SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alcatraz Completes SOC 2 Audit With A-LIGN
    • Datalogic Showcases AI-Driven Retail Solutions At NRF 2026
    • Deep Sentinel's Solar-Powered Security Solution
    • Eplan And CADENAS Partner For Device Data Expansion
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why Open Matters In The Age Of AI
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6

Electronic access control

  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Alcatraz Completes SOC 2 Audit With A-LIGN

Alcatraz Completes SOC 2 Audit With A-LIGN

Corporate
Thales Enhances AI Security For Business Protection

Thales Enhances AI Security For Business Protection

Corporate
WatchGuard Shines In MITRE ATT&CK ER7 Evaluation

WatchGuard Shines In MITRE ATT&CK ER7 Evaluation

Corporate
Exploring PSIA's PKOC: A Security Game Changer

Exploring PSIA's PKOC: A Security Game Changer

Corporate
ICT Expands In CEE: Piotr Rek Joins As Sales Director

ICT Expands In CEE: Piotr Rek Joins As Sales Director

Corporate

News

Aperio Wireless Locks Integrated With Rhombus Security
Aperio Wireless Locks Integrated With Rhombus Security

ASSA ABLOY Opening Solutions completed the integration of its Aperio® wireless lock technology with access control from Rhombus, an open, cloud-managed physical security platform that brings security cameras, access control, sensors, alarm monitoring, and software integrations together under a single pane of glass. Aperio wireless locks “With this integration, customers can now extend the power of Rhombus into doors and areas where wired access control simply isn’t practical. Pairing ASSA ABLOY’s industry-pioneering Aperio wireless locks with the Rhombus cloud platform gives a flexible, scalable, and truly unified approach to security." "From schools to hospitals, manufacturers to enterprises, this partnership is further enabling organizations to manage access, video, sensors, and AI-driven intelligence through a single, cloud-based experience; no on-prem servers or complex deployments required,” said Brandon Salzberg, Chief Technology Officer at Rhombus. New and existing access control installations The Aperio integration offers Rhombus customers an easy way to connect additional openings to both new and existing access control installations. Aperio is a global wireless platform that works with extensive locking hardware options from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility. The platform uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication with the access control system, simplifying installation and reducing costs. Rhombus access control suite The Rhombus access control suite is a sophisticated enterprise solution that pairs seamlessly with Rhombus cameras, sensors, and alarms creating a complete ecosystem for managing building security - helping drive faster, smarter investigations, increase security visibility and reduce threats. Rhombus Console then becomes the central nervous system of your physical security; a user-friendly, cloud video management system designed to unify and streamline camera, access control, and live monitoring applications, easily scaled to unlimited cameras, doors, users, devices, and locations. Cloud-native approach “Rhombus brings a modern, cloud-native approach that makes it easier for organizations to unify and manage security across their entire environment,” said Angelo Faenza, Head of Access Control Solutions at ASSA ABLOY. “Through this integration, customers can experience the flexibility of Aperio locks alongside the simplicity and scalability of the Rhombus platform—removing the barriers of traditional access control and enabling smarter, more connected facilities.”

High-Security Wedge Barriers By Delta Scientific
High-Security Wedge Barriers By Delta Scientific

