Internet of Things (IoT)
Balancing operational efficiencies and customer satisfaction with costs, resources, and legislative obligations is a challenge faced by every security services provider offering keyholding and alarm response. While mobile security operations must adhere to strict compliance, with BS 7984 standard and SIA licensing for guards at the very core of the operations, security providers are increasingly contending with a wider range of regulations. Among the most pressing are sustainability requirement...
Wachter, Inc., a premier technology solutions integrator and innovator, proudly announces the appointment of James Stark as Business Development and Strategic Innovation Lead. With over 30 years of distinguished experience across various sectors, James is set to spearhead transformative initiatives that will enhance Wachter’s offerings for clients nationwide. A thought leader and respected speaker, Stark has graced national media platforms and industry conferences, sharing insights shaped...
Cellebrite, a pioneer in AI-powered Digital Investigative and Intelligence solutions for the public and private sectors, announces it has substantially expanded its capabilities through the acquisition of Corellium, a pioneer in Arm-based virtualization software. The addition of Corellium's technology and world-class technical talent further strengthens Cellebrite's market and technology leadership. Dramatically accelerating time This combination creates the industry's most complete digital...
Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more surveillance, access control, and IoT systems move into the cloud. Surveillance video, access control logs, and IoT sensor readings are among an organization's most sensitive assets. As they are increasingly hosted in data centers around the world, questions such as where that data resides, who governs it, and how it can le...
Hikvision's Shaping Intelligence 2025 – Commercial Summit concluded successfully in Bangkok, Thailand, drawing over 350 global business leaders, technology partners, and industry experts over two days. The summit showcased how AIoT technologies are transforming building and retail sectors worldwide, while recognizing outstanding customer achievements in digital transformation. AIoT powers intelligent commercial transformation Vivianna Wong, President of Hikvision Pan Asia Pacific, offic...
Suprema, a global pioneer of AI-powered security solutions, has been recognized by A&S magazine as a ‘2025 Global Top 50 Security Company’, marking its fifteenth consecutive year on the prestigious list. This consistent achievement underscores the company’s sustained growth, innovation, and global influence. A&S ranks the world’s top security companies annually based on revenue and profitability. Suprema has secured its place on this list since 2011. asmag.com&r...
News
Nutanix, a pioneer in hybrid multicloud computing, announced at Microsoft Ignite 2025 that its Nutanix Cloud Platform solution will support Microsoft Azure Virtual Desktop for hybrid environments. This will enable organizations to run Azure Virtual Desktop on premises on the Nutanix AHV hypervisor, offering a new level of flexibility in how virtual desktops are deployed and managed. This effort aims to meet the evolving needs of distributed workforces and will give IT teams more infrastructure choices while optimizing control, performance, security, and cost efficiency. Nutanix Cloud Platform “The Nutanix Cloud Platform delivers a performant, resilient, cost-efficient, and secure infrastructure base for virtual desktop infrastructure (VDI) workloads,” said Tarkan Maner, Chief Commercial Officer at Nutanix. “This collaboration with Microsoft will empower our customers with more options for virtual desktops, whether they’re modernizing on premises or extending into hybrid cloud environments.” Critical compliance and regulatory requirements Azure Virtual Desktop for hybrid environments addresses critical compliance and regulatory requirements in industries such as financial services, healthcare, and government, where data residency and sovereignty are paramount. Customers will benefit from running Azure Virtual Desktop locally on Nutanix AHV while using the Azure Virtual Desktop brokering and management stack on Azure Arc–enabled servers to connect securely to Azure. Key benefits of Azure Virtual Desktop Key Benefits of Azure Virtual Desktop for hybrid environments on Nutanix AHV will include: Hybrid Flexibility: Combine on-premises performance with Azure scalability for burst capacity and disaster recovery. Ability to run Microsoft applications: Native support for Microsoft 365, Teams optimisations, Microsoft Entra, and security services. Optimized for Performance: Ideal for latency-sensitive and graphics-intensive workloads. Cost Efficiency: Leverage existing Microsoft licensing and Nutanix infrastructure for predictable economics. Nutanix support for Azure Virtual Desktop “Azure Virtual Desktop is built to deliver a secured, scalable, and deeply integrated experience with Microsoft 365, Microsoft Teams, and Windows,” said Scott Manchester, Vice President of product for Windows 365 and Azure Virtual Desktop at Microsoft. “Nutanix support for Azure Virtual Desktop will give customers more choice, whether they deploy in the cloud or on premises — without compromising on the modern security model or licensing efficiencies.” Possibilities for VDI Nutanix is expanding the possibilities for VDI, which will enable organizations to tailor their environments to meet business needs - without being locked into a single deployment model. The Nutanix Cloud Platform’s support for Azure Virtual Desktop is currently under development.
