Security access systems
The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predict...
Ping Identity, a pioneer in securing digital identities for the world’s largest enterprises, announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction – helping enterprises unlock frictionless convenience, strengthen governance, and open new channels for growth. Humans and AI agents "We can no...
ZKTeco USA, a major provider of biometric verification and access control technology, announced the company will be highlighting its full portfolio of access control solutions ranging from its multi-tech standalone readers, metal detectors, optical turnstiles, Torus key cabinets, visitor management, and new scalable cloud-based access control software - Cielo365 at GSX 2025 (booth #3047) in New Orleans September 29th – October 1st. The company’s newly released clou...
Securitas Technology, the world’s second-largest commercial electronic security company, will showcase its latest innovations and industry-pioneering capabilities at the Global Security Exchange (GSX) 2025, taking place Sept. 29 to Oct. 1 in New Orleans, Louisiana. As a trusted partner to millions of enterprise clients worldwide, Securitas Technology will use the GSX platform to demonstrate how it is leading the future of integrated security. Experts to discuss security trends At...
Gallagher Security is thrilled to announce the appointment of Matt Butts as Executive Vice President – the Americas, effective September 15. With more than 25 years of experience in the security and software industries, Matt has built a strong record of driving growth and leading high-performing teams. He’s held leadership roles at Johnson Controls, Tyco Integrated Security, ADT, and most recently served as Senior Director of Global Security Sales at Transact Campus, where he s...
Matrix Comsec, a major innovator in Security and Telecom solutions, announced its strategic participation at Intersec Saudi Arabia 2025, the Kingdom's premier security, safety, and fire protection exhibition. The event will serve as the official launchpad for Matrix’s next-generation facial recognition device. We will also be displaying surveillance solutions and access control systems, aligning with Saudi Arabia’s rapid security market growth and Vision 2030’s amb...
News
Property managers and residents face mounting challenges in multi-site security management, remote access control, communication gaps, and balancing modern convenience with budget constraints. Cloud-based solutions are revolutionising how residential properties address these universal pain points. Sarah’s phone buzzed at 2 AM. As the property manager for three residential complexes across different cities, she’d grown accustomed to late-night emergencies. This time, it was a locked-out tenant at the downtown apartment building—and Sarah was 50 miles away at home. Meanwhile, across town, the Chen family was dealing with their own frustration: their 8-year-old son had forgotten his key again, and they were tired of constantly worrying about missed visitor calls while at work. Convenience and security These scenarios play out thousands of times daily across apartment buildings. Whether one is a property manager juggling multiple sites or a resident seeking convenience and security, certain pain points seem universal. This blog will explore the worries plaguing both sides, and discover how modern cloud-based management solutions are transforming residential property operations. Property manager’s dilemma Traditional systems require expensive on-site servers for each location, dedicated IT staff, and complex VPN setups Managing multiple residential properties can often feel like playing three-dimensional chess blindfolded. Traditional systems require expensive on-site servers for each location, dedicated IT staff, and complex VPN setups. There are also significant challenges to working remotely. Property managers often need the flexibility to work from anywhere, yet most conventional access control and video intercom systems chain them to physical locations. Emergencies, especially, don’t wait for business hours, and tenants expect immediate responses regardless of time or location. Resident’s reality The same limitations are felt by many residents who have become used to the convenience of modern technologies. Every resident, after all, has experienced that sinking feeling of patting empty pockets while standing at their apartment door. Equally frustrating is missing important calls. Whether it’s a food delivery, emergency services, or a family visiting unexpectedly, conventional intercom systems tie communication to physical presence. Despite these increasing expectations, not every resident has the same budget or renovation flexibility. Smartphone integration The ‘one-size-fits-all’ approach of many systems often leaves some people unsatisfied Young professionals, for example, might prioritise smartphone integration over traditional wall-mounted units, while families with elderly members may prefer more familiar, traditional interfaces. The ‘one-size-fits-all’ approach of many systems often leaves some people unsatisfied. Installation concerns add another layer of complexity. Many residents hesitate to damage finished walls for hardwired systems, especially in rental properties where modifications may violate lease agreements. Cloud-based solution Modern cloud-based management platforms like Hikvision’s Hik-Connect 6 address these challenges with unified, scalable solutions that serve both property managers and residents effectively. Streamlined multi-site operations Instead of maintaining separate servers and IT infrastructure for each property, cloud-based systems centralise management through a single platform. Property managers can monitor multiple residential complexes, create site hierarchies, and handle visitor access from anywhere with internet connectivity. The cost savings are immediate and substantial. Elimination of on-site servers, reduced IT maintenance, and simplified deployment processes translate to better profit margins and more resources for tenant services. Remote management empowers virtual concierge services Cloud-based platforms enable property managers to function as virtual concierge services. They can receive and handle calls from any location through a mobile app. Advanced features, such as temporary PIN codes and QR code access, allow proactive visitor management. Rather than reactive problem-solving, managers can create seamless experiences for expected visitors while maintaining security protocols. Such systems enable property managers to create temporary credentials in advance for scheduled visitors and vehicles—visitors can enter using PIN codes or by scanning QR codes, while visitor vehicles can be automatically recognised by ANPR cameras at entry points, providing both convenience and security. Customised camera resource management Different residents receive tailored monitoring permissions based on their location and needs. For instance, residents in Unit 1, Floor 1 can access different video footage for preview and playback compared to residents in Unit 2, Floor 2. This granular approach ensures that each unit’s residents have appropriate monitoring privileges aligned with their specific security requirements and building layout. System reliability and stability assurance The most robust configurations utilise wired connections between indoor stations and door stations via Ethernet cables, with a PoE power supply for both indoor stations and doorbells. The entire intercom system operates on UPS backup power, ensuring uninterrupted service even during power outages. Door stations with 4G routers maintain cloud connectivity and direct-to-app communication, minimising maintenance requirements and system downtime. Flexible resident solutions Modern systems accommodate different resident preferences and budgets. Tech-savvy residents can manage everything through smartphone apps—receiving calls, viewing common area cameras, and controlling access—without wall modifications. Traditional families, meanwhile, can continue using familiar indoor stations while benefiting from cloud connectivity. Enhanced security and accountability Cloud-based systems provide comprehensive logging and forensic capabilities that traditional systems simply cannot match. Every call, access event, and system interaction creates a digital record accessible for security investigations or operational analysis. This transparency benefits everyone: property managers gain valuable insights into usage patterns and security trends, while residents enjoy the peace of mind from knowing their building’s security systems are both modern and accountable. Unified management Cloud-based systems and AI-driven automation are at the forefront of these changes As residential properties evolve toward smart building status, the divide between property manager needs and resident expectations continues to narrow. Cloud-based systems and AI-driven automation are at the forefront of these changes, with technology adoption standing out among the defining property management trends of 2025. Cloud-based management platforms such as Hikvision’s Hik-Connect 6 represent more than technological upgrades—they’re operational philosophies that prioritise flexibility, efficiency, and user experience. Modern convenience For property managers tired of juggling multiple systems and for residents seeking modern convenience without security compromises, unified cloud-based management offers a path forward that serves everyone’s interests. The global property management software market—valued at $5.51 billion in 2023—is expected to grow at 8.9% annually through to 2030, driven largely by increased demand for cloud-based Software-as-a-Service solutions. Hikvision’s Hik-Connect 6 Solutions like Hikvision’s Hik-Connect 6 enable property management organisations and apartment developments to protect residents and assets at scale through comprehensive cloud-based security management. The question isn’t whether to adopt these solutions, but how quickly you can implement them to stay competitive in an increasingly connected world.