A wedge barrier system is one of the most effective physical security measures for stopping unauthorized vehicles from accessing a restricted area. Designed for high-threat environments, these barriers prevent breaches that could cause significant harm to people, property, or critical infrastructure. Understanding what a wedge barrier is will help they determine if it’s the right solution for the security plan. What does a wedge barrier system do? A wedge barrier is a heavy-duty, ground-mounted barricade that rises from the ground into a high-strength, angled plate capable of stopping a moving vehicle. When deployed, the wedge shape creates a nearly impenetrable obstacle, able to bring even large, fast-moving vehicles to a stop within a short distance. What makes wedge barriers stand out from other types of traffic barriers, like bollards, tire shredders, or swing gates, is their combination of low visibility when not in use and high stopping power when deployed. Unlike fixed obstacles, wedge barriers can remain completely hidden below ground level until activated, allowing for unobstructed traffic flow during normal operations.  Unlike visual deterrents, wedge barriers are crash-rated to meet rigorous standards, such as ASTM or Department of State (DOS) certifications. This means they’ve been tested to withstand direct impact from vehicles of various sizes and speeds without failing. How does a wedge barricade system work? When a security operator or automated system activates the barrier, hydraulic or electromechanical drives raise the steel plate to its protective position. Once fully deployed, the angled plate acts as a solid wall against an oncoming vehicle.  In a breach attempt, the wedge barrier’s structural design forces the vehicle’s front end upward while absorbing and redistributing the energy of the impact. This combination of vehicle immobilization and energy dissipation makes them far more effective than lighter barricades or purely passive deterrents. Additionally, many models are engineered to integrate with advanced access control systems, enabling automated operation based on security alerts or preset protocols. Their rapid deployment speed, typically just a few seconds, makes them ideal for environments where both convenience and immediate threat response are critical.  Where should wedge barricades be installed? Wedge barriers are most often used at vehicle access points where security and controlled entry are paramount. Common installations include: Government and Military Facilities: Where vehicle-borne threats are a concern, wedge barriers form part of multi-layered entry control points. Corporate Headquarters and Data Centers: To protect against both targeted attacks and unauthorized intrusion attempts. Airports and Transportation Hubs: To secure restricted zones while maintaining smooth traffic during permitted access times. Stadiums, Arenas, and Event Venues: For crowd safety and prevention of vehicular attacks during large gatherings. Critical Infrastructure Sites: Power plants, refineries, or water treatment facilities, where disruptions could have wide-reaching consequences. It’s important to note that wedge barriers work best as part of an integrated security system. A robust entrance barrier loses effectiveness if the surrounding perimeter is weak, such as a basic chain link fence that can be cut or driven through. Combining a wedge barrier with reinforced fencing, surveillance, and access control systems ensures complete protection rather than a single point of defense. Where are wedge barriers most effective? Wedge barriers are versatile in deployment and can be raised in numerous security scenarios, including: During high-alert security conditions In response to suspicious vehicle activity, such as a vehicle approaching at high speed or refusing to stop at checkpoints To block vehicle entry outside of authorized hours When crowd safety and controlled access are paramount In response to emergency incidents like nearby attacks, riots, or security breaches. By combining operational readiness with rapid activation, wedge barriers ensure that they can respond to both expected and unexpected security threats without compromising day-to-day traffic flow. Choose high-security wedge barriers that they can trust At Delta Scientific, they design and manufacture high-impact protection systems that meet and exceed stringent performance standards. The counter-terrorism barricades are trusted by U.S. government agencies, military installations, and critical facilities worldwide for their reliability, durability, and proven stopping power. Whether they’re securing a sensitive federal site or safeguarding a high-traffic public venue, a wedge barrier can be an essential component of the security strategy. Explore the range of high-security wedge barricades and find the model that best suits their security needs. 

TDSi Becomes TDSi By Hirsch In 2026
TDSi Becomes TDSi By Hirsch In 2026

Integrated access control and security manufacturer TDSi now announces that from 1st January 2026, it will operate under the new name: TDSi by Hirsch. The change follows the global transformation of its parent company, Vitaprotech, into the Hirsch Group, unifying its security brands worldwide under one trusted name.  TDSi’s integrated access control For more than 40 years, TDSi’s integrated access control solutions have been at the heart of thousands of installations across education, healthcare, government, and commercial environments in the UK and around the world. This proven expertise remains the foundation of what we deliver. Building on that strength, our further integration with Hirsch enhances what TDSi already offers. Customers will now benefit from access to Hirsch’s portfolio of high-security Access, Perimeter and Video solutions. Together, these additions create one of the most comprehensive and cohesive security offerings in the UK market, reinforcing and extending the trusted solutions our customers rely on. The new TDSi by Hirsch brand reflects Hirsch Group’s vision of harmonising, innovating, and internationalising its security solutions, while ensuring continuity and reliability for long‑standing customers. Hirsch’s global platform Richard Huison, UK Managing Director of Hirsch Secure and TDSi, commented: “TDSi has built a strong reputation in the UK and beyond, with installations in some of the most demanding environments worldwide. Becoming TDSi by Hirsch strengthens that legacy by combining our proven access control expertise with Hirsch’s global platform." "For our customers, nothing changes in terms of service or support, it is very much business as usual. What does change is the breadth of solutions we can now offer, from perimeter to core security, giving our partners and end‑users access to a truly unified security portfolio that is scalable, interoperable, and future‑ready.”  TDSi moves into next chapter TDSi joined Vitaprotech Group in 2019, followed by Hirsch in 2024. The group of security specialists will adopt the globally recognized Hirsch name on 1st January 2026, instantly conveying premium positioning, federal-grade trust, and worldwide ambition. Eric Thord remains CEO, with Steven Humphreys as Deputy CEO, driving a clear vision: global strategy, local execution, delivering innovative, interoperable security solutions precisely tailored to each market. As TDSi moves into this next chapter as TDSi by Hirsch, its commitment to its customers, partners, and the wider security community remains unchanged. All existing products, services, support channels, and points of contact will continue as normal, ensuring complete continuity throughout the transition. Customer-first approach Customers can expect to see the TDSi by Hirsch Logo begin to roll out from early next year, marking the start of a gradual evolution rather than an overnight change. With the strength of the Hirsch Group behind it, TDSi is poised to deliver even greater value while continuing to operate with the same reliability, expertise, and customer-first approach that have defined the business for over four decades.

