Internet of Things (IoT)
Datalogic, a pioneer in automatic data capture and process automation, will demonstrate how its integrated portfolio is empowering the intelligent store at NRF 2026, thanks to AI-driven integration. Visitors to Booth 6128 will discover how advanced scanning, mobile computing, RFID, and IoT solutions are driving measurable outcomes for retailers: better customer loyalty, more revenue, fewer errors, higher labor efficiency, accelerated in-store productivity, and the creation of seamless customer...
Wachter Inc., a pioneering technology solutions integrator and innovator, is pleased to provide the Loss Prevention Research Council (LPRC) with a state-of-the-art Proto LUMA hologram unit to enhance retail education and innovation efforts. This advanced technology will serve as an immersive platform to educate the retail community on loss prevention, history, and ongoing trends, while also offering dynamic marketing and engagement opportunities. Proto LUMA unit The Proto LUMA unit, a fully...
Water ecosystems, ranging from high-altitude glacial lakes to expansive wetlands, are essential to the planet. These ecosystems regulate the climate, filter pollution, and support rich biodiversity. However, many are located in remote, hard-to-access areas, leaving them susceptible to gradual and often unnoticed degradation. The silent crisis in the blind spots The most significant challenge in protecting these vital waters is the growing gap between the rapid pace of environmental change and...
Secutech, Asia’s premier security exhibition, will be held from 22 – 24 April 2026 at the Taipei Nangang Exhibition Center, Hall 1. This edition promises a robust showcase of more than 400 international exhibitors and an expected influx of over 15,000 visitors. Against the backdrop of Taiwan’s government investing USD 3 billion to accelerate its transformation into an “AI island”, this year’s focus will center on four key industry pillars across seven themati...
Balancing operational efficiencies and customer satisfaction with costs, resources, and legislative obligations is a challenge faced by every security services provider offering keyholding and alarm response. While mobile security operations must adhere to strict compliance, with BS 7984 standard and SIA licensing for guards at the very core of the operations, security providers are increasingly contending with a wider range of regulations. Among the most pressing are sustainability requirement...
Wachter, Inc., a premier technology solutions integrator and innovator, proudly announces the appointment of James Stark as Business Development and Strategic Innovation Lead. With over 30 years of distinguished experience across various sectors, James is set to spearhead transformative initiatives that will enhance Wachter’s offerings for clients nationwide. A thought leader and respected speaker, Stark has graced national media platforms and industry conferences, sharing insights shaped...
News
Cellebrite, a pioneer in AI-powered Digital Investigative and Intelligence solutions for the public and private sectors, announces it has substantially expanded its capabilities through the acquisition of Corellium, a pioneer in Arm-based virtualization software. The addition of Corellium's technology and world-class technical talent further strengthens Cellebrite's market and technology leadership. Dramatically accelerating time This combination creates the industry's most complete digital investigation portfolio spanning physical device access, virtual device testing and real-time intelligence. The technology enables investigators, security researchers and intelligence professionals to work without physical device constraints while dramatically accelerating time to evidence and threat detection. The acquisition significantly expands the value of Cellebrite's AI-powered capabilities for a wide variety of customers. For example, defense and intelligence customers gain advanced virtualization for secure mobile application development, operational testing and accelerated mobile vulnerability discovery. Enterprise development and security operations teams can more efficiently and effectively design and validate next-generation mobile applications, as well as IoT and automotive systems. Customer-focused innovation “We are thrilled to officially welcome the Corellium team to the Cellebrite family,” said Thomas E. Hogan, Cellebrite’s chief executive officer. “Since announcing our agreement to acquire Corellium several months ago, we have been overwhelmed by interest in Corellium’s solutions. We are eager to unleash the power of this combination. This acquisition is an important step forward for Cellebrite as we continue to raise the bar for how technology can better protect citizens, communities, businesses and nations.” With the closing of this transaction, Chris Wade, Corellium’s co-founder and chief technology officer, has joined the Cellebrite leadership team as chief technology officer. “Cellebrite was the ideal home for Corellium’s technology and people,” said Wade. “The breadth and depth of the technical talent and resources across Cellebrite are impressive and inspiring. I look forward to collaborating with my colleagues to accelerate customer-focused innovation and further advance the Company’s mission.” Relevant government agencies The Committee on Foreign Investment in the United States (CFIUS) has permitted the acquisition to close on the basis of a national security agreement negotiated with relevant government agencies and executed by Cellebrite and Corellium pending formal clearance by CFIUS and execution of that agreement by such agencies. “This combination addresses the full spectrum of our mobile security and forensics requirements in a way no other solution can, giving us an unparalleled unified platform for both advanced security research and critical investigative operations.” - Principal security researcher, European intelligence agency. “Corellium Viper has already transformed our mobile security testing by tripling our pentesting coverage while cutting costs by over 60%, and the combination with Cellebrite's platform creates an unmatched capability for protecting our mobile infrastructure at scale.” -Head of mobile application security, Fortune 100 telecommunications provider. Certain performance milestones Cellebrite acquired Corellium for an enterprise value of $170 million, of which $150 million was paid in cash at closing, with $20 million converted to equity. Corellium securityholders will receive up to an additional $30 million in cash based on the achievement of certain performance milestones over the next two years. Cellebrite’s fourth-quarter and full-year 2025 expectations, which were provided most recently on November 12, 2025, did not include any impact from the Corellium acquisition. Please note that Cellebrite is not updating its fourth-quarter and full-year 2025 outlook at this time as the fourth-quarter impact from one month of Corellium’s revenue and costs is not expected to be material. Cellebrite also announces that it will participate in the upcoming UBS Global Technology and AI Conference.
Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more surveillance, access control, and IoT systems move into the cloud. Surveillance video, access control logs, and IoT sensor readings are among an organization's most sensitive assets. As they are increasingly hosted in data centers around the world, questions such as where that data resides, who governs it, and how it can legally be used are moving up the agenda for security and IT leaders. With organizations in the region increasingly relying on cloud-based physical security systems, understanding data sovereignty obligations has become just as vital as managing traditional risks such as theft, safety, and facility protection. Here are some key considerations for IT and physical security leaders as they review how and where their security data is stored and governed: The risks of crossing borders Why does it matter where data is stored? Because once information crosses national borders, it becomes subject to different, sometimes conflicting, laws. This can introduce certain risks, such as: Compliance penalties: Regulations such as GDPR in Europe, the CCPA in California, India’s Digital Personal Data Protection Act, and the Australian Privacy Principles (APP) impose strict guidelines on how personal data can be transferred internationally, and non-compliance can result in large fines. Loss of control: Data stored outside a jurisdiction may be accessible to foreign authorities, creating uncertainty about who can demand access and under what conditions. Geopolitical exposure: This loss of control particularly matters in times of political tension, when the flow of data across borders can create points of vulnerability, especially for critical infrastructure and other data of national interest. Operational disruption: If a regulator restricts access to data stored abroad, organizations may lose visibility into incidents just when they need it most. What to look for in a technology partner Meeting data sovereignty obligations is not just about an organization's internal policies. It also depends on the technology partners they select. When evaluating vendors, there are several areas physical security leaders should pay close attention to: Built-in privacy safeguards: Security systems should incorporate features such as role-based access controls, anonymization tools, and detailed audit trails. These capabilities ensure that sensitive data is handled responsibly from the start, rather than being bolted on after deployment. Deployment flexibility: Organizations need options. In some cases, storing all data on-premises makes the most sense. In others, cloud hosting is appropriate. Often, certain workloads are kept locally while others are processed in the cloud, which provides the right balance. The important point is that systems should allow for choice rather than forcing a one-size-fits-all model. Alignment with global regulations: Laws can change and, when technology is involved, things could move quickly. Systems that can adapt to evolving requirements give organizations confidence that they will remain compliant over time. This includes the ability to demonstrate where data is stored, both primary and redundant copies, and how it is managed, even if regulations shift. Practical steps for strengthening data sovereignty For physical security leaders, there are clear actions that can help strengthen data sovereignty: Map the legal environment: Identify which regulations apply to the organization across all the regions where users operate. Physical security data should be included in this assessment alongside IT data. Ask providers the right questions: Where will the data be hosted, including backups? How will it be processed? What are the options for local residency? Can one demonstrate compliance with applicable laws? What are their policies about accessing data when requested by government entities? Plan for change: Assume that regulations will evolve. Choose technologies and architectures that can adapt without requiring complete replacement. Invest in governance: Establish internal policies that cover how data is accessed, shared, and retained. This will help ensure consistency across sites and departments. A shared responsibility With more than 130 countries now enforcing some form of data protection law, data sovereignty has become a collective responsibility. IT, physical security, executive leadership, and regulators all play a role in ensuring that sensitive information is protected and compliant with local requirements. As cloud adoption accelerates and privacy laws continue to evolve, data sovereignty will only become more important. The organizations that succeed will be those that make it a strategic pillar of their cyber and physical security posture.
Hikvision's Shaping Intelligence 2025 – Commercial Summit concluded successfully in Bangkok, Thailand, drawing over 350 global business leaders, technology partners, and industry experts over two days. The summit showcased how AIoT technologies are transforming building and retail sectors worldwide, while recognizing outstanding customer achievements in digital transformation. AIoT powers intelligent commercial transformation Vivianna Wong, President of Hikvision Pan Asia Pacific, officially opened the summit, emphasizing Hikvision's dedication to empowering businesses through open collaboration and cutting-edge AIoT solutions. "We have always been committed to growing together with our partners, which is what the summit's theme—Thriving Business—is all about," Wong said. She highlighted Hikvision's remarkable global presence, noting that "Hikvision's commercial solutions have been deployed in over 180 countries and regions worldwide, and our business in this field has maintained an annual growth rate of more than 20%. They are the essence of the shared success.” Keynote presentations The summit also featured keynote presentations from distinguished speakers including Dr. Jonathan Reynolds from the University of Oxford on the future of commerce. Two panel discussions brought together industry pioneers to explore sustainability in thriving industries and the practical journey of AI-powered retail implementation. Global success stories A major highlight of the summit was the showcase of customer success stories from around the world. Enterprises across diverse markets—from property developers and retail chains to engineering solution system integrators and parking operators—shared how Hikvision's AIoT solutions have delivered measurable results. The applications spanned optimizing building operations, enhancing retail security and loss prevention, revolutionizing parking management, and driving significant energy efficiency improvements. These real-world implementations have demonstrated that digital transformation is not a distant concept, but a present reality that delivers tangible business value. Impact of AIoT Whether it's AI-driven HVAC systems reducing energy consumption in commercial properties or intelligent retail solutions enhancing customer experiences while improving operational efficiency, the impact of AIoT is being felt across industries worldwide. The diverse range of participants at the summit—representing businesses from multiple continents—underscored the universal applicability and growing adoption of intelligent commercial solutions. Immersive exhibition The exhibition on the sidelines of the summit was a major attraction, offering attendees hands-on experience with integrated AIoT applications. Visitors explored simulated environments ranging from office spaces and apartment buildings to supermarkets, coffee shops, and parking facilities—each showcasing how intelligent technologies seamlessly integrate into commercial operations. Many participants spent extended time at exhibition zones, engaging with Hikvision experts to understand how these technologies could be adapted to their specific operational needs. On the summit's second day, guided and self-guided site visits to real-world implementations provided even deeper insights. Participants witnessed intelligent building management systems, large-scale retail operations, and comprehensive commercial security solutions in action, bridging the gap between conceptual understanding and practical application. The commercial transformation journey continues As the summit concluded, the overarching message was clear: the future of commerce lies in the intelligent application of AIoT technologies, powered by open collaboration and shared innovation. "What we've witnessed is more than just technological advancement—it's a glimpse into how businesses worldwide are reimagining operations, enhancing customer experiences, and building sustainable competitive advantages," noted Allen Tang, Vice President of Hikvision International Business Center, in his toast at the gala dinner. The Shaping Intelligence 2025 – Commercial Summit reinforced Hikvision's position as a trusted partner in the global digital transformation journey, with participants leaving Bangkok inspired, informed, and equipped with actionable insights to drive their own innovation initiatives.