Iris ID, the global pioneer in iris recognition technology, is showcasing its next-generation iris and face fusion solutions at Identity Week America, September 10-11. At Booth 417, attendees can see how Iris ID’s touchless identity solutions are engineered for the most demanding environments, from enterprise security to national identification programs. Additionally, NextgenID, an Iris ID partner and trusted provider of identity security and technology, will display its Identity Station Kiosk featuring the iBAR 600E. Partnership with NextgenID “Our partnership with NextgenID marks an important milestone in advancing the mainstream adoption of biometrics for trust, identity, and security,” said Mohammed Murad, Chief Revenue Officer, Iris ID. He adds, “As governments and enterprises demand faster, more secure, and more convenient ways to verify identity, collaborations that unite best-in-class technologies are critical to ensuring ethical inclusion and safeguarding personal identifiable information (PII).” Iris ID’s multi-modal fusion solutions Combined with their PresenceID Network and alignment to FedRAMP, NIST 800-63-4, and FIPS 201-3 standards NextgenID’s kiosks — already deployed nationwide with federal agencies and pioneering enterprises — deliver supervised remote identity proofing (SRIP) at the highest Kantara-certified assurance level, support multi-modal biometric collection including fingerprint, face, and iris, and enable high-assurance credential issuance for PIV, CAC, FIDO, and more. Combined with their PresenceID Network and alignment to FedRAMP, NIST 800-63-4, and FIPS 201-3 standards, these capabilities perfectly complement Iris ID’s multi-modal fusion solutions, creating a trusted ecosystem that is transforming secure access, workforce management, and citizen identity systems across industries. Modernise security and identity management Highlighted in the Iris ID booth are the latest advances in multi-modal biometric technology, where iris and face recognition are combined in fully contactless solutions. These innovations are designed to deliver fast, frictionless throughput while ensuring accuracy and reliability, even in high-throughput environments. Iris ID will also showcase its broader suite of biometric solutions spanning enterprise access, healthcare, workforce management, public safety, and government ID programs. Built for scalability and interoperability, these systems empower organisations to modernise security and identity management, while preserving efficiency and user experience. Live demonstrations will run throughout Identity Week America at the Iris ID Booth 417.
Hanwha Vision is opening new doors for security applications with the launch of OnCAFE (Cloud Access For Everyone), a cloud-hosted Access Control as a Service platform and the latest tool in the company’s expanding line of cloud-based solutions. Delivering a user-friendly, scalable, and cost-effective option for access control needs, OnCAFE reduces the deployment challenges traditionally associated with system initialisation, device, user, and software management. Hanwha Vision’s WAVE VMS OnCAFE’s cloud-based architecture eliminates the need for dedicated on-site servers and costly IT infrastructures OnCAFE’s cloud-based architecture eliminates the need for dedicated on-site servers and costly IT infrastructures. The software was developed entirely by Hanwha Vision’s new Software Engineering Team and extends Hanwha Vision’s mission to deliver solutions for the end user from one source. With an open platform API that can be used to connect to any video or monitoring system, OnCAFE is compatible with Hanwha Vision’s WAVE VMS and OnCloud camera-to-cloud VMS platforms. Integrated security, surveillance, and facility management “OnCAFE was built from the ground up to remove operational barriers without sacrificing performance, delivering the most user-friendly access control system on the market,” said Tom Cook, Executive Vice President, Sales, Marketing, and Operations, North America, at Hanwha Vision. “Users never have to worry about server crashes, disaster recovery plans, or ongoing software maintenance. We’re building a suite of fully integrated security, surveillance, and facility management tools, enabling organisations to configure and maintain surveillance systems tailored to their unique needs.” Intuitive mobile and web interface New access points can be added by modularly fusing more controllers, much like adding IP cameras An intuitive mobile and web interface allows administrators to securely manage credentials, access rights, and monitor door activity remotely. New access points can be added by modularly connecting additional controllers, much like adding IP cameras in a surveillance system. Cloud-based access control OnCAFE is designed as a highly scalable, cloud-based access control as a service platform, offering: Centralised control from a single door up to an unlimited number of multi-location sites. Intuitive “single pane of glass” dashboard views to view and monitor alarms and entities across an organisation. Direct-to-cloud communications, with no on-prem servers, bridges, or appliances required. The platform’s streamlined and intuitive user experience delivers: Unified identity management, allowing users to manage credentials easily. Advanced system automations and AI-enhanced schedules. Simple hardware configuration with real-time connection layout diagrams. Comprehensive system reports for audits and compliance. Intuitive mobile app for easy system management. Native integration with OnCloud and Wisenet WAVE VMS. OnCAFE offers a range of flexible and easy-to-install hardware options: Support for Azure Access Technologies open controllers. Patented OSDP Flex Inputs, an “industry first,” Hanwha Vision door controllers provide two more inputs per door while in OSDP mode, providing more value. On-board fire alarm disconnects; hardware-based fire alarm disconnect ensures fire code compliance without the need for additional equipment or accessories when using Hanwha IP controllers. Flexible system architecture using Hanwha Vision hardware or fully interoperable Azure Access devices. Highly interoperable hardware design using industry standards (OSDP Verified, ONVIF Profile A&C, SUNAPI) on Hanwha IP controllers. Bundled solution sales with Wavelynx Apex readers and both physical and mobile credentials (including Wallet). Adoption of cloud-based access control systems Hanwha Vision’s OnCAFE cloud-hosted access control solution is poised to disrupt the traditional access control market. Its unique design and interface are designed to lead to an increased adoption of cloud-based access control systems, particularly among organisations that may have previously been deterred by the complexity and cost of on-premise systems. Hanwha Vision is featuring the OnCAFE platform at GSX 2025 (Booth #2326) with ongoing demos and presentations highlighting its limitless potential in security and surveillance applications.