AI-Driven Security: HiveWatch's New Leadership
AI-Driven Security: HiveWatch's New Leadership

HiveWatch, the AI-driven physical security platform, announced it has appointed James Segil to its board of directors. Segil joins at a pivotal moment for the company following its recent $33 million Series B funding round, led by Anthos Capital with participation from Harmonic Growth Partners, Across Capital, and existing investors.  Segil’s addition to the board brings invaluable strategic guidance from someone who disrupted a major physical security category – turning smartphones into security credentials. His hands-on experience in enterprise sales, partner ecosystems, and go-to-market execution will be instrumental in accelerating HiveWatch’s growth post-raise. Prior roles of Segil Segil is a serial entrepreneur and technology executive with a long track record of building and scaling companies across access control, security, and enterprise infrastructure. Most recently, he served as President and Co-Founder of Openpath Security, a next-generation physical access control provider acquired by Motorola Solutions in 2021. At Motorola Solutions, Segil led marketing and inside sales for the Video Security & Access Control division, helping the organization expand its global footprint and product adoption. next phase of growth Prior to Openpath, Segil co-founded and led multiple technology companies to successful exits, including EdgeCast Networks (acquired by Verizon), KnowledgeBase Solutions (acquired by Talisma), and Virtualis Systems (acquired by Allegiance Telecom).  “Physical security is at an inflection point, and HiveWatch is at the forefront of defining what the modern GSOC should look like,” said Segil. “The team has built a platform that solves real-world problems for some of the world’s largest organizations. I’m excited to partner with Ryan, Jordan, and the HiveWatch board as the company accelerates into its next phase of growth.” HiveWatch's disconnected security tools HiveWatch brings together previously disconnected security tools - video, access control, alarms, sensors, threat intelligence, and more - into a single dashboard that fuels a streamlined security program. At the core is the company’s AI Operator, which learns each customer’s environment and dramatically reduces false alarms while accelerating incident response. HiveWatch protects assets across every continent, and an estimated 95% of Americans interact with a product, service, or brand protected by the company’s technology. Most complex enterprises “James has built category-defining companies across multiple verticals, and we welcome his valuable insights as we enter our next phase of growth,” said Ryan Schonfeld, Co-Founder & CEO of HiveWatch. “His track record scaling organizations will help us meet rising demand from many of the world’s most complex enterprises to protect their people and operations.” 