Alfred International, a pioneer in smart lock solutions, announced that its ML2 Smart Mortise Locks and DB2S Smart Locks with Zigbee have achieved INTEREL certification, enabling seamless integration with the EOS 2 all-in-one thermostat hub for smart building deployments. This certification positions Alfred as a key partner for property management companies seeking cost-effective, scalable access control solutions across multi-family properties. Alfred's commercial-grade Zigbee smart locks The integration eliminates the need for dedicated Zigbee hubs by leveraging the EOS 2 thermostat as a unified gateway for all in-unit IoT devices. Property managers can now deploy Alfred's commercial-grade Zigbee smart locks alongside climate control via a single, powerful API, reducing hardware costs, simplifying installation, and streamlining ongoing maintenance across entire properties. Integrating with INTEREL's EOS platform "This INTEREL certification represents a milestone for Alfred as we expand our footprint in the multi-family housing sector," said Brad Cook, Head of Product & Integrations at Alfred International. "Our smart locks were engineered with property managers in mind, offering the durability, flexibility, and security required for high-traffic residential environments. By integrating with INTEREL's EOS platform, we're delivering a proven playbook optimized for multi-family properties that require secure, manageable access across hundreds of units." Powerful integration without complexity Alfred's Zigbee-certified smart locks connect directly to the EOS 2 thermostat via Zigbee 3.0, instantly becoming accessible through INTEREL's enterprise-grade smart building API. This architecture provides property management companies with unprecedented control over access management at scale, while enabling seamless integration with existing property management systems, building automation platforms, and resident mobile apps. DB2S's RFID capabilities "Alfred's commitment to building code compliance and commercial-grade security makes them an ideal partner for our multi-family ecosystem," said Florian Gallini, CEO at INTEREL. "The ML2's unique ability to retrofit existing mortise locks and the DB2S's RFID capabilities address real challenges property managers face daily. Together with EOS 2, we're delivering a unified solution that dramatically simplifies smart building deployments while enhancing both security and resident satisfaction." Key Benefits for Property Managers Unified Platform Management: Control access and climate through a single API, eliminating the complexity of managing multiple vendor systems. Scalable Access Control: Manage hundreds of units efficiently with Alfred's capacity for 250 unique pin codes and RFID cards per lock, plus unlimited Bluetooth key sharing through the Alfred Home app. Retrofit-Friendly Solutions: The ML2's patented design retrofits existing mortise locks without door modifications, while the DB2S offers modern deadbolt replacement—both ideal for properties mixing new construction with renovations. Enhanced Security and Monitoring: Real-time door status monitoring, auto-relock capabilities, low-battery alerts, and tamper-proof technology ensure properties maintain the highest security standards. Self-Service Amenities: Enable automated vendor or contractor access, and time-based guest entry without staff intervention, reducing operational overhead. Simplified Commissioning: One-touch pairing through the EOS Installer App enables rapid deployment across entire properties, with voice-guided setup in five languages. The integration supports both new construction and retrofit projects, with Alfred's ML2 being particularly suited for older properties with existing mortise locks—a common scenario in major metropolitan rental markets. Availability Property management companies, smart building integrators, and multi-family developers can learn more about deploying Alfred locks with INTEREL's EOS platform.
Innodisk Group, a global pioneer in Edge AI solutions, announced its new Edge AI strategy and brand positioning, marking its evolution from data-centric innovation to AI-driven integration. Backed by two decades of industrial expertise, Innodisk now positions itself as the “Keystone” that bridges global AI ecosystems with real-world deployments. By integrating AI technologies and infrastructures from Intel, NVIDIA, Qualcomm, and Axelera AI, Innodisk transforms advanced architectures into deployable solutions for both Industry AI and Enterprise AI markets. Together with ecosystem partners including Kenmec and Data Systems, the company enables faster AI adoption across manufacturing, automation, healthcare, and enterprise sectors. AI adoption acceleration As AI adoption accelerates, enterprises are no longer asking “whether,” but “how” — driving the need for faster, scalable deployment through Edge AI. This evolution brings intelligence closer to where data is generated, fueling two complementary domains: Industry AI: Built for smart manufacturing, automation, transportation, healthcare, retail, and smart cities, Industry AI enhances on-site responsiveness through real-time recognition, predictive maintenance, and intelligent workflow optimization. Enterprise AI: Designed for data centers, on-premise AI, and advanced models such as LLMs and VLMs, Enterprise AI supports secure, intelligent decision-making across corporate, financial, medical, and public sectors. Innodisk’s two-decade evolution Since its founding in 2005, Innodisk has evolved from an industrial memory and storage provider into a pioneer in comprehensive Edge AI solutions. This transformation reflects the company’s long-term investment in software, firmware, and ecosystem partnerships. "Our journey from Data to AI represents a strategic elevation," said Randy Chien, Chairman of Innodisk Group. "As a Keystone, we bridge global AI platforms with practical industry deployments. We serve as the critical foundation 'before the last mile', helping customers seamlessly implement Edge AI in real-world applications through our comprehensive product and technological capabilities." Today, Innodisk and its subsidiary Aetina are recognized as Intel Gold Partner, Qualcomm IoT Partner, and NVIDIA Elite Partner, reinforcing their dominance in the Edge AI domain. Innodisk’s three strategic pillars From components to Edge AI systems — scalable Edge AI architecture Innodisk has expanded from hardware components to complete Edge AI solutions, including embedded camera modules, NVIDIA MGX Edge AI servers, and APEX Edge AI computing systems. This modular, scalable product ecosystem enables flexible adaptation across diverse application scenarios, bridging critical gaps from single components to complete edge AI systems. Software-driven hardware innovation — adding value through R&D depth Recognizing that AI integration depends as much on firmware and software as on hardware, Innodisk dedicates over half of its R&D resources to software and firmware development. This focus enables seamless cross-platform compatibility, high-level customization, and rapid adaptation to complex deployment environments—a key differentiator in industrial AI markets. Heterogeneous integration — building a thriving AI ecosystem Through strategic collaborations with global technology pioneers — Intel, NVIDIA, Qualcomm, and Axelera AI — alongside industry specialists like Kenmec and Data Systems, Innodisk creates an open and collaborative ecosystem. This comprehensive approach spans AI computing cores, machine vision, peripheral expansion, and software services, accelerating AI transformation across both industrial and enterprise sectors. AI Beyond the Edge Forum Continuing its mission to bring AI closer to real-world applications, Innodisk and its partners co-hosted the “AI Beyond the Edge” Forum, featuring demonstrations including inspection robots, contraband detection systems, AI enterprise assistants, and the latest solutions developed for NVIDIA Jetson Thor humanoid platforms.