Integrated Control Technology (ICT), a major provider of intelligent access control, intrusion detection, building automation and security solutions, and KONE, a pioneer in innovative people flow solutions, are proud to announce the integration of ICT’s Protege GX system with KONE Office Flow. This powerful partnership delivers a unified elevator and access control platform that enhances operational efficiency, reduces administrative workload, and elevates security in commercial buildings. The synchronisation of Protege GX with KONE Office Flow ensures user records are seamlessly integrated across both systems, creating a centralised and automated approach to building management. Key features Access details such as elevator cars, floors, and control panels are populated within the Protege GX interface, enabling precise programming of access levels, schedules, expiration dates, and credentials. Key features of the KONE system, like destination control and direct elevator call, are also supported, providing innovative solutions to improve the flow of people in high-traffic environments. Key benefits of the integration include: Streamlined operations: Centralises access control by synchronising user records and data between Protege GX and KONE Office Flow, eliminating the need to manage separate systems. Reduced workload for staff: Simplifies administrative tasks by removing redundancies, saving valuable time for building staff and minimising the risk of errors. Enhanced security: Provides a single point of control for doors, turnstiles, and elevators, while offering synchronised access event tracking to ensure comprehensive oversight. Improved user experience: A seamless, single-credential solution for accessing both doors and elevators, delivering unmatched convenience for end users. Destination control: Groups passengers heading to the same floors into the same elevator, minimising travel time and lobby congestion. Direct elevator call: Automatically calls an elevator to a user’s assigned floor, simplifying access and saving time. Advanced elevator management This integration addresses key challenges faced by commercial buildings, such as managing high traffic, ensuring robust security, and enhancing tenant satisfaction. The synchronised system not only reduces operational complexity for managers but also enables efficient people flow during peak hours with advanced elevator management features. Sarah Thompson, Chief Product Officer at ICT, shared, “This collaboration with KONE is an exciting step forward in intelligent building management. By integrating Protege GX with KONE Office Flow, we’re delivering a solution that combines streamlined operations, heightened security, and a superior user experience. It’s the future of smarter, safer, and more connected buildings.”
Matrix Comsec, a pioneering provider of Security and Telecom solutions, is proud to announce its participation at FSIE 2025. With decades of innovation and a strong focus on safety, compliance, and resilience, Matrix will present its latest technologies designed to safeguard people, assets, and infrastructure. How Matrix solutions address evolving challenges? Visitors will experience how Matrix solutions address evolving challenges across key domains: Smart Buildings: Seamless integration of access control with fire evacuation protocols ensures faster response and safe occupant movement during emergencies. Critical Infrastructure (Energy, Transport, Oil & Gas): Real-time surveillance, tamper-proof access control, and cybersecurity-certified platforms protect high-value assets and operations against both physical and cyber threats. Industrial Safety: End-to-end monitoring and compliance-driven workforce solutions safeguard perimeters, enforce safety protocols, and ensure operational continuity. Fire Safety Ecosystem: Video surveillance and access systems provide traceability, accountability, and actionable insights for safety drills, audits, and investigations. Why Matrix stands out? Made in India, Made for the World: Solutions designed, developed, and manufactured in India. Global Trust: Deployed in 50+ countries across diverse verticals. Certifications: STQC, BIS, ONVIF, CE, UL, and robust cybersecurity compliance. Scalability: From single buildings to multi-location enterprises. How Matrix is redefining safety, efficiency, and trust “Matrix solutions are engineered to empower organisations to build safer, smarter, and more resilient spaces,” said Tarun Sharma, Head of Marketing, Matrix Comsec, adding “Our focus is on solving real challenges, whether it’s preventing unauthorised access, protecting critical infrastructure, or ensuring reliable communication.” Matrix invites security professionals, consultants, and decision-makers to visit Booth B9 at FSIE 2025, New Delhi, and experience how Matrix is redefining safety, efficiency, and trust in the evolving technology landscape.