View all

Expert commentary

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measures are in place beyond the perimeter door in case the worst happens and it’s somehow breached? Hopefully, many more levels of access control are in place to prevent, or at least slow down, a perpetrator’s ability to compromise protected assets. Additional interior layers Interior security measures must operate as an integrated, multilayered system that eliminates single points of failure. These inner protections safeguard not only the physical infrastructure but also the operational integrity, confidentiality, and availability of the systems housed within. Beyond simply preventing unauthorized individuals from getting inside, the goal is to create a controlled, monitored, and resilient environment in which every movement, action, and access attempt is verified, logged, and, when necessary, challenged. As modern buildings, data centers, and infrastructure sites host critical functions and potentially sensitive intellectual property, these additional interior layers become essential to protecting both organizations and their proprietary assets. Interior security controls One of the most important interior security controls is granular access segmentation One of the most important interior security controls is granular access segmentation. While a perimeter door may verify an individual’s right to enter the building, the interior should treat every room, cage, and corridor as its own security zone. Role-based access control and strict least-privilege principles should limit personnel to only the areas they absolutely require. For example, a network engineer may need access to routing equipment but not storage racks; a janitorial contractor might be allowed into shared hallways but not any equipment rooms at all. These access restrictions should be enforced using intelligent keys, biometric scanners, mantraps, and, at particularly sensitive locations, two-factor authentication. Segmenting access in this way limits the potential damage from a single compromised badge or insider threat and ensures that a single breach does not cascade into a total facility compromise. Low-light and infrared capabilities Biometric authentication within a building adds a layer of confidence beyond perimeter controls. Technologies such as facial identification help prevent the use of stolen, cloned, or borrowed credentials. These systems complement anti-tailgating measures, such as sally ports or mantraps, which ensure that only one authenticated person passes through at a time. Interior surveillance is another essential measure. High-resolution cameras equipped with low-light and infrared capabilities should cover every hallway, door, rack row, and logistical pathway. Camera feeds must be continuously recorded, and retention policies must align with regulatory requirements. Intelligent video analytics, such as motion pattern recognition and heat mapping, enable the detection of atypical behaviors — such as someone lingering near a cage they are not authorized to access or movement at odd hours. Physical tamper-detection mechanisms Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities Integrating surveillance with access control systems creates a strong correlation; when someone successfully passes through a secured door and enters a room, the system can track whether the number of people seen on camera matches the number authenticated, and alert security if a discrepancy occurs. However, it is increasingly important that access control not stop at the room level, because the most sensitive assets are often housed in cabinets, racks, or storage units within already-secured spaces. Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities, assets remain protected. Physical tamper-detection mechanisms on racks, cable trays, and server chassis add another dimension: they can detect if a panel is opened, a cable is unplugged, or a device is removed without authorization. Secure destruction protocols Another internal measure is the use of secure storage and chain-of-custody procedures for any components that contain intellectual property or personally identifiable information. Hard drives, backup media, and even printouts should be stored in locked cabinets accessible only to people with proper clearance. When decommissioning hardware, secure destruction protocols such as shredding or degaussing should be performed in controlled areas and thoroughly logged. Every movement of sensitive equipment should be traceable, from installation through end-of-life disposal. Such processes reduce the risk of data leakage from improperly discarded or undocumented devices. Consequences of improper behavior Staff should be trained to recognize social engineering attempts, unusual behaviors, and procedural deviations Operational security procedures also contribute significantly to interior protection. Background checks, ongoing employee vetting, and mandatory training ensure that individuals with access to sensitive areas understand their responsibilities and the consequences of improper behavior. Staff should be trained to recognize social engineering attempts, unusual behaviors, and procedural deviations. Maintaining a strict visitor escort policy prevents non-employees from wandering unobserved. All visitors should wear highly visible identification badges and be monitored continuously by authorized personnel. The building's interior should be treated as a controlled environment at all times, not merely a workspace. Continuous auditing and logging form Continuous auditing and logging form another pillar of interior security. Access logs from intelligent keys, biometrics, video, and environmental systems must be stored securely and evaluated regularly for anomalies. Automated systems can flag irregular patterns, such as repeated attempts to access unauthorized areas or entering rooms at odd hours. Manual audits validate that the access control list remains accurate, that no inactive or former employees retain credentials, and that documentation matches reality on the floor. These logs are indispensable during investigations, compliance assessments, and incident response efforts. Interior security controls Security networks should be isolated from the main IT networks to prevent a cyber incident Finally, redundancy and resiliency must be built into interior security controls. Electrical power for access control, intelligent keys, biometrics, and video systems should be backed by secondary sources, generators, or uninterruptible power supplies. Security networks should be isolated from the main IT networks to prevent a cyber incident from disabling physical protections. The goal is to ensure that interior security remains functional even during outages, disasters, or cyber disruptions. Multilayered approach Together, these additional interior measures create a layered defense that makes a secure building, data center, or infrastructure site extremely difficult to compromise. Rather than relying on a single barrier at the entrance, the environment becomes an ecosystem of mutually reinforcing controls — physical, operational, digital, and procedural. This multilayered approach allows structures to maintain high levels of protection even as threats evolve, ensuring that the systems inside remain secure, resilient, and trustworthy.