Suprema, a global pioneer of AI-powered security solutions, has been recognized by A&S magazine as a ‘2025 Global Top 50 Security Company’, marking its fifteenth consecutive year on the prestigious list. This consistent achievement underscores the company’s sustained growth, innovation, and global influence. A&S ranks the world’s top security companies annually based on revenue and profitability. Suprema has secured its place on this list since 2011. asmag.com’s 2025 technology survey identifies AI analytics, unmanned security platforms, AI agents, cybersecurity, IoT, and hybrid-cloud architecture as key drivers of future growth. Suprema excels across these domains. Suprema’s flagship unified security platform BioStar X, Suprema’s flagship unified security platform, features AI automation for predictive security with seamless integration of access control and real-time video intelligence delivering total operational visibility. Also, BioStar Air, the world’s first biometric-native and cloud-based access control platform, is especially suited for multi-site operations due to its zero on-premises requirements and fully remote cloud management. Suprema’s edge AI technology built into facial authentication and fingerprint recognition devices such as BioStation 3 and BioStation 2a, has proven robust real-world performance in global markets. To address increasing cybersecurity demands, Suprema continually enhances its data protection protocols and ensures region-specific compliance with privacy regulations. Setting new benchmarks in security technology Suprema’s commitment goes beyond responding to trends, it consistently delivers breakthrough solutions and sets new benchmarks in security technology. Its integrated architecture, robust compliance, and focus on AI automation empower companies to navigate evolving risks with confidence. “This recognition as a Global Top 50 security company for 15 consecutive years reflects our dedication to advancing security industry worldwide,” said Hanchul Kim, CEO of Suprema Inc. “AI-powered automation, cloud-native platforms, and advanced cybersecurity are reshaping our industry. Suprema will continue to deliver intelligent, integrated, and future-ready solutions that keep organizations secure and resilient in a rapidly changing landscape.”
Nutanix, a pioneer in hybrid multicloud computing, announced at Microsoft Ignite 2025 that its Nutanix Cloud Platform solution will support Microsoft Azure Virtual Desktop for hybrid environments. This will enable organizations to run Azure Virtual Desktop on premises on the Nutanix AHV hypervisor, offering a new level of flexibility in how virtual desktops are deployed and managed. This effort aims to meet the evolving needs of distributed workforces and will give IT teams more infrastructure choices while optimizing control, performance, security, and cost efficiency. Nutanix Cloud Platform “The Nutanix Cloud Platform delivers a performant, resilient, cost-efficient, and secure infrastructure base for virtual desktop infrastructure (VDI) workloads,” said Tarkan Maner, Chief Commercial Officer at Nutanix. “This collaboration with Microsoft will empower our customers with more options for virtual desktops, whether they’re modernizing on premises or extending into hybrid cloud environments.” Critical compliance and regulatory requirements Azure Virtual Desktop for hybrid environments addresses critical compliance and regulatory requirements in industries such as financial services, healthcare, and government, where data residency and sovereignty are paramount. Customers will benefit from running Azure Virtual Desktop locally on Nutanix AHV while using the Azure Virtual Desktop brokering and management stack on Azure Arc–enabled servers to connect securely to Azure. Key benefits of Azure Virtual Desktop Key Benefits of Azure Virtual Desktop for hybrid environments on Nutanix AHV will include: Hybrid Flexibility: Combine on-premises performance with Azure scalability for burst capacity and disaster recovery. Ability to run Microsoft applications: Native support for Microsoft 365, Teams optimisations, Microsoft Entra, and security services. Optimized for Performance: Ideal for latency-sensitive and graphics-intensive workloads. Cost Efficiency: Leverage existing Microsoft licensing and Nutanix infrastructure for predictable economics. Nutanix support for Azure Virtual Desktop “Azure Virtual Desktop is built to deliver a secured, scalable, and deeply integrated experience with Microsoft 365, Microsoft Teams, and Windows,” said Scott Manchester, Vice President of product for Windows 365 and Azure Virtual Desktop at Microsoft. “Nutanix support for Azure Virtual Desktop will give customers more choice, whether they deploy in the cloud or on premises — without compromising on the modern security model or licensing efficiencies.” Possibilities for VDI Nutanix is expanding the possibilities for VDI, which will enable organizations to tailor their environments to meet business needs - without being locked into a single deployment model. The Nutanix Cloud Platform’s support for Azure Virtual Desktop is currently under development.
Alfred International, a pioneer in smart lock solutions, announced that its ML2 Smart Mortise Locks and DB2S Smart Locks with Zigbee have achieved INTEREL certification, enabling seamless integration with the EOS 2 all-in-one thermostat hub for smart building deployments. This certification positions Alfred as a key partner for property management companies seeking cost-effective, scalable access control solutions across multi-family properties. Alfred's commercial-grade Zigbee smart locks The integration eliminates the need for dedicated Zigbee hubs by leveraging the EOS 2 thermostat as a unified gateway for all in-unit IoT devices. Property managers can now deploy Alfred's commercial-grade Zigbee smart locks alongside climate control via a single, powerful API, reducing hardware costs, simplifying installation, and streamlining ongoing maintenance across entire properties. Integrating with INTEREL's EOS platform "This INTEREL certification represents a milestone for Alfred as we expand our footprint in the multi-family housing sector," said Brad Cook, Head of Product & Integrations at Alfred International. "Our smart locks were engineered with property managers in mind, offering the durability, flexibility, and security required for high-traffic residential environments. By integrating with INTEREL's EOS platform, we're delivering a proven playbook optimized for multi-family properties that require secure, manageable access across hundreds of units." Powerful integration without complexity Alfred's Zigbee-certified smart locks connect directly to the EOS 2 thermostat via Zigbee 3.0, instantly becoming accessible through INTEREL's enterprise-grade smart building API. This architecture provides property management companies with unprecedented control over access management at scale, while enabling seamless integration with existing property management systems, building automation platforms, and resident mobile apps. DB2S's RFID capabilities "Alfred's commitment to building code compliance and commercial-grade security makes them an ideal partner for our multi-family ecosystem," said Florian Gallini, CEO at INTEREL. "The ML2's unique ability to retrofit existing mortise locks and the DB2S's RFID capabilities address real challenges property managers face daily. Together with EOS 2, we're delivering a unified solution that dramatically simplifies smart building deployments while enhancing both security and resident satisfaction." Key Benefits for Property Managers Unified Platform Management: Control access and climate through a single API, eliminating the complexity of managing multiple vendor systems. Scalable Access Control: Manage hundreds of units efficiently with Alfred's capacity for 250 unique pin codes and RFID cards per lock, plus unlimited Bluetooth key sharing through the Alfred Home app. Retrofit-Friendly Solutions: The ML2's patented design retrofits existing mortise locks without door modifications, while the DB2S offers modern deadbolt replacement—both ideal for properties mixing new construction with renovations. Enhanced Security and Monitoring: Real-time door status monitoring, auto-relock capabilities, low-battery alerts, and tamper-proof technology ensure properties maintain the highest security standards. Self-Service Amenities: Enable automated vendor or contractor access, and time-based guest entry without staff intervention, reducing operational overhead. Simplified Commissioning: One-touch pairing through the EOS Installer App enables rapid deployment across entire properties, with voice-guided setup in five languages. The integration supports both new construction and retrofit projects, with Alfred's ML2 being particularly suited for older properties with existing mortise locks—a common scenario in major metropolitan rental markets. Availability Property management companies, smart building integrators, and multi-family developers can learn more about deploying Alfred locks with INTEREL's EOS platform.


Expert commentary
The Internet of Things is growing quickly. It has moved far beyond a few smart gadgets at home. Today, connected technology is in homes, factories, hospitals, farms, and cities. Experts expect the global market for IoT devices to rise from about $70 billion in 2024 to more than $181 billion by 2030. This means more devices, more data, and more opportunities for industries everywhere. This growth comes from several advances working together. 5G connections make it possible to send and receive data faster. Edge computing processes information close to where it is created, which helps with quick decisions. Analytics allow organizations to understand and act on the data they collect. Together, these improvements are opening the door to new ways of working, producing, and communicating. IoT: The next generation As devices become more advanced, they use more energy and send more data. Think about high-quality security cameras, detailed environmental sensors, or systems in vehicles that send constant updates. All of these devices require a strong supply of power and a steady connection. In 2024, sensors made up more than 32 percent of all IoT device sales. Sensors are essential, yet the next wave of devices will do even more. They will process information themselves, use artificial intelligence, and include many features in one unit. This progress depends on networks that deliver both the energy and the bandwidth to support them. Into the future Devices and applications keep improving, so networks need the flexibility to handle what comes next Setting up IoT systems is about more than meeting today’s needs. Devices and applications keep improving, so networks need the flexibility to handle what comes next. A future-ready design provides extra capacity in both power and data flow. This way, when it’s time to add new devices or upgrade existing ones, the system is prepared without requiring major changes. One smart approach is to use modular equipment. For example, a network switch might deliver more power than devices currently use, while allowing room to connect more advanced devices later. This helps keep the system ready for growth. Built for all IoT devices often operate in challenging places. Factories, power plants, rail lines, and shipping ports face extreme temperatures, dust, vibration, and other difficult conditions. Network equipment in these locations needs the strength to keep working through heat, cold, and constant use. Industrial-grade gear is designed for these environments. It can run in a wide range of temperatures, handle physical impacts, and resist interference. Features such as port security, which keep a connection safe if a cable is removed, help protect both the equipment and the data it carries. Systems with backup power inputs continue to run even when one power source goes offline. Plug into PoE Power over Ethernet (PoE) sends both energy and data through the same cable Power over Ethernet (PoE) sends both energy and data through the same cable. This makes installation simpler and allows flexibility in where devices are placed. And as devices become more capable, they often need more power to operate. The latest innovation for PoE can deliver up to 90 watts on each port. This is enough to support advanced devices like AI-enabled cameras or multi-sensor units. When every port on a switch can supply that much power at the same time, adding more devices is straightforward and performance stays strong. Protecting the network Every connected device is part of a larger network. Protecting this network means securing data from the moment it leaves the device until it reaches its planned destination. Built-in security features in network equipment — such as secure architecture, encryption support, and physical safeguards — help keep information safe. They also help meet industry and government requirements for equipment sourcing and design. A clear path Organizations leading in IoT think ahead. They prepare for the next stage of technology by building networks with flexibility, durability, and protection in mind. These networks supply extra power, allow more bandwidth, and keep data secure while adapting as the system grows. The focus is on creating a foundation that supports innovation year after year. This means planning for devices that are faster, more capable, and more connected, while making sure the infrastructure grows right along with them. Looking ahead Strong, adaptable, and secure networks will allow connected devices to reach their full potential The IoT of the future will touch nearly every part of daily life. It will help farmers grow food more efficiently, guide self-driving vehicles, improve medical care, and keep cities running smoothly. As devices multiply and gain new abilities, the networks powering them need to grow in step. Strong, adaptable, and secure networks will allow connected devices to reach their full potential. By planning for both today’s needs and tomorrow’s possibilities, organizations can make the most of the opportunities IoT brings—and keep those opportunities expanding for years to come. Key takeaways: Preparing for the future of IoT The IoT market is growing fast The global market for connected devices is expected to grow from $70 billion in 2024 to more than $181 billion by 2030. This means more devices in more industries, from farming to healthcare to transportation. Devices are using more power and data Newer devices have more features — such as high-quality video, built-in AI, and multiple sensors — and these require stronger power supplies and faster connections. Future-ready networks are essential Infrastructure should allow extra capacity for both power and data. This ensures new devices can be added without major changes or delays. Environments vary, so equipment should match the setting Industrial areas, outdoor spaces, and transportation hubs need rugged, reliable equipment that works in extreme conditions and stays secure. Security starts at the network level Built-in protections — like secure architecture, encryption, and physical safeguards — help keep information safe and meet important industry requirements.