At GSX 2025, global security manufacturer Gallagher Security is inviting attendees to reimagine what security can achieve when limitations are removed. Visitors to booth #3339 will experience firsthand how Gallagher is redefining the role, function, and value of security in the workplace of the future. “Security has traditionally been seen as a cost centre or a barrier,” says Melissa Vidakovic, Director of Marketing – The Americas. Innovation and imagination “But what if it could be more? This year’s booth is about showing attendees what security reimagined looks like when innovation and imagination come together. If I had to describe it in one word, it would be ‘transformation.’” “We’ve had an eventful year of new products and solutions released to market, and GSX is the opportunity to see how they come together to produce a platform that delivers more capability, less friction, and greater results,” concluded Melissa Vidakovic. At booth #3339 attendees are invited to get a front row view of Gallagher’s most recent product innovations driving that transformation, including: QuickSwitch, the much-discussed migration tool transitioning businesses away from legacy systems to Gallagher's award-winning platform. The complete Controller 7000 Suite, featuring the newly released PIV-ready High Security variant that meets GSA standards, UL/ULC compliance, and additional international high assurance benchmarks. OneLink, the cloud-based solution that makes distance a problem of the past and redefines the definition of remote connectivity. A sneak peek at AccessNow, a cloud-native solution that automates access and credential requests end-to-end, slashing admin for security teams all while delivering instant, self-service access to End Users. And that’s just the beginning. “There’s so much happening at our booth this year that I can’t give it all away just yet,” Vidakovic adds. “We’ve got big announcements in the works, and I hope attendees stop by to see what’s next.” World’s first electric fence For Gallagher, innovation on this scale is nothing new. “Our company’s 85-year history is filled with moments of breakthrough thinking that reshaped industries,” says Gallagher Security Chief Executive, Mark Junge. “From the world’s first electric fence to today’s unified security platforms, innovation is at the heart of who we are. The GSX 2025 booth is a powerful example of how we continue that legacy today while looking boldly to the future.” Gallagher Security invites GSX attendees to visit booth #3339 from September 29 – October 1 in New Orleans. Use code EV246 for discounts on all-access passes or free expo passes when registering to attend.


Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Security beat
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Interface Systems, a major managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Serving more than 530 students from preschool through 12th grade, Bethesda Christian School is recognised among the top private schools in Texas. Between church services, school operations, and community events, the multi-building, 26-acre campus welcomes hundreds of people daily. This high level of activity required modern safety and security systems to protect students, staff, and parishioners while simplifying daily operations. Communication challenges Bethesda’s aging fire alarms, intercoms, and CCTV system were increasingly unreliable, creating false alarms and communication challenges. To address these concerns, the church turned to Interface to modernise its infrastructure. Interface designed and deployed an integrated solution that included: Fire Alarm System: Replacing the outdated system with a modern fire alarm system that communicates urgency effectively without causing unnecessary panic, particularly important for schoolchildren. Managed Access Control: Introducing a modern system that makes it easier for administrators to manage entry to the campus. The cloud-based setup means they can grant or restrict access remotely, without having to manage complex on-site servers. Video Surveillance Upgrade: Installing a 64-channel IP camera system on the new school building, with expansion capability to replace legacy analogue cameras over time. The system provides remote monitoring and allows staff to verify alarms with live video before responding, helping to reduce unnecessary dispatches. Intercom and Paging: Replacing the outdated intercom with a flexible IP-based system that supports school bell scheduling, room-to-room communication, and all-campus announcements. It also integrates with access control, giving administrators a simple way to manage visitor entry. Effective system “The new system is effective. It gets the point across that it’s time to evacuate, but it doesn’t create panic, especially among the kids,” said Rick Campbell, Facilities Manager at Bethesda Community Church. “Having remote access to cameras and alarms has been a huge help.” The installation was carefully phased to minimise disruption to classes and worship services. “Interface worked around the kids and kept us up and running during installation,” Campbell added. “The integration was seamless, and now everything is running smoothly.” Interface’s upgrades With Interface’s upgrades, Bethesda has significantly reduced false dispatches, streamlined communication across the campus, and gained the ability to scale its systems for future growth. “Initially, we were unsure about the cost, but the investment has been well worth it,” Campbell concluded. “I’d recommend Interface to other churches without hesitation.”