Design To Finish: Approaching Access Control In Healthcare
Design To Finish: Approaching Access Control In Healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff and administrators to vulnerable patients, visitors and maintenance personnel. Safeguarding their safety and security, while providing seamless operation is a complex challenge - one frequently solved by access control. Use of access control Today’s security solutions play a central role in protecting people and mitigating risk across much of our built environment. An appropriately specified system is effective at regulating, monitoring and restricting entry and exits, and allows users to navigate an integrated network and its hardware to ensure the right access is provided to the right person at the right time. In healthcare buildings, the use of access control expands further, whereby a system can tackle a host of unique operational challenges - significantly contributing to fire safety, ease of movement and the theft prevention of equipment, medicine and sensitive patient data, and all while protecting human life and preserving privacy and dignity. In healthcare buildings, the use of access control expands. In doing so, access control can become the cornerstone of functionality, compliance and organization in any healthcare environment. Though, as the complexity of projects deepen, decision makers are reminded that coordination is key. Preparing and empowering users Between January and March 2025, there were over 832,000 patient safety events recorded in the NHS. While each of these events may not be directly linked to building security specifically, the healthcare industry is faced with a considerable number of safety incidents, which suggests greater monitoring and mitigation is needed across the board. Access control often provides staff with the vital means of retaining control without impeding care Patient well-being and security will always remain paramount in the sector, and access control often provides staff with the necessary means of retaining control without impeding care. Hospitals for example, sustain a high level of footfall across large campuses with multiple points of entry and on-site patient record systems, presenting a number of simultaneous security tests as a result. Though, unlike other public buildings, where rigid security measures are active at all times, many healthcare environments must strike a balance throughout their security framework to meet a host of one-of-a-kind demands. Use of access credentials With a continuous influx of patients, staff and visitors, healthcare groups are habitually required to remain accessible and inviting around the clock. At the same time, they must also be prepared to deter unwanted visitors in areas of restricted access and lock down intensive wards to ensure patients remain safe and secure under periods of monitoring. For this, the use of access credentials is critical and provides a regulated system for sensitive staff-controlled areas such as pharmacies, wards, and server rooms. By applying role, zone, or schedule-based access, decision makers can authorize personnel seamlessly, empowering facilities to manage patient care without compromising security in the process. Use of access credentials is critical and provides a regulated system for staff. Implementation of AI-powered tools and devices Modern systems may incorporate the use of keycards, biometric scanners, and mobile credentials When it comes to the operation of these systems, training gaps are a concern, however. Over the five years up to February 2025, numbers of NHS doctors rose by 26%, with nurses also up 25%, and this influx of new staff requires education towards the usage of access control.  Modern systems may incorporate the use of keycards, biometric scanners, mobile credentials and in some cases, voice-activation, with the implementation of AI-powered tools and devices set to play a more prevalent role in the future. Each system presents its own benefits and may be better suited to certain projects and areas, but without consultation and proper user education, they can instead become a barrier. Strategy, scalability, performance To alleviate these operational threats, early-stage planning is fundamental. Just as end-user education and training should be built into project timelines, it’s important to consider the growing need for cooperation throughout the entire supply chain of an access control project. A collaborative approach becomes even more critical when innovative solutions enter the market All too often, a lack of evidence-based decision making can hinder the specification of a scheme and its accompanying hardware, whereby choices are made without understanding long-term performance or compliance requirements. Whether approaching a new or retrofit development, ongoing communication allows experts to come together and ensure that product decisions are aligned with the buildings intended use and user base. This collaborative approach becomes even more critical when innovative solutions enter the market and new sector challenges arise. Latest access control products With this in mind, trusted manufacturers will no longer simply deliver the latest access control products, but will aim to work alongside the architects, specifiers, contractors, and facility managers at each stage of the building’s lifecycle to ensure touchpoints are addressed. This is crucial in modern healthcare environments, where the added layer of complexity requires tailored security measures. One area that is often neglected is scalability, for example. As healthcare facilities manage fluctuating patient numbers and a growing level of patient data, along with new regulations, systems must be adaptable and allow for ongoing improvements and updates to the security infrastructure without the need for a complete overhaul. By adopting a scalable system that combines technology integration with ease of use, decision makers can future-proof their building’s security. Manufacturers will no longer simply deliver the latest access control products Complexity of the healthcare industry In truth, access control has become more than a means of restricting access. Modern systems are more equipped than ever before to deliver environments that support care, safety, and operational excellence.  Nonetheless, the complexity of the healthcare industry and its buildings demands more than product innovation - it requires an industry-wide commitment to collaboration, from project conception to product installation and beyond.

ASSA ABLOY Discusses How The Door Security Industry Can Keep Rising To The Occasion
ASSA ABLOY Discusses How The Door Security Industry Can Keep Rising To The Occasion

If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity.   Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more.    Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise.   That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future.  Caution: curves ahead  As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic.  Bypassing tailored approach Commoditization poses risks to customized systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditization in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials.   In other words, commoditization, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customized systems integration, good design, the environment, and potentially security itself.   Change for the better  Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditization. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions.   From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact.   Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims.   Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations.  On the near horizon  Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition.   Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption.   Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration.  Application engineering  It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditization of security and access control solutions.  Serving underserved communities  Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organizations’ budgets.   Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement.  Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases.   Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organizations better manage their time, resources, and security.  Training  The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall.  Change, innovation, and learning A manufacturer or organization that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security.  Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.  

View all

Security beat

HID Highlights Digital Transformation, Futureproofing Among Access Trends
HID Highlights Digital Transformation, Futureproofing Among Access Trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioral insights. Access data itself is becoming an asset for sustainability, space optimization, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organizations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organizations digitize their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organizations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximizing the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organizations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organizations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organizations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organizations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognized certifications, including ISO 27001, ISO 14298, SOC Type 2, and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organizations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimization by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetization, and monetization funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed-use development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimization, particularly when it comes to monitoring facilities usage and occupier behaviors. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognized sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

How Babel Street Extracts Intelligence From A Swelling Sea Of Data
How Babel Street Extracts Intelligence From A Swelling Sea Of Data

Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’  However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially.  Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights.  Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.

AI And The Cloud Provide New Solutions To Old Problems At GSX 2023
AI And The Cloud Provide New Solutions To Old Problems At GSX 2023

Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge  i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set.  AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in.  “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals  Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.”  “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities.  International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY.  Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud  Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer.  The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa.  Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says.  “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says.  Disrupting the cloud based on price  Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier.  Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards.  Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers.  Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine.  Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times. 

