" Risk mitigation strategies “The inaugural Cyber:Secured Forum will provide actionable information to all attendees that that can become part of their risk mitigation strategies immediately,” said SIA CEO Don Erickson. “Attendees will come away from this unique event with new insights and practical guidance that will help their clients and customers to adopt enhanced cyber-readiness programs.” “Technology convergence and the complexity of security threats and incidents are stimulating a mandate to create new norms for collaboration,” said Will Wise, Group Vice President, Reed Exhibitions Security Portfolio. “Integrators, enterprise and government physical and IT security decision makers, and security manufacturers all know the time is now to move from reaction mode to substantive cyber-physical action plans and the establishment of ecosystem best practices. Cyber:Secured Forum’s event format facilitates a learning and peer-to-peer connections environment that will start in Denver and continue via year-round SIA, PSA and ISC education and community-building initiatives.”


Expert commentary
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customised solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
At ISC West this year, emerging technologies will be on display to help organisations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can move enterprises to a place of digital transformation and proactive management rather than reactive practices based on threats and changing regulations. The show provides an opportunity for both vendors and potential customers to learn from each other about what’s out there and what’s needed in terms of future solutions as the industry evolves. Are you in cyber and physical security compliance? At this year’s show, we’ll continue to see developments focused on integration of cyber physical security that will lead to deeper understanding of the relationship between devices, device monitoring and spaces in which all devices physically reside. Digital solutions help achieve a digital transformation which stitches the data relationships together to provide better threat vector impact and overall understanding of risk. The technologies in smart buildings are subject to cyberattacks, which pose not just a threat to data and privacy but can compromise the physical space as well. Think of the locked door in a smart building that now is opened with access control via key cards or mobile devices given only to certain members of staff. These integrations increase safety and restrict access across the enterprise, but a bad actor can access and duplicate the necessary data to open the door with a copycat device while hiding the event from the surveillance system. By having a comprehensive cyber whitelist of installed devices, potential rouge devices are prevented from transmitting on the network, therefore providing an automated guard against internal and external attacks. When systems are compromised due to a hack or physical intervention, it puts what’s behind the door at risk, whether it’s money in a bank or information in a sensitive work environment, such as a laboratory. Digital solutions help achieve a digital transformation which stitches the data relationships together It’s increasingly important to highlight the relationship between cyber and physical security. A great illustration of this is the digital twin. A digital twin is a replica of a physical space that uses both informational and operational technology to give real-time information about what’s going on in a space. These can include things like floor plans for the building as well as real-time sensor data from the building management system, HVAC systems, lighting, fire, security, and more. By getting a complete picture of the physical and digital assets of an organisation, it becomes possible to monitor all systems from one central location to see how they’re working together and act on the insights they provide. So, in the example of a breach from before, it’s possible to flag that hack, isolate its exact location and devices involved, and resolve it quickly while maintaining preservation of evidence. Compliance: how to get there safely, efficiently and effectively As these threats evolve, governing bodies are taking action to ensure that data is protected to minimise these kinds of threats and ensure that organisations feel confident in the security of their data. Norms and compliance measures are emerging quickly, such as General Data Protection Regulation (GDPR) which began to be enforced in March 2018, and the California Cybersecurity Law, which went into effect in the US just this past January. The regulations of what can be done with data mean that companies need to react or face penalties such as fines, which can be as high as 4% of worldwide annual revenue of the previous year. These are also fluid and can change rapidly, meaning flexibility is important in compliance solutions. However, this presents an opportunity for companies to invest in innovation to ensure they’re prepared for those changes and to protect the safety of not just employees, customers and target markets, but of the larger organisation. Getting to a place of compliance can seem costly and time consuming at the beginning Getting to a place of compliance can seem costly and time consuming at the beginning, especially for larger organisations. They may have thousands of security assets (cameras and sensors, for example) and might not even be fully aware of what they have, where they are, and whether those assets are functional, never mind compliant with data protection legislation. The right solution takes all the steps to becoming safe and compliant into account, beginning with inventory and mapping of all assets to get a complete picture of where things stand and where changes need to be made. One large financial institution, upon embarking on this journey, identified an additional 10% of assets that they didn’t know they had, and additional ones that were nonfunctioning and needed to be repaired or replaced for compliance and safety. Monitoring: centralised and remote for rapid response Once assets and data are centralised and a complete inventory is taken, it’s much easier to effectively monitor the complete enterprise. At this year’s show, smart technologies will be on display that reduce cybersecurity risks and monitor assets for compliance. If something changes, that can be flagged, and appropriate parties can be quickly notified to act and neutralise security threats or avoid the expensive penalties that come with noncompliance. Since all these components are centralised in one location, it becomes possible to monitor much more effectively and fix issues remotely in minutes rather than scheduling a trip to a location that may not happen for days or even weeks. A security camera for a large chain enterprise such as a retail store or bank in a small-town location deserves service just as quickly as one in a major city, since the threat that each non-functional device poses is the same to who and what it is there to protect. Keeping it up: a proactive approach to service and maintenance One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach to systems maintenance and operation. In addition to performance and compliance, other types of data, such as historical events, can also be monitored centrally. This gives context to security events and can move organisations from a reactive to a proactive approach to their security as well as operations. If small problems are identified and resolved before they become larger problems, it means that security events can be mitigated more quickly or prevented entirely due to early intervention. On the operations side, early insights into asset performance means that fewer resources are expended on noncompliance fees and large-scale, emergency repairs. These resources can take the form of money, but also of time spent by employees and enforcement agencies to ensure continued compliance. Staff can spend time engaged in active monitoring rather than generating reports, since that can now be automated. In the new decade, it’s time to use the technological resources available to better protect systems for smarter, safer and more sustainable environments. On every level, compliance is important not just for its own sake, but so are the other benefits associated with intelligent management. The show presents an educational opportunity for vendors and customers alike. Walking around the show floor and talking to everyone is a unique way to see what’s out there and evaluate what is and isn’t working for a business while getting information from all the industry experts. Even if they’re not ready for a complete overhaul, taking stock of what’s available, where things are heading and how their operations and mission can be better served by implementing one or more of the solutions showcased is more important than ever. On our end, those conversations about needs and concerns are invaluable in driving innovation.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyse the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognising and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognising and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behaviour analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognising suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and number plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specialising in VMS and modular AI analytics at ISC West 2020. Even if recognising suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and number plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyse employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyses the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognised the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognise all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specialising in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specialising in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Security beat
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention, we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualise it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so the use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerisation Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerisation is a form of operating system-level virtualisation that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerisation, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerisation” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCentre cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerise Genetec’s SecurityCentre cloud platform, but containerisation now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerisation enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralised software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratising AI You hear the term democratising AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratise AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralised repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximise business operations.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Thoughts from the show

“ISC West improves every year. It’s very obvious you place great importance on making this a very satisfying show for all attendees.”

“ISC West is kind of a "one stop shop" for the entire industry. Virtually everyone has a presence.”

“ISC West is very informative and allows you to speak directly to manufacturing and engineers to discuss issues and solutions.”

“All technologies and business development converge at the same place, besides you can learn about new products.”

Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download