Interface Systems, a pioneering managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Serving more than 530 students from preschool through 12th grade, Bethesda Christian School is recognised among the top private schools in Texas. Modern safety and security systems High level of activity required modern safety and security systems to protect students Between church services, school operations, and community events, the multi-building, 26-acre campus welcomes hundreds of people daily. This high level of activity required modern safety and security systems to protect students, staff, and parishioners while simplifying daily operations. Bethesda’s aging fire alarms, intercoms, and CCTV system were increasingly unreliable, creating false alarms and communication challenges. To address these concerns, the church turned to Interface to modernise its infrastructure. Deployed an integrated solution Interface designed and deployed an integrated solution that included: Fire Alarm System: Replacing the outdated system with a modern fire alarm system that communicates urgency effectively without causing unnecessary panic, particularly important for schoolchildren. Managed Access Control: Introducing a modern system that makes it easier for administrators to manage entry to the campus. The cloud-based setup means they can grant or restrict access remotely, without having to manage complex on-site servers. Video Surveillance Upgrade: Installing a 64-channel IP camera system on the new school building, with expansion capability to replace legacy analog cameras over time. The system provides remote monitoring and allows staff to verify alarms with live video before responding, helping to reduce unnecessary dispatches. Intercom and Paging: Replacing the outdated intercom with a flexible IP-based system that supports school bell scheduling, room-to-room communication, and all-campus announcements. It also integrates with access control, giving administrators a simple way to manage visitor entry. Remote access to cameras and alarms The installation was carefully phased to minimise disruption to classes and worship services “The new system is effective. It gets the point across that it’s time to evacuate, but it doesn’t create panic, especially among the kids,” said Rick Campbell, Facilities Manager at Bethesda Community Church. “Having remote access to cameras and alarms has been a huge help.” The installation was carefully phased to minimise disruption to classes and worship services. “Interface worked around the kids and kept us up and running during installation,” Campbell added. “The integration was seamless, and now everything is running smoothly.” Interface’s upgrades With Interface’s upgrades, Bethesda has significantly reduced false dispatches, streamlined communication across the campus, and gained the ability to scale its systems for future growth. “Initially, we were unsure about the cost, but the investment has been well worth it,” Campbell concluded. “I’d recommend Interface to other churches without hesitation.”
Climate and weather can have a damaging impact on digital devices, especially in locations where extremes in summer and/or winter are common. This may be an obstacle to implementing digital technologies or digitalising outdoor workflows. For controlling access, it can prevent organisations from realising the benefits of digital access at remote and/or outdoor sites. Intelligent digital locking, which meets the highest standards of durability and reliability, is required. Expansion of infrastructure OXG builds and operates a high-speed fibre optic network designed to meet the digital needs OXG Glasfaser GmbH is a joint venture founded in 2023 by Vodafone and Altice. Their goal is to make a significant contribution to the expansion of infrastructure throughout Germany. OXG builds and operates a high-speed fibre optic network designed to meet the digital needs of individuals and companies. In the next few years, they aim to connect 7 million households with fibre optic. An investment of up to €7 billion is being made for broadband solutions and innovative FTTH (Fibre to the Home) expansion. Modern access solution They sought a modern access solution suited to securing the stations required for the expansion of their network: a locking system able to provide flexible security for their fibre optic stations. Of course, these stations are outdoors, often in public spaces, and exposed around the clock to wind and weather. Reliable security and outdoor operation are a must. They are also dispersed nationwide, which means frequent maintenance visits would represent a drain on time and money. OXG sought devices that were easy to install and would require as little maintenance as possible over their working lifetime. ECLIQ solution An eCLIQ system can be expanded, combined, and retrofitted according to its evolving needs With the programmable key-based eCLIQ solution, part of a suite of Digital Access Solutions from ASSA ABLOY, OXG chose digital access, which is reliable, robust, and suitable for environments with demanding climate conditions. An eCLIQ system can be expanded, combined, and retrofitted according to its evolving needs. “In addition to the flexibility, the resistance and durability of eCLIQ are particularly advantageous. That convinced us,” explains Markus Walther, Senior Manager Deployment Aggregation Network at OXG Glasfaser. Digital access With around 2,500 wireless cylinders, OXG’s eCLIQ solution provides an efficient, effective way to fit digital access. Installers simply slot in one of more than 60 different eCLIQ cylinder types instead of a mechanical cylinder. These innovative cylinders operate maintenance-free for up to 200,000 cycles. For system administrators, eCLIQ is easy to operate and programme. They benefit from the convenience of digital management. For instance, they do not need to activate every locking cylinder individually. Lock power supply and communication with the cylinder are conducted via battery-powered user and programming keys only. Award-winning CLIQ technology upgrades security by making it simpler to issue individual access authorisations. If a key is lost, its access permissions are simply deleted from the system with a few clicks in the intuitive software.