View all

Case studies

Comelit-PAC Video Door Entry At Bridgwater Arts Center
Comelit-PAC Video Door Entry At Bridgwater Arts Center

Comelit-PAC has partnered with Kings Group SW to deliver a bespoke video door entry solution at the historic Bridgwater Arts Center, a Grade I listed building renowned for its architectural and cultural significance. Situated in the heart of Bridgwater, now owned and operated by the Town Council, the Arts Center construction was in 1723 and established on its existing site since 1946 to run a theater program of performance, music and film. Enhancing video security and access To complete a renovation program, the Arts Center worked with Kings Group SW to upgrade its door entry system to incorporate a modular video design. “The Grade I listing of Bridgwater Arts Center means that any changes, however minor, must be carefully planned to protect the building’s historic character,” said Scott Mason, Director of Amenities at Bridgwater Town Council. “We involved our teams in the initial design and specification process to ensure the solution could be installed to seamlessly blend with its surroundings while enhancing video security and access.” Latest security standards Kings Group SW specified Comelit-PAC’s Ultra Door Entry system, a high-definition video intercom solution designed to allow staff to monitor all entry points via high-definition video intercoms, providing real-time visibility and secure access control.  Adam Pitman, Security and Life Safety Systems Supervisor at Kings Group SW, added: “Every aspect of the door entry upgrade had to be approached sensitively. This included routing cables discreetly, installation and ensuring the system met the latest security standards. By choosing Comelit-PAC’s modular system, this could be achieved with minimal disruption to the building’s historic fabric while providing a flexible solution that can be adapted as the Center’s security needs evolve.” Configuration of the door entry solution The Ultra system was selected because its modular design enabled a simple configuration of the door entry solution to meet the specific requirements of the Arts Center. Its 2-Wire and ViP door stations allow a combination of audio, video, and button modules in a compact layout, giving the team flexibility to adapt the system to access points. Tony Berry, Business Development Manager at Comelit-PAC, concluded: “Working closely with Kings Group SW and Bridgwater Arts Center early on allowed us to tailor the solution specifically for this site. By understanding the needs of the team and how the building operates, we were able to deliver a system that functions seamlessly for staff, visitors and performers while integrating thoughtfully into the historic environment.”

Secure patented key control at Dartmoor Zoo
Secure patented key control at Dartmoor Zoo

Set in 33 hectares of woodland on the edge of Dartmoor National Park, the zoo is home to an impressive variety of exotic and native animals, including Amur tigers, African lions, and Amur leopards. New patented master key system On-site challenges before the introduction of the new patented master key system. Before implementing the new master key system, the zoo faced the challenge of ensuring secure and efficient access control to sensitive areas, particularly enclosures with potentially dangerous animals. The previous master key systems were outdated and did not provide the necessary security and flexibility required for the zoo's daily operations. Installation of EPS NP and its advantages The EVVA EPS NP system was installed in collaboration with local partner Sir Fix-a-Lock. This system offers robust patent protection, long-term key control and high reliability in demanding environments. A total of 192 Asec weatherproof padlocks were installed in a 6-level master key system. The flexibility of EPS NP enabled graduated key control across the entire site, including special levels for animal care. Advantages of the new patented key system for the zoo Thanks to the new master key system, the zoo has been able to implement a secure and practical solution that enables staff to work efficiently while maintaining strict access controls. The color-coded keys make it easy to quickly identify access authorisations, which is particularly advantageous in security-critical areas. The Asec weatherproof padlocks also offer high resistance to environmental influences, ensuring the longevity of the system. "EPS has revolutionized our access control and gives us the security and flexibility we need." The project at Dartmoor Zoo impressively demonstrates how EVVA's flexible master key systems can be adapted to specific requirements to ensure security, control and long-term protection.

Gunnebo's Solution Enhances ZQN Passenger Flow
Gunnebo's Solution Enhances ZQN Passenger Flow