NAKIVO Inc., a fast-growing software company specializing in data protection and disaster recovery solutions for virtual, physical, cloud, and SaaS environments, has now announced financial results for Q3 2025, driven by growth in EMEA, customer expansion, and new partnerships. Strong overall business growth NAKIVO achieved 20% booking growth and 15% collections growth in Q3 2025 vs. Q3 2024, demonstrating continued demand for the company’s data protection solutions across all regions. EMEA accounted for 57% of booked revenue, Americas for 30%, and APJ for 13%. EMEA leads global revenue growth EMEA recorded the highest revenue growth of 29% in Q3 2025 vs. Q3 2024, reflecting increased adoption among enterprise customers and managed service providers (MSPs). The largest deal of the quarter came from Italy, valued at $74,884. The top two fastest-growing countries in terms of revenue were Greece and Belgium. Revenue doubled (100% growth) in several countries in Q3 2025, including Guatemala, Kenya, Andorra, Greece, Bulgaria, Belgium, Ukraine, Montenegro, Denmark, Tunisia, New Zealand, India, Slovakia, Romania, Japan, Georgia, Indonesia, Maldives, and Poland. Customer growth and highlights NAKIVO’s customer base expanded by 9% vs. Q3 2024, with customers now spanning 188 countries. For the first time, customers from Bahrain and Jersey joined the NAKIVO community. Notable new customer names in Q3 2025 include Siena College, City of Orville, European Hospital Italy, Tesla Engineering LTD, and others. Enterprise and partner ecosystem growth Enterprise deployments grew by 19% compared to Q3 2024, driven by strong adoption from larger organizations and MSPs. The company also expanded its partner ecosystem, welcoming 203 new partners globally in Q3 2025, further strengthening NAKIVO’s reach and collaboration network. Cloud provider expansion The NAKIVO Cloud Provider Program continued to expand, posting a 3% increase in Q3 2025. New cloud providers joined from Albania, Barbados, and Cape Verde, extending NAKIVO’s cloud presence to new regions. New partnership announcement In Q3 2025, NAKIVO announced a new strategic partnership with MSP Nordics, aimed at delivering faster, more reliable, and efficient data protection and disaster recovery services to customers across Northern Europe. Product announcement During the quarter, NAKIVO launched NAKIVO Backup & Replication v11.0.4, introducing compatibility support for VMware vSphere 9. This update underscores NAKIVO’s ongoing commitment to supporting the latest virtualization technologies and ensuring seamless protection for diverse IT environments. Executive statement “Q3 2025 was another strong quarter for NAKIVO, highlighted by exceptional growth in EMEA and the expansion of our customer and partner base worldwide,” said Bruce Talley, CEO of NAKIVO Inc. “We continue to focus on innovation and operational excellence to support our partners, MSPs, and enterprise customers with reliable, efficient, and cost-effective data protection solutions.”
G2E Asia @ the Philippines, a special edition of G2E Asia, makes its highly anticipated return to Manila Marriott Hotel this December 10 and 11. Tailored for the Philippine gaming industry, the two-day event will feature over 100 brands in the exhibition, many of which have no local presence. Complementing the exhibition is a series of dynamic activities, including dedicated networking events for various industry segments, specialized masterclasses to support professional development, and a two-day conference addressing the latest developments in the Philippine gaming industry. Networking events for slots, table games, iGaming and more G2E Asia is all about connecting professionals across the industry. Its networking events, tailored for different segments, provide opportunities to engage with industry professionals both locally and globally. Networking events include: Slots Networking Cocktail – Dec 10 (Wed), 15:00 – 16:00 iGaming Networking Cocktail – Dec 10 (Wed), 15:00 – 16:00 Table Games Networking Cocktail – Dec 11 (Thu), 15:00 – 16:00 IT & Marketing Networking Cocktail – Dec 11 (Thu), 15:00 – 16:00 G2E Asia Closing Party (open to all) – Dec 11 (Thu), 16:30 – 17:30 Specialized masterclasses for iGaming, IT and marketing professionals Recognizing the growing importance of iGaming, IT and marketing in the industry, G2E Asia’s specialized masterclasses help professionals at all levels upskill in these key functions. Each session delivers practical insights on emerging trends while providing opportunities to learn and network with peers. All sessions are held in the exhibition hall and are accessible with an expo-only pass. Masterclasses include: iGaming Masterclass – Dec 10 (Wed), 14:00 – 15:00 IT & Marketing Solutions Masterclass – Dec 11 (Thu), 14:00 – 15:00 Two-day conference focused on the Philippine gaming industry Opening the conference, G2E Asia is proud to welcome Mr. Alejandro H. Tengco, Chairman and CEO of Philippine Amusement and Gaming Corporation (PAGCOR), as the morning keynote speaker on December 10, followed by Mr. Greg Hawkins, President and Chief Operating Officer, Bloomberry Resorts Corporation/Solaire Resort, for the afternoon keynote. Over two days, the conference will explore the latest trends shaping the Philippine gaming industry, featuring top industry pioneers who will share insights, strategies, and emerging opportunities across the sector. Key trends in the online gaming sector The Wednesday, December 10 conference will take a deep dive into the land-based gaming sector, exploring regulatory adaptations, non-gaming innovations, and more. Speakers including Mr. Evan Spytma, CEO of Casino Plus; Mr. Shaun McCamley, Founder and Chairman of GameWorkz; Mr. Samuel Wilkes, Vice President, F&B Business Development & Strategy of Solaire Resort; Mr. John Lucas, Chief Hospitality Officer of Newport World Resorts; and others. The Thursday, December 11 conference will spotlight key trends in the online gaming sector, covering business growth, AML best practices, CSR, slots and ETG technology, and more. Speakers include Mr. Ricardo Banaag, President and CEO of DFNN Inc.; Mr. Jeremy B. Luglug, Assistant Vice President, Electronic Gaming Licensing Department of PAGCOR; Ms. Nerie Aquino, Director – Gaming Compliance, Legal & Compliance of Okada Manila; Ms. Vina Claudette Oca, Assistant Vice President, Gaming Licensing & Development Department of PAGCOR; Mr. Alexander Ngo, Director of LexisNexis Risk Solutions; and others.