Seamless ASSA ABLOY digital access is now part of the Sharry workplace experience. By connecting Sharry with ASSA ABLOY’s ARX access control solution, businesses can administer secure employee access via mobile credentials as well as visitor management, all from a single unified platform, helping to save time and costs. This new integration combines ASSA ABLOY’s digital access expertise with the convenient functionality of a Sharry workplace platform. It allows administrators to control access permissions, streamline credential management and simplify guest registration directly within Sharry's ecosystem. With Sharry and ARX, customers now have a choice of mobile credentials, supporting Wallet, NFC and BLE unlocking. Integration with the Sharry workplace platform “It is exciting that we can expand our ARX solution via integration with Sharry workplace experience platform to make day-to-day life easier for our customers,” says Matti Kuismin, VP & Head of Product Unit EAC at ASSA ABLOY Opening Solutions EMEIA. “The ARX security solution is an open platform and easy to integrate. Through integration with Sharry as a mobile-first technology, we enable easy-to-use mobile keys within Wallet – and do that with the highest security standards.” “We have already deployed the integrated solution with a customer in Scandinavia. Their employees now access their offices with the tap of a phone or smartwatch, thanks to the use of HID mobile credentials, both app- and Wallet-based.” Enhance security with integrated access management Integration with Sharry now enables skills and security chiefs to combine access and visitor management Developed from decades of access expertise and experience, ASSA ABLOY ARX combines digital access with alarm functionality, and is available for both Offline and Online (real-time) management. ARX is built on an open platform model, to connect seamlessly with a broad range of complementary business systems and software. The integration with Sharry now enables facilities and security managers to combine access and visitor management within a single solution. Sharry streamlines the process of employee onboarding (and offboarding), which is now integrated with access permission management, including the easy distribution of mobile credentials. It simplifies visitor management, saving staff time, and provides workplace analytics with a genuine ROI. ARX’s robust security infrastructure “We’re excited to expand our access control ecosystem with ASSA ABLOY ARX, a proven and trusted security solution,” says Karel Hudínek, Head of Technology Partnerships at Sharry. “This integration brings seamless credential management, automated access assignments, and an enhanced user experience to enterprises and property managers." "By combining ARX’s robust security infrastructure with Sharry’s mobile-first technology, we enable a smarter, more efficient approach to access management – one that simplifies operations while maintaining the highest security standards.” The Sharry/ARX integration is now available to all ASSA ABLOY customers in the Scandinavia region.
With a vast portfolio of smart locks, lock management systems, and connected readers, ensuring strong authentication, data integrity, and compliance with global regulations is essential. To meet these challenges, ASSA ABLOY is leveraging the long-time IoT expertise of HID to implement HID PKI-as-a-Service. This strategic deployment is not just about protecting millions of connected devices but also about future-proofing ASSA ABLOY’s security infrastructure for years to come. Cryptographic assurance: Securing every lock, inside and out ASSA ABLOY boosts trust in its devices, preventing unauthorised clones or counterfeit products A crucial aspect of this solution provides Genuine ASSA ABLOY products — an assurance that every smart lock, reader, and system within the network is verified as an authentic and authorised product. By leveraging PKI-based identity verification, ASSA ABLOY strengthens trust in its devices, preventing unauthorised clones or counterfeit products from entering the ecosystem. For example, the inside of a lock can only pair with a matching outside component from ASSA ABLOY, ensuring the integrity and security of the entire system. This level of cryptographic trust not only enhances device security but also strengthens protection against counterfeit components or unauthorised modifications. Meeting stringent security and compliance needs As the industry faces increasing regulatory pressure, including the EU Cybersecurity Act and the upcoming Cyber Resilience Act, ASSA ABLOY needed a scalable, automated solution to manage over a million certificates annually. HID’s expertise in certificate management provides enhanced security, reduced complexity HID PKI-as-a-Service enables seamless device authentication, automated provisioning, and hierarchical key management, ensuring compliance with evolving security standards. An essential part of the solution is the offline Root Certificate Authority (CA), which serves as the foundation for secure operations. HID’s expertise in certificate management provides enhanced security, reduced complexity, and operational efficiency across ASSA ABLOY’s global IoT ecosystem. Driving innovation and efficiency By integrating automated bootstrapping and customised attestation certificates, the implementation has significantly improved operational efficiency while minimising manual effort. This allows devices, including those operating offline, to maintain secure provisioning and updates without requiring constant connectivity. Additionally, the system is future-ready, designed to support emerging IoT protocols such as Thread, CoAP, EDHOC, and OSCORE, ensuring adaptability as the industry evolves. Collaborative success The success of this deployment is rooted in a strong alliance between ASSA ABLOY and HID The success of this deployment is rooted in strong collaboration between ASSA ABLOY and HID. A dedicated steering group ensured alignment on global PKI policies and security objectives, leading to a smooth rollout with minimal disruption. “The implementation of HID PKI-as-a-Service wasn’t just about meeting current security requirements, it was about future-proofing our IoT ecosystem for security and scalability,” says Anders Calbom, VP & Head of Technology Solutions, ASSA ABLOY. Major milestone in IoT security Anders Calbom added: “With the ability to manage over a million certificates annually, we’re now positioned to scale our security infrastructure alongside our business growth.” This initiative marks a major milestone in IoT security, compliance, and operational efficiency. As ASSA ABLOY continues to innovate and expand, HID PKI-as-a-Service provides the secure foundation needed to drive future growth and digital transformation.
Slavija Residence Luxury, a premium residential complex in Novi Sad, Serbia, has implemented its security infrastructure with DNAKE’s cutting-edge smart intercom systems. The installation covers 16 high-end apartments, combining sleek design with advanced technology to enhance resident safety and access control. The solution In the connected world, modern residents prioritise both security and convenience—demanding access control that’s not just robust but also effortlessly integrated into their lifestyles. DNAKE’s smart intercom systems deliver exactly that, blending advanced protection with intuitive technology for a smarter living experience. Unmatched Security: Facial recognition, instant video verification, and encrypted access management ensure residents’ safety is never compromised. Effortless Connectivity: From HD video calls with visitors to remote door release via smartphone, DNAKE keeps residents connected and in command, anytime, anywhere. Designed for Simplicity: With an Android-powered interface, sleek indoor monitors, and the Smart Pro App, every interaction is streamlined for users of all tech levels. Installed products S617 8” Facial Recognition Android Door Station H618 10” Android 10 Indoor Monitor Smart Pro APP


Round table discussion
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
In the past, security installers and integrators were used almost exclusively to install hardware. However, the role is changing and expanding along with the technologies used in the physical security industry. Nowadays, an installer or systems integrator is much more likely to use a strategic, IT-centric, and data-driven approach. To gain additional insights, we asked our Expert Panel Roundtable: How is the role of the security installer/integrator changing?
Products


White papers

Open credential standards and the impact on physical access control
Download
What is a universal RFID reader?
Download
System design considerations to optimize physical access control
Download
The 4 pillars of AI in managing high-stakes critical events
Download
The power of integration in physical security systems
Download
How biometrics are reshaping security in a connected world
Download
The ultimate guide to mastering key control
Download
Palm vein recognition
Download
The key to unlocking K12 school safety grants
Download
The 2024 state of physical access trend report
Download
The security challenges of data centers
Download
Access control system planning phase 2
Download
Access control system planning phase 1
Download
The truth behind 9 mobile access myths
Download
Multi-residential access management and security
Download

Videos
Security access systems: Manufacturers & Suppliers
- ABLOY Security access systems
- Vanderbilt Security access systems
- HID Security access systems
- CyberLock Security access systems
- Alpro Security access systems
- Bosch Security access systems
- Hikvision Security access systems
- Software House Security access systems
- CEM Security access systems
- AMAG Security access systems
- Aiphone Security access systems
- Parabit Security access systems
- Honeywell Security Security access systems
- Delta Scientific Security access systems
- Aritech Security access systems
- TESA Security access systems
- ASSA ABLOY - Aperio® Security access systems
- CIVINTEC Security access systems
- Dahua Technology Security access systems
- Nedap AEOS Security access systems

Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download