Gunnebo Entrance Control has partnered with Queenstown Airport (ZQN) and Custom Technology Systems Ltd to elevate the domestic departure experience, providing greater convenience and security for passengers. Queenstown Airport, a key gateway to New Zealand’s South Island and the country’s fourth-busiest airport, has evolved continuously since opening in 1935. Now serving more than 2.6 million passengers each year, it connects major domestic destinations and east coast Australia, driving ongoing improvements to passenger facilities and operational efficiency. Entrance control solution As part of a dedicated program to enhance the domestic departures journey, ZQN reworked existing café space. A glass wall was installed to relocate the café airside, integrating it with the gate lounge. This provided direct food and beverage access for passengers and created additional seating, all within the same footprint. To support the new layout, Custom Technology Systems Ltd and Gunnebo Entrance Control worked closely with the on-site teams to deliver a tailored entrance control solution that balanced security and passenger flow while accommodating spatial limitations. Adapting to unexpected challenges “The success of this project was achieved by working together, adapting to unexpected challenges, and staying focused on delivering a secure, seamless journey for every passenger,” said Chris Walker, Project Manager at Queenstown Airport.  “Every challenge we encountered was met together. Whether it was refining the design, resolving compliance issues, or adapting to the space, we relied on each other’s strengths to get it right.” Gunnebo Entrance Control’s PasSec solution To optimize style, security and passenger movement, the team installed Gunnebo Entrance Control’s PasSec solution, a sleek one-way corridor system designed to prevent backflow while maintaining compliance with strict local and international aviation regulations. Brett Copeland, Managing Director at Custom Technology Systems Ltd, added: “For this works programme, there was a genuine sense of problem-solving together. It wasn’t about one party leading and others following but instead a collaborative process from initial design and specification through to project completion. We each brought ideas, worked through constraints and stayed focused on making the solution fit.” Challenges together to deliver smarter Clive Dillen, Regional Manager at Gunnebo Entrance Control, concluded: “We’re proud of what we achieved here, and the result reflects the true essence of coordination, discussion and trust. That’s what true partnership looks like and marks a major step forward in Queenstown Airport’s continued development." "It stands as a clear example of what can be accomplished when organizations work through challenges together to deliver smarter, more effective outcomes for passengers and operators.”

Enhancing Stadium Security With ASSA ABLOY eCLIQ
Enhancing Stadium Security With ASSA ABLOY eCLIQ

With a capacity of 66,500 spectators, the MERKUR SPIEL-ARENA is the largest multi-purpose venue in Düsseldorf and home to the city’s main football team, Fortuna. Regular and constantly changing major events, both matches and concerts, present an ever-evolving security and access challenge. Stadium managers D.LIVE sought a secure, reliable replacement for their mechanical master key system; comprehensive, flexible security which would no longer create the problems and inconvenience of mechanical keys. Digital locking system Due to frequently changing event formats and service providers, keys were often lost, causing considerable administrative work and financial expense. Due to the large number and size of the areas to be secured, it became clear that only a digital locking system would combine the required performance features in a convenient solution. Another critical requirement was for robust devices which did not protrude from doors: football and music events can sometimes be a little rough. The technology installed needed to be tough and reliable enough to withstand the odd kick. Key requirements for the new system Finally, the solution would also need to simplify the management and rental of multiple private spaces inside the building, including the Promenade, Merkur Business Club, and boxes in the east wing. These offer additional space for a total of almost 7,000 people for meetings, press conferences or product presentations. One of the key requirements for the new system was, therefore, the ability to grant and revoke access authorizations individually, especially for external event organizers and operators. Innovative key-based digital access Based on these requirements and their experience with other local venues, D.LIVE chose the eCLIQ programmable-key locking solution, part of a suite of Digital Access Solutions from ASSA ABLOY, which scores highly on security, reliability and convenience. Their new eCLIQ key-operated digital access solution has approximately 2,500 wireless cylinders; around 1,150 programmable eCLIQ Connect keys have been issued. With this solution, every authorized keyholder carries their own eCLIQ key which can be programmed with tailored access authorizations. For added security, access rights can be individually revoked at any time and lost keys can be blocked. Convenient management of contractor access “One of the reasons we chose eCLIQ Connect keys was to enable us to grant or revoke authorizations to external organizers and operators via Bluetooth in a rapid and user-friendly way,” says Lukas Angenendt, VEFK & Project Manager Electrical Engineering, D.LIVE. Powerful, intuitive software makes it easy for stadium managers to issue temporary authorizations for contractors, cleaning staff, and external event service providers, which streamlines site maintenance and management. As an additional layer of security, their eCLIQ Connect keys have to be validated on site by entering a PIN code in the smartphone app. Digital security enhancements In addition to the digital security enhancements, eCLIQ’s high degree of flexibility was another big plus: eCLIQ is convenient to handle and program as, for example, the power supply and communication with each cylinder take place via the battery-powered key. There’s no need to visit every door or device to replace its battery. No wiring is required for the very low-maintenance cylinder, which is fitted flush to the door and thus offers no attack surface for vandalism. Cable-free installation was also simpler and quicker: only two weeks, when no events were taking place in the stadium, were available for the conversion of all doors.

View all

Round table discussion

How Can Organizations Integrate Physical Security With Other Systems, Such As IT And HR?
How Can Organizations Integrate Physical Security With Other Systems, Such As IT And HR?