The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems PKI certificates form the backbone of secure digital communications, but Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems unsafe by 2029 and could render all current cryptography unsafe by 2034. As with any software implementation, there are pitfalls to avoid, including vendors that use proprietary technology that’s incompatible with other systems and “gotcha” pricing tactics where a slight increase in certificate usage triggers a massive increase in pricing. However, the time to implement PKIaaS is now. Physical security faces growing cyber threats Although ransomware attacks directly on computing infrastructure dominate business headlines, physical security systems are also under threat. An HID survey of over 1,200 security professionals, end-users and executives shows that 75% reported threats to their physical security systems in the past year, as these systems are more tightly integrated with company IT networks. Until recently, most physical access control systems (PACS) were proprietary and worked only on the specific systems they were designed to interact with. However, the movement toward open supervised device protocol (OSDP) revolutionized the field, allowing companies to integrate and control devices from different vendors while improving compatibility and security. PACS and IoT devices PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices As a result, 40% of companies plan to either update or change access control systems in the next year, with 21% emphasizing the need for open standards like OSDP to both improve interoperability and future-proof their systems. When asked about reasons for a proposed upgrade, more than half cited convenience, while another 40% sought to improve their overall security posture. PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices continues to increase, promoting security and reducing manual processes related to tracking certificates. Regulatory compliance demands automation and agility Companies also face increased regulatory pressures regarding technology in general — and certificates in particular. The European Union’s Cyber Resilience Act sets mandatory cybersecurity standards for manufacturers and retailers, covering the planning, design, development and maintenance of products throughout the entire value chain. Certain high-risk products must undergo third-party evaluation by an authorized body before being approved for sale in the EU. EU Cybersecurity Act shows a unified certificate framework for ICT products, services, and processes More specifically, the EU Cybersecurity Act establishes a unified certification framework for information and communications technology (ICT) products, services, and processes. Businesses operating in the EU will benefit from a “certify once, recognized everywhere” approach, meaning that approved ICT offerings will be accepted across all EU member states. Given the global nature of PACS, these regulations likely will impact companies well beyond the EU, much like the general data protection regulation on websites has. These changes, when considered together with rapid advancements in quantum computing, underscore the need for a unified certification solution such as PKIaaS to handle increased — and increasingly complex — certificate compliance. A path to PKI modernization Modernizing PKI through a PKIaaS model doesn’t have to be difficult. With a clear and phased approach, most organizations can transition smoothly while reducing risk and improving efficiency. It starts with a quick assessment of current certificate usage to understand where certificates are issued, how they’re renewed and any gaps in coverage. From there, it's about defining what you need and selecting a trusted partner. Look for a solution that integrates well with your existing systems, supports automation and scales as your needs grow. In terms of partners, not all PKIaaS vendors are the same. Look for one with a strong security track record and predictable pricing, which will simplify both onboarding and long-term management. When it comes to vetting vendors, ask the following questions: Is the solution scalable? The trend toward future-proof installations has never been greater. As the number of certificates increases, any PKIaaS solution must be able to grow in concert. How will pricing change as certificate volume grows? Some solutions are priced in tiers by the number of certificates. If a company exceeds that maximum by even a single certificate, it owes not only the price difference between tiers, but it will also be expected to pay for that tier the following year, which can bring a significant financial surprise. How are CAs accessed and stored? Look for companies that can provide long-term offline secure storage of certificates that can also track when CA keys are accessed. What support is included in the PKIaaS? Specifically ask vendors about up-front costs for implementation and onboarding to get a real apples-to-apples comparison among partners. Step-by-step replacement of manual processes A pragmatic approach allows corps to move quickly and confidently from legacy PKI to a scalable Once a vendor in place, start with a focused rollout, e.g., automating certificate renewals for internal systems or a specific business unit. Once the pilot is complete, expand automation with a step-by-step replacement of manual processes to limit operational disruptions. Finally, as PKIaaS becomes embedded in day-to-day operations, it’s important to align it with broader security governance. Establishing regular reporting and clear policies, as well as future-proofing for quantum-safe cryptography to ensure long-term resilience and compliance without adding complexity. This phased, pragmatic approach allows organizations to move quickly and confidently from legacy PKI to a scalable, secure and future-ready solution. A necessary upgrade According to an analyst report, manual certificate management can cost organizations up to $2.5 million annually in labor and outage-related expenses. While automation reduces these costs by up to 65%, the real challenge in IoT environments lies in managing scale. With device lifecycles often spanning decades and certificate volumes reaching millions — especially across distributed, resource-constrained endpoints — manual PKI processes and legacy infrastructure simply can't keep up. The convergence of regulatory mandates, quantum computing threats and rising cyber risks to connected physical systems makes scalable, cloud-based PKIaaS not just a strategic advantage, but a foundational requirement for secure IoT deployments.
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralized access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerization and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a license plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralized access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerization and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialized toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilize your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customize deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimized. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralized servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerized framework An equally important aspect of containerization is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerized framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialized role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organizations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyze customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organizations the flexibility to optimize cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organization can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimizing unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerization via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
Security beat
There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis. Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localized threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Center in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernizing security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system Eagle Eye Networks says they are focused on helping integrators "organize the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarization, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditized tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Center SaaS has had a fast and successful launch. It enables cloud-based systems with local storage. Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratize evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app center” enables additional features to enhance XProtect without involving integration. Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernization and open integration Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernization, enabling security professionals to better utilize new technology. Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernization," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favorable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond license plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Center (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Center to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernization roadmaps, suggests a security ecosystem built for agility and future growth. These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.
For all the emphasis on cloud systems and centralized servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyze vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organization founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyze the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.
Case studies
HID, the pioneer in trusted identity and authentication solutions, announced that it successfully supported Stockholm's public transit authority, Storstockholms Lokaltrafik (SL), in transforming the daily travel experience for hundreds of thousands of passengers in the capital through a comprehensive digital ticketing modernization program. The initiative has eliminated paper tickets and enabled seamless contactless payments across buses, ferries, trams and metro stations. The technology upgrade has delivered measurable benefits, including dramatically reduced fare evasion that translates to millions of Swedish Kronos in recovered revenue for SL. Residents experience faster, more convenient travel New ticketing infrastructure was specifically selected because it withstands harsh Nordic winters With the new integrated ticketing devices from HID, citizens can now use the same payment method – whether a mobile app, contactless card or digital wallet – across all 2,600 buses, 140 ferry validators, 320 tram platforms and 1,035 metro fare gates throughout the capital region. Most importantly, the new ticketing infrastructure was specifically selected because it withstands harsh Nordic winters, a crucial factor for passengers who depend on public transit year-round. Legacy hardware, systems and networks “Serving hundreds of thousands of passengers daily across multiple transit modes required a ticketing solution that could scale with our needs while providing a consistent experience for our riders." "We chose HID for its multi-technology ticket validators for buses, ferries, and gates, as well as its ability to run side-by-side with our legacy hardware, systems, and networks. It was a real challenge for everyone involved to get this working, but it was one we overcame together,” said Karin Harrius, Business System Administrator, Ticket Readers at SL. Seamless ecosystem across touchpoints The implementation was designed to ensure a consistent validation experience and deliver a seamless ecosystem across all transit touchpoints. It included: Enhanced passenger convenience on buses: HID VAL100 ticket validators integrated with HID TripTick™ barcode technology and NFC/RFID contactless payment functionality in a single point of presentation for tickets and travel passes Reliable outdoors operation in extreme weather: HID VAL150 validators featuring a waterproof design on ferries and tram platforms Streamlined fare collection across metro stations: HID TripTick 220 OEM barcode, NFC and cEMV ticket modules within fare gates and ticket machines in the Stockholm metro, enabling multi-format ticket reading throughout the system. Significant reduction in fare evasion Improvement ensures that all users contribute fairly to keeping these vital transport links The modernization has delivered substantial financial benefits for SL. Fare evasion dropped from 3.1% in 2019 to just 2.3% in 2023 – a 26% reduction that has recovered millions of Swedish Kronor annually for reinvestment in public transit infrastructure and services. The impact was particularly dramatic on ferry services, where ticket validation rates increased from just 58% in November 2021 to 89% by March 2025. This improvement ensures that all users contribute fairly to maintaining these essential transportation links connecting Stockholm's islands and waterways. Digital-first approach meets evolving expectations Citizens particularly benefit from the system's ability to prevent ticket duplication The comprehensive digital transformation addresses the evolving expectations of Swedes in an increasingly mobile-first society. Citizens particularly benefit from the system's ability to prevent ticket duplication and unauthorized sharing through social media platforms – issues that had previously undermined fare revenue and service sustainability. Future integration of new technologies With Stockholm County – which represents 20% of Sweden's population despite covering only 2% of the country's area – the scalable, open-architecture system ensures SL can adapt to evolving technologies and passenger expectations. The system's flexibility allows for future integration of new technologies and travel services without requiring complete infrastructure replacement, protecting the public investment while maintaining service innovation.
Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a pioneering provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Multifamily access control challenges The upscale 65-unit apartment property previously issued all residents a fob for perimeter access and a key to access the mechanical lock at their apartment door. Property manager was experiencing significant challenges with its perimeter access control system Between legacy fobs and keys, patchwork infrastructure, and a steady flow of traffic throughout the complex – the property manager was experiencing significant challenges with its perimeter access control system. “By running disparate systems, it became a complicated and time-consuming process for me to create new fobs for residents when they moved in and then deactivate them when they moved out,” says Sally Caron, Residential Property Manager at the Artisan Apartment Homes. “Plus, it was costly to replace lost fobs and mechanical keys." Seamless solutions After a careful review process with its integrator Comfort, the Artisan moved forward with an ecosystem of solutions from Allegion. In 2022, the mechanical locks on all 65 apartment unit doors were upgraded to Schlage Control® smart locks with ENGAGE™ access control to give residents keyless entry. The following year, the Artisan upgraded to the Zentra cloud-based software platform from Allegion, which manages perimeter, amenity and unit access all in one centralized system. Enrollment and move-out process “I absolutely love having everything on one platform as it has made my job easier in so many ways,” says Caron. “Anything state-of-the-art is always more convenient and easier to manage. I’m now able to give temporary access to people for grocery or online deliveries, UPS, Fed-Ex, or housekeeping. Residents now have an overall better experience not only during the enrollment and move-out process, but every day." Residents to access the building Mobile resident key in Apple Wallet was introduced as a way for residents to access the building Most recently, the mobile resident key in Apple Wallet was introduced as a way for residents to access the building and their individual apartment units by using their iPhone or Apple Watch. The Artisan is also on track to be the first multifamily property to deploy resident keys in Google Wallet in mid-2025. Adoption of mobile credentials “Our residents love the security and convenience of resident key in Apple Wallet and are adapting to the change quickly,” says Caron. “Residents have expressed that they feel safer, and that the adoption of mobile credentials has given them the freedom to go for a jog or a walk without worrying about carrying anything with them but their iPhone or Apple Watch for reentry.”
With a vast portfolio of smart locks, lock management systems, and connected readers, ensuring strong authentication, data integrity, and compliance with global regulations is essential. To meet these challenges, ASSA ABLOY is leveraging the long-time IoT expertise of HID to implement HID PKI-as-a-Service. This strategic deployment is not just about protecting millions of connected devices but also about future-proofing ASSA ABLOY’s security infrastructure for years to come. Cryptographic assurance: Securing every lock, inside and out ASSA ABLOY boosts trust in its devices, preventing unauthorized clones or counterfeit products A crucial aspect of this solution provides Genuine ASSA ABLOY products — an assurance that every smart lock, reader, and system within the network is verified as an authentic and authorized product. By leveraging PKI-based identity verification, ASSA ABLOY strengthens trust in its devices, preventing unauthorized clones or counterfeit products from entering the ecosystem. For example, the inside of a lock can only pair with a matching outside component from ASSA ABLOY, ensuring the integrity and security of the entire system. This level of cryptographic trust not only enhances device security but also strengthens protection against counterfeit components or unauthorized modifications. Meeting stringent security and compliance needs As the industry faces increasing regulatory pressure, including the EU Cybersecurity Act and the upcoming Cyber Resilience Act, ASSA ABLOY needed a scalable, automated solution to manage over a million certificates annually. HID’s expertise in certificate management provides enhanced security, reduced complexity HID PKI-as-a-Service enables seamless device authentication, automated provisioning, and hierarchical key management, ensuring compliance with evolving security standards. An essential part of the solution is the offline Root Certificate Authority (CA), which serves as the foundation for secure operations. HID’s expertise in certificate management provides enhanced security, reduced complexity, and operational efficiency across ASSA ABLOY’s global IoT ecosystem. Driving innovation and efficiency By integrating automated bootstrapping and customized attestation certificates, the implementation has significantly improved operational efficiency while minimizing manual effort. This allows devices, including those operating offline, to maintain secure provisioning and updates without requiring constant connectivity. Additionally, the system is future-ready, designed to support emerging IoT protocols such as Thread, CoAP, EDHOC, and OSCORE, ensuring adaptability as the industry evolves. Collaborative success The success of this deployment is rooted in a strong alliance between ASSA ABLOY and HID The success of this deployment is rooted in strong collaboration between ASSA ABLOY and HID. A dedicated steering group ensured alignment on global PKI policies and security objectives, leading to a smooth rollout with minimal disruption. “The implementation of HID PKI-as-a-Service wasn’t just about meeting current security requirements, it was about future-proofing our IoT ecosystem for security and scalability,” says Anders Calbom, VP & Head of Technology Solutions, ASSA ABLOY. Major milestone in IoT security Anders Calbom added: “With the ability to manage over a million certificates annually, we’re now positioned to scale our security infrastructure alongside our business growth.” This initiative marks a major milestone in IoT security, compliance, and operational efficiency. As ASSA ABLOY continues to innovate and expand, HID PKI-as-a-Service provides the secure foundation needed to drive future growth and digital transformation.
In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfillment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organizations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorized employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalized key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.
Inaugurated on May 25, 1999, the Museo Antropológico de la Comunidad de Madrid began construction in 1987. It wasn't until ten years later, in 1997, that the decree establishing the museum was issued, thus formalizing the institution's existence. As part of the museum’s modernization, the client needed an SMD LED solution that includes a glass in front of it to avoid dead pixels and any possible damage or accidents caused by museum visitors. Dahua, together with Epsilon Media, provided an innovative solution that overcame these limitations and optimized the museum experience. Renovation of The Museum The Museo Antropológico de la Comunidad de Madrid was converted from the former Dominican Convent of the Mother of God, built in several phases between the 17th and 18th centuries. As an old establishment, the client wanted to renovate the installation step by step, with the first stage comprised of an LED wall in the main entrance. Their first idea was to install an SMD LED solution with a glass front in order to protect the LED wall and avoid issues with all visitors visiting the museum. Building such a solution is costly and may not be the right solution due to the lack of front-line maintenance. Flip COB Indoor Fine Pixel Pitch LED The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology Together with the Epsilon Media and the Dahua team, the museum evaluated the Dahua Flip COB Indoor Fine Pixel Pitch LED solution in person. After a deliberate discussion, the client agreed that it is the right solution for their facilities. The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology that enables full illumination and softer light without pixel particles, effectively combating digital visual fatigue. Key Features Another notable feature of this LED is its dustproof and anti-fingerprint surface that leaves no visible traces when touched It allows full front maintenance that makes disassembly and maintenance highly efficient. With the full control of the ink color parameters on the surface of the light board, the ink color at all angles is guaranteed to be uniform, which helps solve the industry’s issue regarding ink color differences in batches. Other benefits include high contrast of 10,000:1, energy-saving and power-saving capabilities (less than 75 watts per box, 40% lower than other SMD products), and 160° super wide viewing angle. Another notable feature of this LED is its dustproof and anti-fingerprint surface that leaves no visible traces when touched. It is also waterproof and moisture-proof, with a low rate of dead pixels and high hardness against knocks. Doesn’t Require Additional Glass Protection These features effectively meet the requirements of the client regarding additional protection against damage to the LED during operating hours. Dahua continues to drive technological innovation to improve the way people experience history. With the Dahua Flip COB Indoor Fine Pixel Pitch LED and the Quality Service Epsilon Media offered, the Museo Antropológico de la Comunidad de Madrid was able to install an LED wall without the need of additional glass protection, providing an exceptional digital display of historical images inside the museum while enhancing visitor experience and saving costs. Remarks From The Museum Director “With the video wall that Dahua installed for us, we were able to renovate the first unit that was originally there. This type of technology is significantly important in transmitting knowledge about the past. The overall collaboration was very satisfactory,” says Mr. Enrique Baquedano, Director of Museo Antropológico de la Comunidad de Madrid. “The Dahua team was always ready to help whenever we encountered any issue. What’s more, the LED wall is balanced and cohesive with the overall aesthetic of the museum, which is an added bonus,” concluded Mr Enrique.
iCard, a pioneering European e-money institution, has successfully upgraded its customer checks with Regula’s advanced biometric and document verification technologies. By integrating Regula Face SDK and Regula Document Reader SDK with its KYC (Know Your Customer) and risk assessment systems, iCard has moved to speedy, automated verification with improved fraud detection, and enhanced the overall experience for customers in 30+ countries. Implementing Regula’s solutions As a licensed fintech organization, iCard must comply with strict European KYC regulations while maintaining a robust risk assessment system alongside low-effort customer experience. iCard complies with strict European KYC rules while keeping a robust risk review system Prior to implementing Regula’s solutions, manual verification processes led to inefficiencies, longer wait times, increased fraud, and potential friction for users. Customers often had to re-upload photos or wait for manual reviews, causing delays—especially outside business hours. Additionally, iCard needed a more comprehensive document verification system that was capable of recognizing a broader range of ID types. The Regula solution: Fast and fraud-free identity verification To modernize and automate its verification process, iCard selected Regula’s complete solution for document and biometric verification for its industry-leading accuracy, ease of integration, and ability to meet the company’s specific requirements. Regula Face SDK: Integrated into the iCard Digital Wallet app (Android and iOS), it provides fast and reliable biometric verification when a user logs in or performs a money transaction. The solution conducts instant liveness detection and face matching, preventing fraud attempts, including presentation attacks, deepfakes, or injected videos. Regula Document Reader SDK: Deployed in iCard’s back-office system, it automatically authenticates ID cards, passports, and residence permits, including previously unsupported paper-based IDs. Regula’s solution reads and authenticates data from multiple document zones, including MRZs (machine-readable zones), RFID chips, and barcodes, and cross-validates the information to detect any inconsistencies that may indicate fraud. Tangible business benefits The project was completed in just one month, and the impact has been immediate: Instant identity verification: Customers can now authenticate their identity in under a minute. Reduced operational costs: Automated verification processes have minimized manual reviews. Enhanced fraud prevention: Advanced biometric and document verification strengthen security measures. Increased conversion rates: Faster verification leads to a smoother onboarding experience and reduced drop-off rates. Fast and secure identity verification “Implementing Regula Face SDK and Regula Document Reader SDK has optimized our internal processes while ensuring a seamless experience for iCard Digital Wallet customers." "The integration was completed in a short period, resulting in fast and secure identity verification, improved operational efficiency, and reduced fraud risks—all while boosting customer satisfaction,” says Gabriela Anastasova, Chief Product Officer at iCard. Balancing security and user convenience “In today’s fintech landscape, balancing security and user convenience is critical. Customers expect seamless access, while businesses must comply with strict regulations and defend against sophisticated fraud. We are proud to support iCard in finding that perfect balance." "Our solutions ensure that every identity check is robust, automated, and frictionless, allowing fintech innovators like iCard to scale securely and efficiently,” comments Ihar Kliashchou, Chief Technology Officer at Regula.


Round table discussion
Emphasizing proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
The Internet of Things (IoT) is having a profound impact on businesses across various industries, including security. In physical security as in other business environments, the IoT is changing how systems operate, interact, and create value. In the process, the IoT is driving efficiency, reducing costs, and opening up new avenues for innovation and growth. We asked our Expert Panel Roundtable: How is the Internet of Things (IoT) transforming how security systems are deployed?
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
Products


White papers
Combining Security And Networking Technologies For A Unified Solution
Download
Guide For HAAS: New Choice Of SMB Security System
Download
Integrating IT & Physical Security Teams
Download
Troubleshooting IP Video Systems
Download
5 Easy Steps To An Upgraded Video Surveillance System
Download
Combining Access Control And Intercoms For Better Security
Download
The Wireless Access Control Report 2023
Download
Machine Operator Authentication
Download
Unlocking Wide-Angle Camera Dewarping
Download
Leveling Up With Campus Safety
Download
Simple Security Solutions for SMBs
Download
IoT Connectivity
Download
Modernizing Facilities Management
Download
Charting The Path To Safe Cities
Download
Connected Video Technology for Safe Cities
Download