Secutech Thailand 2025 opened at the Queen Sirikit National Convention Center (QSNCC), placing the spotlight firmly on smart security and fire safety technologies. The show will take place alongside Fire & Safety Thailand, Thailand Smart City Expo, and EdTEX, featuring over 400 exhibitors from more than 10 countries and regions. This global cross-section offers visitors the opportunity to explore the latest industry-wide innovations across the 11,600 sqm fairground. A comprehensive fringe program includes seminars where industry experts will share valuable insights on cutting-edge smart technologies, fostering both collaboration and education. Supported by robust government and public sector backing, the show acts as a key nexus for advancing Thailand’s smart city vision. Future of security and fire safety Ms Regina Tsai, General Manager of Messe Frankfurt (HK) Ltd – Taiwan Branch, offered insights into the show’s smart product focus: “We recognize that the future of the security and fire safety industries lies in smarter, more integrated solutions." "Secutech Thailand has brought together the most innovative exhibitors, pioneering industry experts, and key government and public sector partners to create a dynamic hub where knowledge, technology, and collaboration intersect to shape the future of both industries.” Smart city transformation A new strategic partnership with N.C.C. Management and Development, organizers of the co-located Thailand Smart City Expo, significantly broadens visitors’ access to cross-sector business opportunities and reinforces Secutech Thailand’s position as the country’s pioneering platform for security and fire safety innovation. Ms Tsai explained: “Our partnership with N.C.C. Management and Development elevates the show’s strategic value by enabling deeper integration and unlocking substantial cross-sector business opportunities for both visitors and exhibitors.” This collaboration, especially when considered alongside the concurrent Fire & Safety Thailand and co-located EdTEX, will help accelerate Thailand’s smart city transformation while broadening the scope of opportunities for visitors. Latest smart security and fire safety applications To facilitate simpler sourcing, Secutech Thailand will feature five specialized solution categories that showcase the latest smart security and fire safety applications: Surveillance & Access Control, which includes AI cameras, biometric access, and visitor management platforms to enhance security and efficiency. Fire & Safety Systems, presenting detectors, alarms, and suppression technologies to protect lives and assets. Disaster Prevention & Critical Communication, offering seismic monitoring, gas detection, PA/evacuation systems, and anti-drone solutions crucial for urban resilience. Smart Technologies & Mobility, highlighting 5G, IoT, building automation, robotics, EV charging, and intelligent traffic management. Integrated Safety & Security Systems, demonstrating the integration of video analytics, cloud computing, and big data for comprehensive urban management. Fringe Program Seminar Highlights Complementing these solution categories is an extensive fringe program where industry experts will share key insights on the smart technologies shaping the future of security, fire safety, and smart cities. Designed to encourage knowledge exchange, insightful seminars will equip attendees with the tools and understanding needed to navigate and stay ahead of emerging trends in the rapidly evolving industry landscape. Highlights include: AI Disruption and the Future of Smart Factories: Opportunities, Challenges, and Adaptation for Smart Cities: Mr Thammarat Arsasuwan, a lecturer at Siam Technology College, will reveal how AI is transforming smart factories and the implications for smart city development. Digital Futures of Urban Living: Shaping Smart Cities with IoT and AI: Dr Suthat Krongchon of the Thai IoT Association will explain how IoT and AI technologies are driving the evolution of future urban living and smart city planning. Safe and Smart Use of Drones in Security and Smart City Applications: Mr Kasitbhat Intuyos, from the Civil Aviation Authority of Thailand (CAAT), will talk about the best practices and safety considerations for drone use in security and smart city contexts. Development of the Thai AI platform model Other seminar topics will cover innovation in disaster prevention and mitigation, sustainable CCTV solutions, cybersecurity for smart infrastructure, and the development of the Thai AI platform model for smart city applications – highlighting the technologies and strategies driving the future of urban resilience, security, and sustainable development. This year’s show benefits from strong support by key government and public organizations driving the nation’s adoption of smarter security and fire safety technologies. This wide-ranging cross-sector backing highlights the event’s extensive industry representation and demonstrates its role in preparing visitors to capitalize on major government and industry initiatives like Thailand 4.0 and the Eastern Economic Corridor (EEC). Some of the key supporting organizations participating at Secutech 2025 include: Association of Municipalities and Cities Bangkok Fire and Rescue Department Drone Association of Thailand Fire and Rescue Association National Cyber Security Agency National Municipal League of Thailand Thai Chamber of Commerce Thai Generator Association Thai IoT Association Thai Intelligent CCTV Association Thai Mechanical and Electrical Consulting Engineer Association Thai Security Association The Building Inspectors Association The Civil Aviation Authority of Thailand Thailand Convention Exhibition Bureau Thailand Information Security Association Thailand Productivity Institute Fire safety products There will be much for visitors to explore on the show floor, with highlights including pioneering security exhibitors such as HIP Global Co Ltd, Motorola Solutions, Vive Co Ltd, and many more, while featured fire safety products range from Dahua & Wisualarm’s smart fire detection systems to Sanlien Technology Corp’s expert structural and vibration monitoring solutions. The fair’s business matching program facilitates strategic connections between exhibitors and key industry stakeholders. Buyers from the Thai government, local hospitals, hotels, law enforcement agencies, industrial sectors, and provincial fire stations are actively invited to participate. With over 115 sessions already scheduled, the program seeks to maximize opportunities for exhibitors and buyers to forge successful partnerships within a rapidly evolving market increasingly focused on smarter, integrated solutions.


Expert commentary
The Internet of Things is growing quickly. It has moved far beyond a few smart gadgets at home. Today, connected technology is in homes, factories, hospitals, farms, and cities. Experts expect the global market for IoT devices to rise from about $70 billion in 2024 to more than $181 billion by 2030. This means more devices, more data, and more opportunities for industries everywhere. This growth comes from several advances working together. 5G connections make it possible to send and receive data faster. Edge computing processes information close to where it is created, which helps with quick decisions. Analytics allow organizations to understand and act on the data they collect. Together, these improvements are opening the door to new ways of working, producing, and communicating. IoT: The next generation As devices become more advanced, they use more energy and send more data. Think about high-quality security cameras, detailed environmental sensors, or systems in vehicles that send constant updates. All of these devices require a strong supply of power and a steady connection. In 2024, sensors made up more than 32 percent of all IoT device sales. Sensors are essential, yet the next wave of devices will do even more. They will process information themselves, use artificial intelligence, and include many features in one unit. This progress depends on networks that deliver both the energy and the bandwidth to support them. Into the future Devices and applications keep improving, so networks need the flexibility to handle what comes next Setting up IoT systems is about more than meeting today’s needs. Devices and applications keep improving, so networks need the flexibility to handle what comes next. A future-ready design provides extra capacity in both power and data flow. This way, when it’s time to add new devices or upgrade existing ones, the system is prepared without requiring major changes. One smart approach is to use modular equipment. For example, a network switch might deliver more power than devices currently use, while allowing room to connect more advanced devices later. This helps keep the system ready for growth. Built for all IoT devices often operate in challenging places. Factories, power plants, rail lines, and shipping ports face extreme temperatures, dust, vibration, and other difficult conditions. Network equipment in these locations needs the strength to keep working through heat, cold, and constant use. Industrial-grade gear is designed for these environments. It can run in a wide range of temperatures, handle physical impacts, and resist interference. Features such as port security, which keep a connection safe if a cable is removed, help protect both the equipment and the data it carries. Systems with backup power inputs continue to run even when one power source goes offline. Plug into PoE Power over Ethernet (PoE) sends both energy and data through the same cable Power over Ethernet (PoE) sends both energy and data through the same cable. This makes installation simpler and allows flexibility in where devices are placed. And as devices become more capable, they often need more power to operate. The latest innovation for PoE can deliver up to 90 watts on each port. This is enough to support advanced devices like AI-enabled cameras or multi-sensor units. When every port on a switch can supply that much power at the same time, adding more devices is straightforward and performance stays strong. Protecting the network Every connected device is part of a larger network. Protecting this network means securing data from the moment it leaves the device until it reaches its planned destination. Built-in security features in network equipment — such as secure architecture, encryption support, and physical safeguards — help keep information safe. They also help meet industry and government requirements for equipment sourcing and design. A clear path Organizations leading in IoT think ahead. They prepare for the next stage of technology by building networks with flexibility, durability, and protection in mind. These networks supply extra power, allow more bandwidth, and keep data secure while adapting as the system grows. The focus is on creating a foundation that supports innovation year after year. This means planning for devices that are faster, more capable, and more connected, while making sure the infrastructure grows right along with them. Looking ahead Strong, adaptable, and secure networks will allow connected devices to reach their full potential The IoT of the future will touch nearly every part of daily life. It will help farmers grow food more efficiently, guide self-driving vehicles, improve medical care, and keep cities running smoothly. As devices multiply and gain new abilities, the networks powering them need to grow in step. Strong, adaptable, and secure networks will allow connected devices to reach their full potential. By planning for both today’s needs and tomorrow’s possibilities, organizations can make the most of the opportunities IoT brings—and keep those opportunities expanding for years to come. Key takeaways: Preparing for the future of IoT The IoT market is growing fast The global market for connected devices is expected to grow from $70 billion in 2024 to more than $181 billion by 2030. This means more devices in more industries, from farming to healthcare to transportation. Devices are using more power and data Newer devices have more features — such as high-quality video, built-in AI, and multiple sensors — and these require stronger power supplies and faster connections. Future-ready networks are essential Infrastructure should allow extra capacity for both power and data. This ensures new devices can be added without major changes or delays. Environments vary, so equipment should match the setting Industrial areas, outdoor spaces, and transportation hubs need rugged, reliable equipment that works in extreme conditions and stays secure. Security starts at the network level Built-in protections — like secure architecture, encryption, and physical safeguards — help keep information safe and meet important industry requirements.
The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems PKI certificates form the backbone of secure digital communications, but Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems unsafe by 2029 and could render all current cryptography unsafe by 2034. As with any software implementation, there are pitfalls to avoid, including vendors that use proprietary technology that’s incompatible with other systems and “gotcha” pricing tactics where a slight increase in certificate usage triggers a massive increase in pricing. However, the time to implement PKIaaS is now. Physical security faces growing cyber threats Although ransomware attacks directly on computing infrastructure dominate business headlines, physical security systems are also under threat. An HID survey of over 1,200 security professionals, end-users and executives shows that 75% reported threats to their physical security systems in the past year, as these systems are more tightly integrated with company IT networks. Until recently, most physical access control systems (PACS) were proprietary and worked only on the specific systems they were designed to interact with. However, the movement toward open supervised device protocol (OSDP) revolutionized the field, allowing companies to integrate and control devices from different vendors while improving compatibility and security. PACS and IoT devices PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices As a result, 40% of companies plan to either update or change access control systems in the next year, with 21% emphasizing the need for open standards like OSDP to both improve interoperability and future-proof their systems. When asked about reasons for a proposed upgrade, more than half cited convenience, while another 40% sought to improve their overall security posture. PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices continues to increase, promoting security and reducing manual processes related to tracking certificates. Regulatory compliance demands automation and agility Companies also face increased regulatory pressures regarding technology in general — and certificates in particular. The European Union’s Cyber Resilience Act sets mandatory cybersecurity standards for manufacturers and retailers, covering the planning, design, development and maintenance of products throughout the entire value chain. Certain high-risk products must undergo third-party evaluation by an authorized body before being approved for sale in the EU. EU Cybersecurity Act shows a unified certificate framework for ICT products, services, and processes More specifically, the EU Cybersecurity Act establishes a unified certification framework for information and communications technology (ICT) products, services, and processes. Businesses operating in the EU will benefit from a “certify once, recognized everywhere” approach, meaning that approved ICT offerings will be accepted across all EU member states. Given the global nature of PACS, these regulations likely will impact companies well beyond the EU, much like the general data protection regulation on websites has. These changes, when considered together with rapid advancements in quantum computing, underscore the need for a unified certification solution such as PKIaaS to handle increased — and increasingly complex — certificate compliance. A path to PKI modernization Modernizing PKI through a PKIaaS model doesn’t have to be difficult. With a clear and phased approach, most organizations can transition smoothly while reducing risk and improving efficiency. It starts with a quick assessment of current certificate usage to understand where certificates are issued, how they’re renewed and any gaps in coverage. From there, it's about defining what you need and selecting a trusted partner. Look for a solution that integrates well with your existing systems, supports automation and scales as your needs grow. In terms of partners, not all PKIaaS vendors are the same. Look for one with a strong security track record and predictable pricing, which will simplify both onboarding and long-term management. When it comes to vetting vendors, ask the following questions: Is the solution scalable? The trend toward future-proof installations has never been greater. As the number of certificates increases, any PKIaaS solution must be able to grow in concert. How will pricing change as certificate volume grows? Some solutions are priced in tiers by the number of certificates. If a company exceeds that maximum by even a single certificate, it owes not only the price difference between tiers, but it will also be expected to pay for that tier the following year, which can bring a significant financial surprise. How are CAs accessed and stored? Look for companies that can provide long-term offline secure storage of certificates that can also track when CA keys are accessed. What support is included in the PKIaaS? Specifically ask vendors about up-front costs for implementation and onboarding to get a real apples-to-apples comparison among partners. Step-by-step replacement of manual processes A pragmatic approach allows corps to move quickly and confidently from legacy PKI to a scalable Once a vendor in place, start with a focused rollout, e.g., automating certificate renewals for internal systems or a specific business unit. Once the pilot is complete, expand automation with a step-by-step replacement of manual processes to limit operational disruptions. Finally, as PKIaaS becomes embedded in day-to-day operations, it’s important to align it with broader security governance. Establishing regular reporting and clear policies, as well as future-proofing for quantum-safe cryptography to ensure long-term resilience and compliance without adding complexity. This phased, pragmatic approach allows organizations to move quickly and confidently from legacy PKI to a scalable, secure and future-ready solution. A necessary upgrade According to an analyst report, manual certificate management can cost organizations up to $2.5 million annually in labor and outage-related expenses. While automation reduces these costs by up to 65%, the real challenge in IoT environments lies in managing scale. With device lifecycles often spanning decades and certificate volumes reaching millions — especially across distributed, resource-constrained endpoints — manual PKI processes and legacy infrastructure simply can't keep up. The convergence of regulatory mandates, quantum computing threats and rising cyber risks to connected physical systems makes scalable, cloud-based PKIaaS not just a strategic advantage, but a foundational requirement for secure IoT deployments.
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralized access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerization and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a license plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralized access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerization and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialized toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilize your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customize deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimized. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralized servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerized framework An equally important aspect of containerization is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerized framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialized role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organizations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyze customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organizations the flexibility to optimize cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organization can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimizing unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerization via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
Security beat
There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis. Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localized threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Center in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernizing security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system Eagle Eye Networks says they are focused on helping integrators "organize the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarization, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditized tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Center SaaS has had a fast and successful launch. It enables cloud-based systems with local storage. Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratize evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app center” enables additional features to enhance XProtect without involving integration. Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernization and open integration Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernization, enabling security professionals to better utilize new technology. Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernization," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favorable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond license plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Center (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Center to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernization roadmaps, suggests a security ecosystem built for agility and future growth. These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.
For all the emphasis on cloud systems and centralized servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyze vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organization founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyze the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.
Case studies
HID, the pioneer in trusted identity and authentication solutions, announced that it successfully supported Stockholm's public transit authority, Storstockholms Lokaltrafik (SL), in transforming the daily travel experience for hundreds of thousands of passengers in the capital through a comprehensive digital ticketing modernization program. The initiative has eliminated paper tickets and enabled seamless contactless payments across buses, ferries, trams and metro stations. The technology upgrade has delivered measurable benefits, including dramatically reduced fare evasion that translates to millions of Swedish Kronos in recovered revenue for SL. Residents experience faster, more convenient travel New ticketing infrastructure was specifically selected because it withstands harsh Nordic winters With the new integrated ticketing devices from HID, citizens can now use the same payment method – whether a mobile app, contactless card or digital wallet – across all 2,600 buses, 140 ferry validators, 320 tram platforms and 1,035 metro fare gates throughout the capital region. Most importantly, the new ticketing infrastructure was specifically selected because it withstands harsh Nordic winters, a crucial factor for passengers who depend on public transit year-round. Legacy hardware, systems and networks “Serving hundreds of thousands of passengers daily across multiple transit modes required a ticketing solution that could scale with our needs while providing a consistent experience for our riders." "We chose HID for its multi-technology ticket validators for buses, ferries, and gates, as well as its ability to run side-by-side with our legacy hardware, systems, and networks. It was a real challenge for everyone involved to get this working, but it was one we overcame together,” said Karin Harrius, Business System Administrator, Ticket Readers at SL. Seamless ecosystem across touchpoints The implementation was designed to ensure a consistent validation experience and deliver a seamless ecosystem across all transit touchpoints. It included: Enhanced passenger convenience on buses: HID VAL100 ticket validators integrated with HID TripTick™ barcode technology and NFC/RFID contactless payment functionality in a single point of presentation for tickets and travel passes Reliable outdoors operation in extreme weather: HID VAL150 validators featuring a waterproof design on ferries and tram platforms Streamlined fare collection across metro stations: HID TripTick 220 OEM barcode, NFC and cEMV ticket modules within fare gates and ticket machines in the Stockholm metro, enabling multi-format ticket reading throughout the system. Significant reduction in fare evasion Improvement ensures that all users contribute fairly to keeping these vital transport links The modernization has delivered substantial financial benefits for SL. Fare evasion dropped from 3.1% in 2019 to just 2.3% in 2023 – a 26% reduction that has recovered millions of Swedish Kronor annually for reinvestment in public transit infrastructure and services. The impact was particularly dramatic on ferry services, where ticket validation rates increased from just 58% in November 2021 to 89% by March 2025. This improvement ensures that all users contribute fairly to maintaining these essential transportation links connecting Stockholm's islands and waterways. Digital-first approach meets evolving expectations Citizens particularly benefit from the system's ability to prevent ticket duplication The comprehensive digital transformation addresses the evolving expectations of Swedes in an increasingly mobile-first society. Citizens particularly benefit from the system's ability to prevent ticket duplication and unauthorized sharing through social media platforms – issues that had previously undermined fare revenue and service sustainability. Future integration of new technologies With Stockholm County – which represents 20% of Sweden's population despite covering only 2% of the country's area – the scalable, open-architecture system ensures SL can adapt to evolving technologies and passenger expectations. The system's flexibility allows for future integration of new technologies and travel services without requiring complete infrastructure replacement, protecting the public investment while maintaining service innovation.
Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a pioneering provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Multifamily access control challenges The upscale 65-unit apartment property previously issued all residents a fob for perimeter access and a key to access the mechanical lock at their apartment door. Property manager was experiencing significant challenges with its perimeter access control system Between legacy fobs and keys, patchwork infrastructure, and a steady flow of traffic throughout the complex – the property manager was experiencing significant challenges with its perimeter access control system. “By running disparate systems, it became a complicated and time-consuming process for me to create new fobs for residents when they moved in and then deactivate them when they moved out,” says Sally Caron, Residential Property Manager at the Artisan Apartment Homes. “Plus, it was costly to replace lost fobs and mechanical keys." Seamless solutions After a careful review process with its integrator Comfort, the Artisan moved forward with an ecosystem of solutions from Allegion. In 2022, the mechanical locks on all 65 apartment unit doors were upgraded to Schlage Control® smart locks with ENGAGE™ access control to give residents keyless entry. The following year, the Artisan upgraded to the Zentra cloud-based software platform from Allegion, which manages perimeter, amenity and unit access all in one centralized system. Enrollment and move-out process “I absolutely love having everything on one platform as it has made my job easier in so many ways,” says Caron. “Anything state-of-the-art is always more convenient and easier to manage. I’m now able to give temporary access to people for grocery or online deliveries, UPS, Fed-Ex, or housekeeping. Residents now have an overall better experience not only during the enrollment and move-out process, but every day." Residents to access the building Mobile resident key in Apple Wallet was introduced as a way for residents to access the building Most recently, the mobile resident key in Apple Wallet was introduced as a way for residents to access the building and their individual apartment units by using their iPhone or Apple Watch. The Artisan is also on track to be the first multifamily property to deploy resident keys in Google Wallet in mid-2025. Adoption of mobile credentials “Our residents love the security and convenience of resident key in Apple Wallet and are adapting to the change quickly,” says Caron. “Residents have expressed that they feel safer, and that the adoption of mobile credentials has given them the freedom to go for a jog or a walk without worrying about carrying anything with them but their iPhone or Apple Watch for reentry.”
With a vast portfolio of smart locks, lock management systems, and connected readers, ensuring strong authentication, data integrity, and compliance with global regulations is essential. To meet these challenges, ASSA ABLOY is leveraging the long-time IoT expertise of HID to implement HID PKI-as-a-Service. This strategic deployment is not just about protecting millions of connected devices but also about future-proofing ASSA ABLOY’s security infrastructure for years to come. Cryptographic assurance: Securing every lock, inside and out ASSA ABLOY boosts trust in its devices, preventing unauthorized clones or counterfeit products A crucial aspect of this solution provides Genuine ASSA ABLOY products — an assurance that every smart lock, reader, and system within the network is verified as an authentic and authorized product. By leveraging PKI-based identity verification, ASSA ABLOY strengthens trust in its devices, preventing unauthorized clones or counterfeit products from entering the ecosystem. For example, the inside of a lock can only pair with a matching outside component from ASSA ABLOY, ensuring the integrity and security of the entire system. This level of cryptographic trust not only enhances device security but also strengthens protection against counterfeit components or unauthorized modifications. Meeting stringent security and compliance needs As the industry faces increasing regulatory pressure, including the EU Cybersecurity Act and the upcoming Cyber Resilience Act, ASSA ABLOY needed a scalable, automated solution to manage over a million certificates annually. HID’s expertise in certificate management provides enhanced security, reduced complexity HID PKI-as-a-Service enables seamless device authentication, automated provisioning, and hierarchical key management, ensuring compliance with evolving security standards. An essential part of the solution is the offline Root Certificate Authority (CA), which serves as the foundation for secure operations. HID’s expertise in certificate management provides enhanced security, reduced complexity, and operational efficiency across ASSA ABLOY’s global IoT ecosystem. Driving innovation and efficiency By integrating automated bootstrapping and customized attestation certificates, the implementation has significantly improved operational efficiency while minimizing manual effort. This allows devices, including those operating offline, to maintain secure provisioning and updates without requiring constant connectivity. Additionally, the system is future-ready, designed to support emerging IoT protocols such as Thread, CoAP, EDHOC, and OSCORE, ensuring adaptability as the industry evolves. Collaborative success The success of this deployment is rooted in a strong alliance between ASSA ABLOY and HID The success of this deployment is rooted in strong collaboration between ASSA ABLOY and HID. A dedicated steering group ensured alignment on global PKI policies and security objectives, leading to a smooth rollout with minimal disruption. “The implementation of HID PKI-as-a-Service wasn’t just about meeting current security requirements, it was about future-proofing our IoT ecosystem for security and scalability,” says Anders Calbom, VP & Head of Technology Solutions, ASSA ABLOY. Major milestone in IoT security Anders Calbom added: “With the ability to manage over a million certificates annually, we’re now positioned to scale our security infrastructure alongside our business growth.” This initiative marks a major milestone in IoT security, compliance, and operational efficiency. As ASSA ABLOY continues to innovate and expand, HID PKI-as-a-Service provides the secure foundation needed to drive future growth and digital transformation.
In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfillment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organizations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorized employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalized key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.
Inaugurated on May 25, 1999, the Museo Antropológico de la Comunidad de Madrid began construction in 1987. It wasn't until ten years later, in 1997, that the decree establishing the museum was issued, thus formalizing the institution's existence. As part of the museum’s modernization, the client needed an SMD LED solution that includes a glass in front of it to avoid dead pixels and any possible damage or accidents caused by museum visitors. Dahua, together with Epsilon Media, provided an innovative solution that overcame these limitations and optimized the museum experience. Renovation of The Museum The Museo Antropológico de la Comunidad de Madrid was converted from the former Dominican Convent of the Mother of God, built in several phases between the 17th and 18th centuries. As an old establishment, the client wanted to renovate the installation step by step, with the first stage comprised of an LED wall in the main entrance. Their first idea was to install an SMD LED solution with a glass front in order to protect the LED wall and avoid issues with all visitors visiting the museum. Building such a solution is costly and may not be the right solution due to the lack of front-line maintenance. Flip COB Indoor Fine Pixel Pitch LED The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology Together with the Epsilon Media and the Dahua team, the museum evaluated the Dahua Flip COB Indoor Fine Pixel Pitch LED solution in person. After a deliberate discussion, the client agreed that it is the right solution for their facilities. The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology that enables full illumination and softer light without pixel particles, effectively combating digital visual fatigue. Key Features Another notable feature of this LED is its dustproof and anti-fingerprint surface that leaves no visible traces when touched It allows full front maintenance that makes disassembly and maintenance highly efficient. With the full control of the ink color parameters on the surface of the light board, the ink color at all angles is guaranteed to be uniform, which helps solve the industry’s issue regarding ink color differences in batches. Other benefits include high contrast of 10,000:1, energy-saving and power-saving capabilities (less than 75 watts per box, 40% lower than other SMD products), and 160° super wide viewing angle. Another notable feature of this LED is its dustproof and anti-fingerprint surface that leaves no visible traces when touched. It is also waterproof and moisture-proof, with a low rate of dead pixels and high hardness against knocks. Doesn’t Require Additional Glass Protection These features effectively meet the requirements of the client regarding additional protection against damage to the LED during operating hours. Dahua continues to drive technological innovation to improve the way people experience history. With the Dahua Flip COB Indoor Fine Pixel Pitch LED and the Quality Service Epsilon Media offered, the Museo Antropológico de la Comunidad de Madrid was able to install an LED wall without the need of additional glass protection, providing an exceptional digital display of historical images inside the museum while enhancing visitor experience and saving costs. Remarks From The Museum Director “With the video wall that Dahua installed for us, we were able to renovate the first unit that was originally there. This type of technology is significantly important in transmitting knowledge about the past. The overall collaboration was very satisfactory,” says Mr. Enrique Baquedano, Director of Museo Antropológico de la Comunidad de Madrid. “The Dahua team was always ready to help whenever we encountered any issue. What’s more, the LED wall is balanced and cohesive with the overall aesthetic of the museum, which is an added bonus,” concluded Mr Enrique.
iCard, a pioneering European e-money institution, has successfully upgraded its customer checks with Regula’s advanced biometric and document verification technologies. By integrating Regula Face SDK and Regula Document Reader SDK with its KYC (Know Your Customer) and risk assessment systems, iCard has moved to speedy, automated verification with improved fraud detection, and enhanced the overall experience for customers in 30+ countries. Implementing Regula’s solutions As a licensed fintech organization, iCard must comply with strict European KYC regulations while maintaining a robust risk assessment system alongside low-effort customer experience. iCard complies with strict European KYC rules while keeping a robust risk review system Prior to implementing Regula’s solutions, manual verification processes led to inefficiencies, longer wait times, increased fraud, and potential friction for users. Customers often had to re-upload photos or wait for manual reviews, causing delays—especially outside business hours. Additionally, iCard needed a more comprehensive document verification system that was capable of recognizing a broader range of ID types. The Regula solution: Fast and fraud-free identity verification To modernize and automate its verification process, iCard selected Regula’s complete solution for document and biometric verification for its industry-leading accuracy, ease of integration, and ability to meet the company’s specific requirements. Regula Face SDK: Integrated into the iCard Digital Wallet app (Android and iOS), it provides fast and reliable biometric verification when a user logs in or performs a money transaction. The solution conducts instant liveness detection and face matching, preventing fraud attempts, including presentation attacks, deepfakes, or injected videos. Regula Document Reader SDK: Deployed in iCard’s back-office system, it automatically authenticates ID cards, passports, and residence permits, including previously unsupported paper-based IDs. Regula’s solution reads and authenticates data from multiple document zones, including MRZs (machine-readable zones), RFID chips, and barcodes, and cross-validates the information to detect any inconsistencies that may indicate fraud. Tangible business benefits The project was completed in just one month, and the impact has been immediate: Instant identity verification: Customers can now authenticate their identity in under a minute. Reduced operational costs: Automated verification processes have minimized manual reviews. Enhanced fraud prevention: Advanced biometric and document verification strengthen security measures. Increased conversion rates: Faster verification leads to a smoother onboarding experience and reduced drop-off rates. Fast and secure identity verification “Implementing Regula Face SDK and Regula Document Reader SDK has optimized our internal processes while ensuring a seamless experience for iCard Digital Wallet customers." "The integration was completed in a short period, resulting in fast and secure identity verification, improved operational efficiency, and reduced fraud risks—all while boosting customer satisfaction,” says Gabriela Anastasova, Chief Product Officer at iCard. Balancing security and user convenience “In today’s fintech landscape, balancing security and user convenience is critical. Customers expect seamless access, while businesses must comply with strict regulations and defend against sophisticated fraud. We are proud to support iCard in finding that perfect balance." "Our solutions ensure that every identity check is robust, automated, and frictionless, allowing fintech innovators like iCard to scale securely and efficiently,” comments Ihar Kliashchou, Chief Technology Officer at Regula.


Round table discussion
Emphasizing proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
The Internet of Things (IoT) is having a profound impact on businesses across various industries, including security. In physical security as in other business environments, the IoT is changing how systems operate, interact, and create value. In the process, the IoT is driving efficiency, reducing costs, and opening up new avenues for innovation and growth. We asked our Expert Panel Roundtable: How is the Internet of Things (IoT) transforming how security systems are deployed?
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
Products


White papers
Combining Security And Networking Technologies For A Unified Solution
Download
Guide For HAAS: New Choice Of SMB Security System
Download
Integrating IT & Physical Security Teams
Download
Troubleshooting IP Video Systems
Download
5 Easy Steps To An Upgraded Video Surveillance System
Download
Combining Access Control And Intercoms For Better Security
Download
The Wireless Access Control Report 2023
Download
Machine Operator Authentication
Download
Unlocking Wide-Angle Camera Dewarping
Download
Leveling Up With Campus Safety
Download
Simple Security Solutions for SMBs
Download
IoT Connectivity
Download
Modernizing Facilities Management
Download
Charting The Path To Safe Cities
Download
Connected Video Technology for Safe Cities
Download