By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department transfers. In fact, connecting HR and information technology (IT) systems to physical security can provide many significant benefits in terms of access control, incident response, compliance, cost savings, and employee experience. We asked this week’s Expert Panel Roundtable: How can organizations integrate physical security with other systems, such as IT and HR?

Which Standards Have Had The Greatest Positive Impact On Physical Security?
Which Standards Have Had The Greatest Positive Impact On Physical Security?

In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?

What Current Technology Is A Game Changer For Security?
What Current Technology Is A Game Changer For Security?

Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preconceptions and may create a total transition in the broader market. These are the technologies we call “game changers” because they prompt a significant shift in the current manner of doing or thinking about security. We asked this week’s Expert Panel Roundtable: What current technology is a “game changer” for physical security?  

View all

Products

Software House GSTAR016 Cyber-Hardened Network Door Controller

Software House GSTAR016 Cyber-Hardened Network Door Controller

Software House GSTAR-ACM Cyber-Hardened Network Door Controller

Software House GSTAR-ACM Cyber-Hardened Network Door Controller

Software House GSTAR-GCM Cyber-Hardened Network Door Controller

Software House GSTAR-GCM Cyber-Hardened Network Door Controller

Software House GSTAR004-RM IP Edge Access Door Controller

Software House GSTAR004-RM IP Edge Access Door Controller

Software House USTAR-GCM Network-Ready Door Controller

Software House USTAR-GCM Network-Ready Door Controller

Software House USTAR-CAN Enclosure

Software House USTAR-CAN Enclosure

Software House USTAR-ACM Network-Ready Door Controller

Software House USTAR-ACM Network-Ready Door Controller

Software House GSTAR004-MB IP Edge Access Door Controller

Software House GSTAR004-MB IP Edge Access Door Controller

Software House USTAR016 Network-Ready Door Controller

Software House USTAR016 Network-Ready Door Controller

Software House GSTAR004-MBP IP Edge Access Door Controller

Software House GSTAR004-MBP IP Edge Access Door Controller

Software House USTAR008 Network-Ready Door Controller

Software House USTAR008 Network-Ready Door Controller

Software House ESTAR004-RM Four-Reader IP Edge Access Door Controller

Software House ESTAR004-RM Four-Reader IP Edge Access Door Controller

Software House PSX-RGS-X1 2U Multi-Purpose Rack Enclosure

Software House PSX-RGS-X1 2U Multi-Purpose Rack Enclosure

Software House USTAR-GCM-2U Network-Ready Door Controller

Software House USTAR-GCM-2U Network-Ready Door Controller

Software House SSVR3-BR 19-Inch Rack Mount Bracket

Software House SSVR3-BR 19-Inch Rack Mount Bracket

View all

White papers

One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Enhancing Physical Access Control Using A Self-Service Model

Enhancing Physical Access Control Using A Self-Service Model

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
The Ultimate Guide To Mastering Key Control

The Ultimate Guide To Mastering Key Control

Download
Palm Vein Recognition

Palm Vein Recognition

Download
Physical Access Control

Physical Access Control

Download
The Key To Unlocking K12 School Safety Grants

The Key To Unlocking K12 School Safety Grants

Download
The 2024 State Of Physical Access Trend Report

The 2024 State Of Physical Access Trend Report

Download
The Security Challenges Of Data Centers

The Security Challenges Of Data Centers

Download
View all

Videos

Insta DomainLink Secret™

Insta DomainLink Secret™

Corsight AI And AusComply Help Identify Gambling Self-Excluders At Sydney's Pubs

Corsight AI And AusComply Help Identify Gambling Self-Excluders At Sydney's Pubs

Aperio wireless locks help to achieve sustainability goals at University of St Andrews, Scotland

Aperio wireless locks help to achieve sustainability goals at University of St Andrews, Scotland

Upgraded Feature For Xesar - Now With Smartphone As Well!

Upgraded Feature For Xesar - Now With Smartphone As Well!

View more

Electronic access control: Manufacturers & Suppliers

  • ASSA ABLOY Electronic access control
  • Software House Electronic access control
  • CyberLock Electronic access control
  • Aiphone Electronic access control
  • ACT Electronic access control
  • Honeywell Security Electronic access control
  • Bosch Electronic access control
  • HID Electronic access control
  • Paxton Access Electronic access control
  • Alpro Electronic access control
  • CLIQ - ASSA ABLOY Electronic access control
  • CIVINTEC Electronic access control
  • Hikvision Electronic access control
  • ASSA ABLOY - Aperio® Electronic access control
  • CDVI UK Electronic access control
  • Dahua Technology Electronic access control
  • Codelocks Electronic access control
  • TDSi Electronic access control
  • OPTEX Electronic access control
  • SALTO Electronic access control

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
About this page

In-depth coverage of Electronic access control, featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Electronic access control from security industry experts and thought leaders.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec