Physical security
Verkada, a pioneer in cloud-based physical security, announced its new dual-head camera and enhanced alerting capabilities on its Command platform, along with a wide range of updates that will make it even easier for its customers around the world to keep their people and places safe. Verkada is expanding its multisensor line with a new dual-head camera, the CY53-E Two-Camera Multisensor. With two viewing angles from a single install point, an advanced onboard processor, an...
Genetec Inc., the pioneer in enterprise physical security software, announced the integration of AutoVu Cloudrunner™, its vehicle-centric investigation system (VCIS), with the SaferWatch real-time alerting and reporting platform. Initially developed for the Hawaii Department of Law Enforcement, the integration brings together Cloudrunner’s vehicle search capabilities and SaferWatch’s live communication tools into a single platform, enhancing how public safety agencies and comm...
Vitaprotech, the European pioneer in electronic security solutions, is taking a major step forward in its growth strategy by reshaping its organization. The objective: to offer its clients an enhanced experience — simpler, more consistent, and ever more innovative. Starting July 1st, the group will adopt a new organization built around strong brands, each dedicated to a specific sales channel. This approach will provide clients with tailored support, an integrated technology offering, and...
In an era marked by digital transformation and increasing security demands, access control is evolving from a basic security layer into a comprehensive, intelligent, and user-centric system. As they step into 2025, organizations are no longer just restricting unauthorized entry—they are rethinking how users experience security at every touchpoint. Adoption of mobile access Access control solutions will continue their evolution in 2025 as corps assess and adapt to dynamic According to S...
HID, pioneer in trusted identity and access management solutions, announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity management. This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators and software vendors to seamlessly and rapidly integrate essential physical security solutions, streamlining processes and enhancing system interoperability. Integration...
Genetec Inc., the pioneer in enterprise physical security software, announced the AutoVu™ ANPR Analysis Reports plugin, an advanced investigation tool that expands ANPR-based forensic search capabilities within Genetec™ Security Center. The new plugin empowers law enforcement officers and investigators to quickly narrow down a pool of suspects using vehicle behavior patterns—specifically driving speed and travel cohorts. By eliminating manual data sorting and enabling tar...
News
Intersec Shanghai, the Chinese extension of the globally recognized security brand Intersec, will launch 13–15 May 2025 at the National Exhibition and Convention Center (Shanghai). Gathering a variety of exhibitors, the fair will spotlight digital technologies and innovative solutions across key sectors, including security, fire safety, emergency response, and occupational protection. Digital advancements With a special focus on cutting-edge digital advancements, the show aims to empower public safety, emergency management, industrial safety, and disaster prevention. The global security landscape has become increasingly complex in recent years, driving governments worldwide to prioritize the safety and security sector. Smart security hardware and software market China has taken significant steps by implementing a series of policies to accelerate industry growth China has taken significant steps by implementing a series of policies to accelerate industry growth. By 2025, the smart security hardware and software market in China is projected to reach RMB 91.3 billion (USD 12.5 billion), while the market for occupational protection products is expected to reach RMB 145 billion (USD 19.9 billion). Furthermore, the smart fire safety market is anticipated to surge to RMB 422.2 billion (USD 57.8 billion) by 2026. A joint report by SIA, ASIS, and Omdia predicts a CAGR of 8.2% for the global physical security equipment market and 6.9% for security services from 2022 to 2026. Against this backdrop of robust domestic growth, Intersec Shanghai emerges as a pivotal platform for companies to showcase their innovations and expand their market reach. Global and domestic industry pioneers under one roof Intersec Shanghai combines Messe Frankfurt’s international expertise with Intersec’s extensive resources in the security sector. The show will be held concurrently with the Yangtze Delta International Emergency Disaster Reduction & Rescue Expo (EDRR), which focuses on government-led emergency systems and disaster resilience. Latest advancements in security The previous edition’s EDRR attracted more than 600 exhibitors and over 80,000 visitors, together drawing a higher number of buyers The previous edition’s EDRR attracted more than 600 exhibitors and over 80,000 visitors, together drawing a higher number of buyers and offering a valuable opportunity for cross-sector sourcing in security, safety, and disaster risk reduction. This year, both fairs have attracted leading brands such as 3M, HAINAR GROUP, CETC, CPIC, StarWin, Fire Chem, BFDX, GRANDING, LINGYIN, HANGZHOU AITE, DXGuard, Inrico, Lenovo, BAOLIFENG, OUBAO, PICC, Raythink, Beckwell, SHANGHAI HANYU, Shanghai Hygloves, Shanghai Petrochemical, Shanghai Xihongqiao Navigation Industry Development, Kingber Safety, CommPro, Tianlong Century, CRUN LTD, Sinomartin, Sunstorm, Jiaogao Fire Protection, TAIYU, Zhoan, TLX, top safe, Tyco, VdS, WALLEAN, huangdongmei trading, LONGJUN FIRE EQUIPMENT, YUNHE Technology, FERRASUN, Wanlian, Zhejiang Xun'an Flood Control, e-sunhigh and more. These exhibitors will present their latest advancements in security, fire safety, and emergency response, fostering cross-industry collaboration and growth. Adaptable training systems and real-world scenario simulation Among them, YUNHE Technology will showcase its VR Firefighting Training Solution and Military Deployment Command Training System, emphasizing adaptable training systems and real-world scenario simulation. These solutions are designed for emergency management, public safety education, professional training for firefighting and security units, and industrial safety training. YUNHE Technology highlights the industry’s shift from ‘passive protection’ to ‘operational empowerment’, where security converges with human behavior data, smart feedback, and education. Range of high-efficiency solutions The platform aims to facilitate digital transformation for enterprises, allowing them to operations TLX is a fire safety pioneer in integrated solution design and manufacturing. At the fair, the company will showcase its Supervised Latching Solenoid Actuators, along with a range of high-efficiency solutions tailored for complex fire suppression needs. Meanwhile, Tyco, a security pioneer, will introduce its one-stop security management platform, enabling seamless compatibility with third-party systems for fire control, building automation, human resources, and more. The platform aims to facilitate digital transformation for enterprises, allowing them to streamline their operations. Digital frameworks connecting security innovations Beyond the showcase, the Intersec Shanghai Digitalization Application of Security Industry Value Chain Summit will bring together government officials and industry pioneers to explore digital solutions in security, emergency response, fire safety, and occupational protection. The summit will provide a comprehensive business platform for all industry stakeholders. Key highlights include: Trend analysis: experts will analyze policy trends and technological advancements, featuring case studies on digital applications in energy mining, smart buildings, and environmental safety monitoring. Report launch: the 2025 Digital Transformation Survey for the Safety & Security Industry will be released, providing essential standards and practical guidelines for the sector. Real world applications: focused on ‘full-scenario integration’, sessions will delve into digital applications for safety supervision, operational maintenance, and early-warning systems across critical sectors. Awards ceremony: the a&s Top Digital Products & Solutions Awards will recognize outstanding innovations, serving as a trusted reference for integrators and end-users in their procurement decisions. Intersec Shanghai is organized by Messe Frankfurt (HK) Ltd and CCPIT Shanghai.
Increasingly, customers see access control and security systems as integral to their premises. As a result, they expect the same attention to detail and design principles they find in other building products, in both the commercial and the residential sectors. The industry needs better design thinking to meet these changing demands. ‘Product design’ of course has always encompassed more than aesthetics. An access solution’s performance and any potential ROI for adopters will be impacted by product design decisions made during the earliest stages of planning and development. Retrofit historic buildings Design remit includes trends in recent architecture or designing products with minimal visual impact “Product design is really a bridge between the technical demands of engineering, the creative spark of aesthetics – what people often think of when they hear the word ‘design’ – and the commercial needs of product management and sales,” says Perla Munhoz, Director & Head of Product Design at ASSA ABLOY Opening Solutions EMEIA. It is fundamentally multifaceted and future-oriented. On the aesthetic level, the design remit includes trends in contemporary architecture or designing products with minimal visual impact to retrofit historic buildings. ASSA ABLOY s design vision for the site “At the Norwegian Opera and Ballet on Oslo’s waterfront, ASSA ABLOY worked with Norwegian architects Snøhetta and Swiss manufacturer Glutz to combine an access solution with a custom-designed handle to complement the space and meet the design vision for the site,” explains Perla Munhoz. But important as they are, aesthetics is just one aspect among many: security, usability, reliability, sustainability, ease of installation, maintenance, and so on. Range of ASSA ABLOY Cam-Motion Door The range of ASSA ABLOY Cam-Motion Door Closers works aesthetically in all kinds of modern domains For example, the range of ASSA ABLOY Cam-Motion Door Closers works aesthetically in all kinds of modern environments. However, product design was also conceived from the start to provide concrete benefits to installers. Each closer’s symmetric cam design enables fitting in any of four mounting positions: to the door leaf or frame, push or pull side. A grooved spindle with 14mm height adjustment offers flexibility and compensates for minor installation imprecision. These features make fitting quicker and more accurate – saving installers’ time and customers’ money. “This kind of end-to-end thinking is fundamental to good product design,” she adds. A history of pioneering product design ASSA ABLOY has long instilled design thinking throughout its global organization. They have invested in creating devices and user experience (UX) to meet the changing demands of contemporary buildings and their designers. This investment has been rewarded with a catalog of awards for innovation and smart product design. ASSA ABLOY hardware has won Red Dot Awards on multiple occasions. In 2023, their eCLIQ key-operated digital locking system was awarded the PLUS X AWARD in four categories: innovation, quality, ease of use, and functionality – all categories where design sensibility is a key factor during product development. Door device with digital access technology Aperio H100, a revolutionary door device with digital access technology inside a battery-powered handle The Aperio H100, a revolutionary door device with digital access technology inside a battery-powered handle, was named winner at EUIPO’s DesignEuropa Awards and the German Design Council’s Iconic Award: Innovative Interior. Two years running, new ASSA ABLOY escape door devices – the effeff ePED and ABLOY Security Door Closer with integrated latch bolt and escape door strike – won major building trade awards presented at BAU, in Munich. “Innovation, utility, value, and digitalization potential are all incorporated at the early stages of our product design processes,” says Kelly Gill, Chief Technology Officer at ASSA ABLOY Opening Solutions EMEIA. Out of sight: product design ‘under the hood’ Every aspect of hardware performance is impacted by design decisions taken at the earliest stages of product development. Design in this sense has been at the heart of ASSA ABLOY’s mission during its long history innovating mechanical security. An ASSA ABLOY company originally patented the design for the Euro lock format, in 1928. It is now an industry standard design, adopted everywhere. The latest generation of ASSA ABLOY mechanical locking solutions have several patented design features for ease of use and enhanced security. Mechanical components at ASSA ABLOY Mechanical parts at ASSA ABLOY are engineered to meet or exceed all relevant national and regional version “Who knows, these, too, may one day become industry standards!” says Kelly Gill. “At ASSA ABLOY innovation does not sleep. It in the company DNA. It always has been.” In the security space, toughness and reliability have often been prioritized over aesthetics, and without doubt durability is a key measuring stick. Mechanical components at ASSA ABLOY are engineered to meet or exceed all relevant national and regional performance standards. Battery-powered digital devices “Our product designers never forget that our hardware, devices, and technologies do not usually operate in ideal ‘laboratory’ conditions,” adds Kelly Gill. “They are created and tested for the real world.” For example, battery-powered digital devices may need to work reliably outdoors, sometimes in extreme climates. Interior deployments may be in a hospital or school, where devices may not always be treated with care. Product durability and reliability are non-negotiable, whatever the environment. The growing importance of software design As business increasingly digitalizes, product design must encompass more than tangible physical items As business increasingly digitalizes, product design must encompass more than tangible physical items. The software interface is the point of contact between a security team and their chosen digital access system – and undoubtedly the part which receives the most daily interaction. It is critical that manufacturers get software right. Intelligent UX design makes software solutions more efficient and helps organizations to maximize the return from their investment in hardware. The recently launched ABLOY Cumulus API- and SDK-led access solution won International Security Journal’s 2024 Leaders in Security Awards. It was also named winner in the Innovation Initiative category, alongside similar awards from Detektor and Fire & Security Matters. Intelligent software design Intelligent software design can also help streamline workflows for those who specify access solutions. Openings Studio software, for example, simplifies collaboration and data sharing among building project stakeholders. It even helps manage openings over the full project life-cycle, from planning and estimation to installation and beyond. “Openings Studio has always been helpful in projects,” explains Gaurav Nirmalkar, Designer at pioneering Indian architects, Edifice. “Personally, I have used it in three of the data centers. It never disappoints.”
Scality, a pioneer in cyber-resilient storage for the AI era, unveiled a first-of-its-kind unified software appliance developed in collaboration with Veeam® Software, a pioneer in data resilience. The solution combines Veeam Backup & Replication™ software, part of the Veeam Data Platform, with Scality ARTESCA — cyber-resilient object storage software — in a single, streamlined software appliance. Scality ARTESCA+ Veeam Scality ARTESCA+ Veeam is a unified software appliance that provides a combined deployment of best-of-breed ARTESCA and Veeam software co-located on a single host server. The solution completely eliminates the need for separate (physical or virtual) infrastructure for Veeam, thereby reducing deployment complexity, time, and cost by up to 30%. The solution can be deployed on the customer's choice of hardware platforms, such as HPE, Supermicro, and Lenovo. ARTESCA+ Veeam unified software appliance Scality ARTESCA+ Veeam builds upon the three once told software, hardware, and virtual appliance “As the #1 global pioneer in data resilience, Veeam is thrilled to collaborate with Scality on the launch of the ARTESCA+ Veeam unified software appliance,” said Andreas Neufert, Vice President of Product Management, Alliances at Veeam. “This innovative solution simplifies the deployment of our industry-pioneering data resilience software alongside Scality's robust object storage, making it easier for organizations to enhance their cyber resilience. Scality has integrated Veeam into this new solution, combining our strengths to empower our joint customers to create secure defenses against cyber threats while optimizing their backup operations.” Scality ARTESCA+ Veeam builds upon the three previously announced software, hardware, and virtual appliance deployment offerings, making Scality the most versatile and flexible object storage backup target on the market. Key benefits of ARTESCA+ Veeam Ultra-simplified, foolproof deployment: Ensures fast and simple configuration of backup and storage for immutability and end-to-end cyber-resilience. Increased security: Veeam and Scality ARTESCA running on a single, CORE5-hardened software appliance built on zero-trust principles provides the most secure operation. Restricted credential and endpoint exposure: Access key/secret key stays within ARTESCA, and the S3 endpoint no longer needs external DNS resolution, reducing attack vectors. Embedded firewall protection: Predefined firewall secures Veeam components, enforcing zero trust and least privilege by restricting access to necessary ports. Secure Windows access: Managed through ARTESCA Identity Manager with MFA, ensuring only authorized users can log in. Non-disruptive integrity checks: Self-sufficient by design, the appliance runs SureBackup Lite and backup content scans independently — without impacting the production system. Predictable performance: Running Veeam and Scality ARTESCA on dedicated hardware provides consistent, predictable performance with greater resource availability than hypervisor-based deployments. Cost efficiency: The fully integrated ARTESCA+ Veeam software appliance streamlines operations and reduces acquisition, support, and operating costs by eliminating the need for separate server and storage infrastructure. Operational simplicity: A single, integrated dashboard within ARTESCA monitors both ARTESCA and Veeam components. Channel-friendly design: Simple sizing and ordering make sales and deployment effortless for resellers and customers. ARTESCA’s security and simplicity Erwan Girard, chief product officer at Scality: "The unified software appliance marks a major milestone in our partnership with Veeam." "By combining ARTESCA’s security and simplicity with Veeam’s industry-pioneering data resilience solutions we’re enabling organizations to build unbreakable defenses against cyber threats while optimizing backup operations — without compromising performance." Scality ARTESCA+ Veeam unified software appliance sizing ARTESCA’s simplicity and low-entry pricing have recast Scality’s go-to-market plan within small business The Scality ARTESCA+ Veeam unified software appliance will initially be available as a single node, configurable to meet a range of VM and capacity requirements, from 20 VMs/TBs to hundreds of VMs/TBs. Designed for the channel, ARTESCA’s simplicity and low-entry pricing have transformed Scality’s go-to-market strategy within small and medium-sized businesses. Driven by a robust ecosystem of VARs, Cloud and Service Providers and strategic distributors, 60% of Scality’s record-breaking 2024 revenue came through the channel. Scality also recently launched its pay-as-you-go combined pricing model for Scality Cloud and Service Providers, unlocking a lucrative new subscription model and revenue stream for Veeam VCSP partners. Availability Customers will be able to purchase the offering from their channel partners. Scality will provide channel partners with documentation and tooling to install the software appliance on one of a number of pre-validated hardware configurations.
Nanodems, a pioneering provider of Physical Security Information Management (PSIM) software, proudly presented its latest innovations at the ISC West 2025, drawing strong interest from security professionals, integrators, and enterprise customers. At this year’s event, Nanodems showcased two game-changing features of its critical event management platform: AI-Powered Health Check and security-focused digital twins, both designed to revolutionize the way organizations monitor and manage complex security environments. IT and security teams Health Check offers real-time insights into the operational status of all connected security devices Health Check offers real-time insights into the operational status of all connected security devices, including cameras, DVRs, access control units, and sensors. The intuitive dashboard provides instant visibility into device performance, offline status, and fault history, allowing IT and security teams to proactively resolve issues before they escalate. The newly introduced security-focused digital twin feature is a tool powered by 3D maps within the NDIS platform, offering users a completely visualized way to monitor their environments. Operators can navigate through floors, zoom into specific zones, and instantly view device statuses or trigger events. This spatial awareness enhances response times and supports faster decision-making during critical incidents. Integrated physical security management “Visitors were especially impressed with how easily they could identify issues with thousands of devices using our Health Check module, and how naturally they could navigate complex infrastructure with our 3D interface,” said Asli Citak, Marketing Manager at Nanodems. “These features align with our mission to make PSIM not just powerful, but also user-friendly and highly visual.” Nanodems continues to set the standard in integrated physical security management, enabling organizations in critical infrastructure, banking, transportation, and public safety to centralize operations, reduce complexity, and increase situational awareness.
With the recent update of its Document Reader SDK, Regula became the first identity verification (IDV) vendor to make it possible to verify all the dynamic security features of documents in real time. With the latest addition of Dynaprint® checks, the solution ensures more robust physical document authentication during remote onboarding. The innovation has arrived at a time when 58% of businesses globally face fake or modified IDs during digital onboarding. Dynamic security features Dynaprint® is a dynamic security feature consisting of two other images printed with lenticular technology Dynaprint® is a dynamic security feature consisting of two different images printed with lenticular technology. Depending on the angle of observation, only one image is visible at a time. Like all other dynamic security features, Dynaprint is crucial for securing identity documents from tampering, since it’s a tricky task to fake it without special equipment. Previously, it was feasible to verify Dynaprint only on-site with the help of special equipment. However, Regula has made it possible to check it online via a smartphone to ensure you are dealing with a live physical ID. Regula Document Reader SDK At the moment, Regula Document Reader SDK is the only IDV solution on the market that supports major dynamic security features, including Dynaprint®, for document liveness verification. At the moment, no other vendor features this level of protection for remote document checks. This enhancement complements existing checks for other visible dynamic security features, such as holograms, optically variable inks (OVI), and multiple laser images (MLI). By prioritizing document liveness checks in its solution, Regula helps businesses and government institutions combat a wide range of presentation attacks, such as screen replays, injections, and printouts, and effectively detect manipulated IDs. Addition of Dynaprint® Regula Document Reader SDK also includes support for 432 new identity documents “With every update, our goal is to raise the bar for what reliable identity verification looks like. The addition of Dynaprint® checks in our Regula Document Reader SDK is more than a technical upgrade—it’s a significant enhancement in verifying the physical presence of an ID." "When dynamic features like this are validated in real time, it becomes nearly impossible for fraudsters to succeed with deepfakes or static document copies,” says Ihar Kliashchou, Chief Technology Officer at Regula. What else is new? Alongside improved liveness verification, this update to Regula Document Reader SDK also included support for 432 new identity documents, bringing the total number to more than 15,000 documents from 251 countries and territories. Among them, for example, are the newest Japanese passport introduced in late March 2025, and the new Philippine National ID. Unique verification challenge Regula Document Reader SDK offers a more robust and full key for checking the ID’s authenticity The latter brings a unique verification challenge: unlike other IDs, the Philippine National ID does not contain a handwritten signature, relying instead on an encrypted QR code with a digital signature to prove document integrity. While the QR code can be verified via the governmental portal, Regula Document Reader SDK offers a more robust and comprehensive solution for checking the ID’s authenticity. It ensures that the encoded information hasn’t been altered in any way, and that the digital signature is valid. How Regula’s Dynaprint® verification can elevate verification Additionally, Regula’s solution performs multiple in-depth checks, cross-validating data from various document zones, and reading both visible and encrypted data. Explore how Regula’s Dynaprint® verification can elevate the identity verification workflows on Regula’s website.
The Physical Security Interoperability Alliance (PSIA) hosted a well-attended cocktail reception and live demonstration during ISC West 2025 to unveil its latest advancement: the PKOC 3.0 specification, an exciting solution for secure, open credentialing in physical access control systems. Jason Ouellette, Chairman of the PSIA and Corporate VP of Innovation and Technical Partnerships at ELATEC, led the presentation. He shared an overview of PKOC’s progress, key developments in the 3.0 release, and demonstrated a range of interoperable devices—including readers, cards, and mobile applications, built on the freely available, non-proprietary PKOC specification. Broad industry collaboration This year’s demonstration highlighted broad industry collaboration, with support and technologies provided by PSIA member companies including: ELATEC, EMSI, INID Readers USA, Johnson Controls, Kastle Systems, Last Lock, rf IDEAS, Sentry Enterprises, Taglio, and Universal Smart Card. There is a growing list of manufacturers actively supporting the PKOC specification, but these 10 companies showcased products at the event, highlighting its interoperability and real-world applications. Deloitte’s own proof-of-concept The project features PKOC certificates working seamlessly across readers, physical cards, and mobile devices At the reception, Jeff Longo, Director of Software Development at Kastle Systems, announced that the company will officially make the PKOC card its standard card offering—further solidifying its commitment to open, secure, and interoperable access control solutions. Keith Kelly, Chief Security Officer at Deloitte Canada, shared insights from Deloitte’s own proof-of-concept implementation of PKOC at its Toronto office. The project features PKOC credentials functioning seamlessly across readers, physical cards, and mobile devices. Kelly emphasized that PKOC represents “a new generation of access control,” aligned with Deloitte’s priorities around open, flexible, and secure credentialing. Simplicity, security, and scalability David Bunzel, Executive Director of the PSIA, noted, “PKOC is widely recognized as one of the most exciting solutions for secure credentials. Because it is based on an open specification, it is cost-effective—but just as important, it is secure and highly flexible.” Unlike many legacy credential technologies, PKOC is completely open source, with no fees, royalties, or membership requirements. Its simplicity, security, and scalability are fueling growing interest across integrators, manufacturers, and enterprise users.


Expert commentary
For businesses today, loss prevention is no longer just about safeguarding inventory from theft. While retail theft makes frequent headlines in the United States, and is indeed the leading cause of shrinkage, The National Retail Foundation (NRF) has reported that process failures, operational inefficiencies and employee theft also drive significant losses. Legacy security systems In 2022, the shrink loss is estimated to be $120billion in the United States, and that’s for retail alone. Industries like hospitality, healthcare, manufacturing, and transportation all face similar challenges even though loss and inefficiency take different forms in each of these fields. As shrinks from theft and operational inefficiency have already put margins of companies under pressure, we are increasingly seeing more businesses demand AI-powered security systems with advanced video analytics, capable of addressing both security and operational inefficiencies that their legacy security systems could not. Understanding the full scope of loss Package theft is a common problem in commercial buildings, with which box detection in mailrooms Starbucks’ recent announcement of reinventing its franchise operation due to faltering sales is a great example of how operational efficiency can take a toll on business revenue. In restaurants or hotels, failing to anticipate customer flow can lead to long wait times or inefficient use of staff, frustrating guests. Take, for example, in hospitals, inefficient patient flow management can lead to overcrowded waiting areas and delays in care, compromising patient health. Similarly, in manufacturing, poorly optimized assembly lines create production bottlenecks, delaying output and raising overhead. Package theft is another common problem in commercial buildings, with which package detection in mailrooms can mitigate loss from deliveries. These invisible leaks creepingly drain profits across industries, and require future-proof solutions that not only confirm what’s already known but also provide actionable insights for improvement. Transforming security into a powerhouse for efficiency Progress continues to advance across these areas, fueling optimism for what lies ahead. Thanks to the rise of artificial intelligence and data analytics, some security solutions are already integrated with facial recognition and license plate detection capabilities, as well as Virtual Fences that help ensure that only authorized personnel or vehicles enter sensitive areas. This can be especially useful for manufacturing environments, where controlling access to high-risk zones and protecting valuable assets are critical. Some modern security systems can even offer more than a watchful eye, doubling as a data analytic tool beyond traditional surveillance limits. Heat mapping in security AI technology Heat mapping in security AI technology analyzes ways of movement and behavior in a retail environment Modern security systems are now capable of tracking foot traffic, analyzing customer behavior, and even identifying bottlenecks in real time by incorporating different technologies such as heatmapping, people counting and queue length monitoring for long lineups. Heat mapping in security AI technology analyzes patterns of movement and behavior in a retail environment by visually representing areas with high foot traffic. With tracking over time and identifying potential vulnerable and hot spots for potential theft and fraud, resulting in change of store layout, deploy additional resources in high traffic areas and physical security placement. Predictive security analytics AI people counting in security utilizes sensors and cameras to accurately track the number of individuals entering and exiting a space in real time. This data helps businesses optimize staffing levels, enhance customer experience, and improve overall operational efficiency by aligning resources with foot traffic trends. Predictive security analytics, such as heat mapping and people counting, are not new inventions. But I believe the ability to integrate all these functionality into a single system will allow these technologies to further mature and expand their footprint in near future. Rather than relying on separate tools for each business function, businesses can now use a single, integrated system to gather actionable data while continuing to secure protection through video surveillance. You Can’t Manage What You Can’t Measure AI-powered security systems give businesses access to a wealth of data that they can use AI-powered security systems give businesses access to a wealth of data that they can use to precisely pinpoint where losses are happening. This is key to solving the problem of shrinkage, which often goes beyond simple theft. Consider the Starbucks case mentioned earlier, while Starbucks hasn't specified how it plans to achieve operational efficiency to “enhance the cafe experience”, an AI-powered security system could provide an all-encompassing solution to minimize bottlenecks during peak hours, optimize store layouts, and allocate staff more efficiently. The impact of this technology can be tremendous as it not only enhances the customer experience but also reduces inefficiencies that contribute to lost revenue. By analyzing patterns, conducting Forensic Review with Smart Search to quickly locate incidents, and understanding the root causes of loss, companies can implement targeted solutions that reduce shrinkage and streamline operations. Future-proof solutions Walmart is using foot traffic analytics to predict demand and manage inventory Companies like Walmart are already using foot traffic analytics to predict demand and manage inventory. But beyond basic predictive inventory analysis and crowd control, the data gathered will have the potential to be combined with other business functions, smart energy management, pricing and marketing strategy, just to name a few. Investing in a security system that integrates AI video analytics, such as package detection, queue length monitoring, and Virtual Fences, can provide future-proof solutions that also enhance operational efficiency. Looking ahead With New York State's introduction of new Retail Security measures to encourage businesses to strengthen their security, we've seen increased interest. However, modern security systems with real-time analytics are now offering companies more than just protection—they’re providing valuable insights into operations, transforming security from a cost burden into a powerful tool for growth and efficiency. As businesses continue to adopt AI-powered security systems, it's clear that the role of security is evolving beyond traditional surveillance. These advanced systems are no longer just about protection, but help businesses grapple with increasingly complex challenges. By transforming security from a reactive expense into a proactive, data-driven asset, companies can stay ahead of the curve, managing not only what they can see, but also what they’ve been missing.
Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility, lower up-front costs, and operational efficiency. Cloud-based software as a service (SaaS) solutions, AI-enhanced tools, and IoT-enabled sensors and devices are increasingly in demand. The traditional role of the systems integrator is evolving as a result. While security integrators have always worked closely with end users, today’s pioneers go beyond installation and maintenance. They align security strategies with evolving business needs, integrating IT, cybersecurity, and data-driven insights into their offerings. A look at the past and present Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity Traditionally, systems integrators specialized in installing and maintaining wired physical security systems like CCTV, access control, and alarms. The service model was built around large, up-front investments and project-based installations. However, today customers are seeking comprehensive solutions. They’re looking to wirelessly integrate security infrastructure with cloud-based SaaS systems and IoT devices. While modern systems are often faster to deploy, they’re most effective when supported by ongoing consulting and strategic planning. Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity. Data requirements and modern systems Data requirements have also changed. Modern systems collect vast amounts of data. Advanced analytics, machine learning, and automation are now must-have tools for actionable insights. Security integrators can help end users set up custom dashboards, automations, and continuous system optimization. Let’s look at some of the specific ways the role of systems integrators is evolving and how to adapt and succeed. Strengthen your IT expertise Integrators with IT expertise can ensure that hardware is optimized and maintained for peak performance The competitive landscape today includes not just security specialists but also IT-focused integrators and SaaS providers. Systems integrators with expertise in traditional physical security solutions plus IT experience offer unique value. They understand the real-world security challenges and opportunities, along with cybersecurity and network best practices. Integrators with IT expertise can also ensure that hardware is optimized and maintained for peak performance. Their experience with legacy systems allows them to offer practical recommendations on cost-effective approaches, such as upgrading or integrating older hardware with new digital solutions. Consider who’s making the purchase decisions Traditionally, security integrators primarily sold to security directors, facility managers, and operations teams. Now, multiple stakeholders may be involved in decision-making. IT teams, CIOs, and CTOs often weigh in on purchase decisions when cloud-based security and SaaS solutions are under consideration. Customers today aren’t just shopping for cameras, access control panels, alarms, and other hardware components. They’re looking for security ecosystems that can integrate with enterprise-wide IT infrastructure and business applications. When working with these different teams, consider outlining the system's return on investment (ROI). How can the solution reduce risk for various departments? Can it help improve operational efficiency or reduce the time required to onboard and train staff? Will it make regulatory compliance easier to manage? Focus on the long-term value for the entire organization. Take a consultative approach Another way systems integrators are adding value is by offering vertical specialization Installation fees remain important for many integrators, but there may be additional consultative opportunities to build long-term relationships with customers. Offer services such as roadmap planning, hardware and integration maintenance, training to certify end users on the manufacturer’s product, and cybersecurity services. While cloud-based solutions reduce on-premises maintenance, they don’t eliminate the need for ongoing support and training. Consider offering training opportunities. These can lead to other benefits as well. Better-educated and technically proficient customers are usually more willing to adopt new technologies. They understand the value of these investments and have more confidence that they’ll see results. Another way systems integrators are adding value is by offering vertical specialization. Healthcare, sports venues, critical infrastructure, education, retail - each specialty has its own set of challenges, partner networks, regulatory restrictions, training needs, and business requirements. Integrators who specialize are uniquely positioned to offer key sector-specific insights that are invaluable to their clients. Embrace the cloud A key growth area for integrators is supporting customers in their shift to cloud deployments. Cloud solutions aren’t a one-size-fits-all solution. Each organization is evaluating options and deciding whether cloud, hybrid, or fully on-prem solutions are the right fit for its unique needs. A key growth area for integrators is helping clients in their shift to cloud deployments Helping customers navigate and adopt cloud or hybrid solutions opens new opportunities to expand your business and deepen your relationship with your customers. Systems integrators who sell cloud solutions have the opportunity to add new layers to services for more value for customers. With a cloud solution that's easy and fast to deploy and managed and maintained by the provider, you can reduce overhead costs, staff training, and truck rolls via remote customer support. These benefits also allow you to spend time developing greater expertise in your customers’ processes. Using this knowledge, you can tailor your services towards potential productivity gains for your customers and turn them into additional sales. You ensure that your customers get the most out of the technology that’s available and that they have already purchased. Highlight your focus on cybersecurity Cybersecurity is no longer solely an IT department's responsibility. While dedicated IT security teams may still handle broader network defense, integrators play a crucial role in securing access control, surveillance, and IoT devices within a security framework. If unsecured, these devices can provide an entry point for cyber criminals to gain access to an organization’s network. Cybersecurity is no longer solely an IT department's responsibility To best protect end users from cyberattacks, choose physical security systems with built-in security and privacy-by-design features. Help customers implement best practices to ensure their entire ecosystem is designed, built, and managed with end-to-end security in mind. Once implemented, work with your manufacturers, consultants, and end users to ensure that vulnerabilities are identified and mitigated. Every person on the network plays a role in keeping cyber threats at bay. Lean into the power of partnerships In today’s complex and dynamic security landscape, choosing the right technology partners is crucial. Ask potential partners to share their technology roadmap, and how you can offer feedback or participate in discussions about industry trends. Ideally, your partners will have a program in place to get input from integrators and end users, so they can develop products that are designed to address their most pressing issues and concerns. Your manufacturer partners should be working to help identify the evolving needs of customers and communicate these insights to systems integrators. Seek partners who actively support integrators to understand how security is evolving In addition to a good experience for the end user, strong manufacturer partners also offer solutions to streamline and automate workflows for integrators. It should be easy to order and check your shipping statuses online, for example. These are simple things that save you time and demonstrate your partner’s care for your business. Seek partners who actively support integrators to understand how security is evolving. While training is often offered on-site, some companies are now also offering blended learning models so integrators and their technicians can reduce classroom time and stay out in the field. Evolution is an opportunity Security integrators with traditional physical security expertise remain indispensable because they understand real-world risks and regulatory requirements. They can provide hands-on system deployment and optimization. Now, there are new opportunities to build long term customer relationships. As the physical security industry undergoes this profound shift, adaptation is key. By embracing cloud and hybrid solutions, integrators can unlock new revenue streams, enhance customer relationships, and stay ahead of technological advancements. With the right partnerships and a forward-thinking mindset, systems integrators can navigate this transformation and take advantage of new opportunities being presented by evolving technology. Leverage your deep industry experience while upskilling in cloud, cybersecurity, and IT. The strongest approach is for end users, systems integrators, IT specialists, and manufacturers to work together to navigate industry changes.
Access control solutions will continue their evolution in 2025 as organizations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organizations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorized individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organizations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organizations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Security beat
For all the emphasis on cloud systems and centralized servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyze vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organization founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyze the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualize it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerization Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerization is a form of operating system-level virtualization that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerization, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerization” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCenter cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerize Genetec’s SecurityCenter cloud platform, but containerization now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerization enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralized software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratizing AI You hear the term democratizing AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratize AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralized repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximize business operations.
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.
Case studies
Amthal Group Companies has supported Tradestars’ new Hackney Wick site with a comprehensive, ground-up technology stack, incorporating integrated smart security and fire safety for the benefit of the thriving entrepreneurial community. Tradestars offers flexible co-warehousing facilities for entrepreneurs looking for collaborative workspaces and shared resources to foster innovation and growth. Its newest location presents spaces in Hackney Wick to suit individual business needs. Integrated security solution Amthal to design a fully integrated security solution that was installed, monitored and maintained With the site spread out across multiple blocks and topped with residential accommodation, Tradestars worked directly with Amthal to design a fully integrated security solution that was installed, monitored and maintained for the benefit of the growing community. The result is a secure, technology-led site with members able to book facilities, and open doors to access offices, meeting rooms and amenities via their phone, whilst giving community managers centralized control over the building. Security and fire safety measures Says Jonathan Marriott, Construction Director at Tradestars: “Our work with Amthal has been instrumental in elevating our Hackney Wick site into a secure, cowarehousing business environment." “With their expertise, we’ve seamlessly integrated comprehensive security and fire safety measures, ensuring the safety and peace of mind of our thriving entrepreneurial community. The ability for our members to effortlessly book facilities and access various amenities via their phones, all while providing our community managers centralized control, truly enhances the Tradestars experience.” Advanced technology features of Amthal Amthal designed and installed a fully integrated, ground-up technology stack – from fiber connectivity Following a detailed risk assessment across the site facilities, in cooperation with main contractors, Amthal designed and installed a fully integrated, ground-up technology stack – from fiber connectivity, Wi-Fi, audiovisual and space management solutions, to fire, security and access control. Paul Rosenthal, Amthal Group Business Development Director added: “Being involved right from the initial design stages of the building site, enabled us to create a system to encourage connectivity, collaboration and innovation. One where members enjoy streamlined access, advanced technology features, and a safe working environment." Integrating fire safety and security systems Rosenthal added: “The focus on integrating fire safety and security systems means the growing community can focus on building their business vision, safe in the knowledge that they are powered and protected wherever they are on site, fitting today’s mobile-connected lifestyle." "This is complemented by fully managed services and support to ensure the continuous operation and maintenance of the complete ecosystem.”
Encore Atlantic Shores is a residential complex of 240 luxurious townhomes for ages 55 and over in Eastport, New York. Completed in 2011, the site boasts an 11,800 square foot clubhouse, with amenities such as a fitness center, heated indoor pool, whirlpool spa, multi-purpose ballroom, cardroom, and clubroom with billiards, tennis courts, and an outdoor putting green. The complex required an update to their legacy security system, so they reached out to CWC Security to specify a new and modern solution for their site. Paxton’s Net2 access control system Paxton’s Net2 access control system due to its flexibility to integrate with multiple other systems CWC Security, based in Melville, New York, specializes in designing, installing, and monitoring state-of-the-art security systems that offer comprehensive protection for residential and commercial spaces. They chose Paxton’s Net2 access control system due to its flexibility to integrate with multiple other systems that were already on Encore’s network. Paxton, the security technology manufacturer, designs and develops access control systems, video intercom products, IP cameras, and wireless door handles that are installed and used globally. Requirement Encore Atlantic Shores needed to update all internal and external entry and exit points on the premises, including their access-controlled gates to allow flexible access permissions. Additionally, multiple areas of the site were on different internet networks, which needed to be managed from one central location. There is a clubhouse that also required permission-based access for summer residents who are not members of the clubhouse but need access to the pool. The property manager utilizes Net2 software to provide temporary access rights during these times for different members. The site’s pool management personnel also require separate access to the basement for equipment storage. Solution Net2 is Paxton’s networked access control system that can be administered using one or more PCs Michael Pittakas, owner of CWC Security, presented Encore Atlantic Shores with Net2 as a solution. Net2 is Paxton’s networked access control system that can be administered using one or more PCs and can be monitored and managed from a central location. The software is designed to easily integrate with other security systems. This made it straightforward to run alongside the sites existing systems and further streamline security for their staff and residents alike. Net2 now secures all primary entry points to the complex, with keyfobs provided to residents to access the front gate. For deliveries and garbage collection, the rear gate is also controlled via the Net2 software. This enables Erin Stewart, the Property Manager, to open the gate for these vehicles when needed. Video intercom system Michael said: “The front and rear gates are relay controlled, so we utilized triggers and actions within Net2 to provide access.” “We also integrated Net2 with the existing video intercom system at the front gate so that non-residents call the security booth before they can enter the premises. This is then recorded as an event in the Net2 software.” Result Erin at Encore Atlantic Shores has been very pleased with the Net2 system and CWC’s service Since the installation took place, Erin at Encore Atlantic Shores has been very pleased with the Net2 system and CWC’s assistance and support. Michael explained: “I showed Erin how to create schedules, control the property via the Net2 software, and setup the correct access permissions.” Erin said: “We find Net2 to be the perfect fit for our needs at Encore Atlantic Shores. The software is user-friendly, reliable, and customizable. Having the ability to program keyfobs with different access levels has been a tremendous help with vendors who may need access during hours with limited staff. The reporting ability gives you a record of who and when someone uses a keyfob to enter the Clubhouse.” Setup of a Net2 system CWC, a Silver Paxton Partner, commissioned the site via the Paxton Installer app’s commissioning feature. This makes the setup of a Net2 system simpler and faster than ever before, as it saves installers from having to write down the products’ serial numbers to add them into the Net2 software afterwards.
The Torrance Unified School District is a cornerstone of the Torrance community, dedicated to providing a high-quality education that prepares students for success in college, career, and life. Serving a diverse student population, Torrance USD delivers a comprehensive and enriching educational experience from kindergarten through high school. The school district comprises 17 elementary, eight middle, and five high schools, one continuation high school, and one alternative high school. Vendor solutions Torrance USD had a mashup of different technologies and vendor solutions across its schools Like many school districts, Torrance USD had a mashup of different technologies and vendor solutions across its schools regarding the ability to broadcast announcements and alerts. Each school had separate systems for bells, clocks, and loudspeakers. There was no central management of these systems, and the school district couldn't create pre-recorded messages for emergencies. Many system components were also end-of-life, and maintaining everything was cumbersome at best. Focusing on consolidation for reliability and consistency Torrance USD began planning district-wide communication improvements in 2020, with the overarching goal of deploying one uniform system through all 32 campuses, with one dashboard to manage communications. The school district achieved its goal by deploying Cisco Call Manager coupled with Singlewire’s InformaCast communications software and hundreds of IPX endpoints from AtlasIED. Vetted integration technology partners like Cisco, Singlewire, and AtlasIED ensure that interoperability, reliability, and usability have all been verified and validated through extensive testing. Surveillance cameras for emergency alerting Torrance USD began planning district-wide communication improvements in 2020 “This project was part of a larger strategic plan to secure each campus — improve perimeter security, add surveillance cameras, allow for emergency alerting, consolidate the speaker systems, and standardize the bells,” said Gil Mara, Chief EdTech and Information Services Officer at Torrance USD. “For example, when you went from one campus to another, campuses had different bell sequences for scenarios like lockdowns. So, there was no consistency of the alerting mechanisms, and we wanted to ensure it was consistent across all the schools.” Digital and physical security of K-12 schools District staff contacted Nilkanth Radadia, Senior Account Manager at NIC Partners, to design the desired district-wide communications solution. NIC Partners has over two decades of experience enhancing the digital and physical security of K-12 schools and was well-suited to take on a project of Torrance USD’s scale. Focusing on what’s most important “Many stakeholders were involved in this project,” said Radadia. ”Given the project’s scope and requirements, there were a lot of conversations beforehand to get the district comfortable with understanding how the system would work." "Some key elements were customizability, two-way talk, multicolor visual message capabilities, and ADA compliance for the visual and hearing impaired. When AtlasIED came out with their full LCD screen speaker, that was a game changer.” Feature set and industrial design NIC Partners installed nearly 1700 IP-SDMF speakers throughout the schools to ensure messages AtlasIED was chosen as the vendor for the system upgrades after a thorough evaluation of various vendors. Their feature set and industrial design, particularly the full LCD screen speaker, stood out. NIC Partners installed nearly 1700 IP-SDMF speakers throughout the schools to ensure messages were audible, visible, and intelligible. WAN or LAN network architecture Leveraging standard WAN or LAN network architecture, each speaker is equipped with an integrated talkback microphone, LCD, and LED flasher, supporting both visual text and audio broadcast to enhance physical security while improving day-to-day communications through advanced alerting, bell schedules, and pre-recorded and scheduled announcements. For example, at 8:30 each morning, the Pledge of Allegiance is broadcast to all schools with a patriotic color palette appearing on the IPX endpoints. LED blinker “We needed to implement a solution that would serve the needs of all the students, including those with visual or audio impairments,” said Mara. “That's why having the LED blinker and the message crawler was essential. That solved the issues regarding accessibility for our students and staff to ensure they got the message(s) every time.” Network-wide communication For campus exteriors, NIC Partners chose the IP-HVP speaker from AtlasIED For campus exteriors, NIC Partners chose the IP-HVP speaker from AtlasIED. The IP-HVP is a vandal-proof, IP45 weather-resistant, wall-mount IP speaker well-suited for environments where network-wide communication is desired, and high output is required to overcome excessive ambient noise or large spaces. Almost 600 IP-HVP speakers were installed district-wide. Additionally, the Power over Ethernet (PoE+)-enabled IPX endpoints connect through the same IT network the school uses to deliver Internet access. InformaCast mass communications software The platform simplifies the installation process for integrators and reduces the need to introduce multiple cable types to a project. The IPX platform also offers scalability benefits, allowing schools the flexibility to expand their systems as the district’s communications evolve. The IPX Series also helped Torrance USD incorporate new and expanded campus safety capabilities with the help of InformaCast mass communications software. IPX LCD screens Torrance USD is trying out various color combinations on the IPX LCD screens to indicate alerts Using InformaCast, designated school personnel can initiate an alert from a mobile device wherever they are. The software then sends text messages to faculty, students, and parents' mobile devices, alerts law enforcement, and activates attention-grabbing audio alarms and LCD text messages on the installed IPX devices throughout the school or district. Currently, Torrance USD is trying out various color combinations on the IPX LCD screens to indicate different kinds of alerts, including earthquakes, shelter-in-place, and all-clear messages. Intentional and Phased Deployment Leads To Consistent Use NIC Partners started with the smallest school to establish best practices for implementation. Once the first school was completed and future implementation methods documented, NIC Partners went full-on with the remaining schools, working second shift during the school year and completing all the upgrades district-wide in less than five months. The communication system is in the final phase of upgrading all the schools to InformaCast Fusion servers and upgrading Cisco Call Manager to Webex calling. These updates will allow select school and district staff members to make emergency announcements or push out notifications directly from their cell phones. NIC Partners and AtlasIED Staff and students appreciate the audio upgrades, albeit for different reasons. Teachers are relieved by the improved audio clarity, as they can finally hear things “loud and clear,” and emergency alerts include visual messaging. Students love the music played at the end of each period to indicate a class transition. “Before the upgrades, you couldn't make a good page,” said Mara. “Now, the audio clarity is way better. We’re delighted with the IPX products and even happier to have NIC Partners and AtlasIED as our partners for such a huge undertaking. We wouldn't have been successful without their help.”
Genetec Inc., the pioneer in enterprise physical security software, announced that it has been selected by the City of Brampton in Ontario to support a new public safety initiative. Genetec solutions will be used to help Brampton provide regional law enforcement agencies with critical data to expedite crime investigations and improve community safety. Genetec AutoVu™ SharpV LPR Brampton’s project will see the deployment of 200 Genetec AutoVu™ SharpV LPR cameras As the first project of its kind in Canada, Brampton’s project will see the deployment of 200 Genetec AutoVu™ SharpV License Plate Recognition (LPR) cameras at major intersections. These cameras will not be used for issuing speeding tickets; instead, they will function exclusively as an investigative tool to support Peel Regional Police in solving crimes and monitoring vehicle-related incidents. 360-Degree street cameras By capturing key vehicle details—such as license plate numbers, make, color, and type—they will assist law enforcement in investigating offenses and enhancing public safety. Data from AutoVu SharpV and 360-degree street cameras from Axis Communications will be managed through Genetec™ Security Center. The platform will enable investigators to correlate vehicle information with corresponding video footage to enhance situational awareness and enable faster incident response. Clearance digital evidence management system System will operate in full compliance with municipal, provincial, and federal privacy laws In the event of a reported incident, the City of Brampton will be able to quickly and securely share video evidence and ALPR data with law enforcement using the Genetec Clearance digital evidence management system. This will help expedite investigations by ensuring critical evidence is readily accessible when needed. Security and data privacy remain paramount with this initiative, and the system will operate in full compliance with municipal, provincial, and federal privacy laws. New innovations and technologies All captured information will be securely managed and used solely for law enforcement investigations. Only authorized personnel will have access to the data, with all user activities and case-related actions being logged to maintain the integrity of the chain of custody. “Peel Regional Police is committed to utilizing new innovations and technologies to better support the critical work of our officers and enhance public safety," said Deputy Chief Anthony Odoardi, Peel Regional Police. All captured data will be securely managed and used solely for law enforcement studies Odoardi added: "This welcomed investment by the City of Brampton will provide our service with increased access to data, improving our ability to investigate and respond to traffic-related crimes and safety concerns. By working together, we will continue to strengthen our efforts in keeping our communities safe.” “Too many victims and families have suffered heartbreak at the hands of criminals and enough is enough. Residents made it clear through the 2025 budget process that they want to see action from the City to address community safety, and we are delivering," said Patrick Brown, Mayor, City of Brampton. Expansion of investigative tools Brown added: "By investing in cutting-edge technology, we are giving law enforcement the tools they need to track down offenders and hold them accountable." "This is a major expansion of police investigative tools making Brampton the worst place in Canada to commit a crime. It is a game changer in protecting our community and sends a message to criminals that if you commit a crime in Brampton, you will be caught.” Video surveillance and digital management solutions “The City of Brampton is demonstrating exceptional leadership in using technology to enhance public safety in a responsible and effective way,” said Alain Bissada, Area Vice President - North America at Genetec Inc. “The deployment of our license plate recognition cameras, alongside our video surveillance and digital evidence management solutions, will provide law enforcement with high-quality, real-time data to support their investigations while ensuring that privacy remains a top priority.”
Newbury Manor School, a specialist institution managed by Aspris Children’s Services, has recently undertaken a major security upgrade to enhance the safety of its students. Located in Somerset, the school provides education and care for young people aged 6-19 with additional needs. Ensuring student safety is paramount, and the school sought a fencing solution that would offer both security and durability while maintaining a welcoming environment. Modern safeguarding standards The school’s outdated fencing and gates no longer met modern safeguarding standards Understanding the need for a long-term, high-quality security system, Newbury Manor School partnered with Jacksons Fencing, a pioneering provider of security fencing solutions. The school’s outdated fencing and gates no longer met modern safeguarding standards, prompting the decision to invest in Jacksons Fencing’s EuroGuard® Extra V Mesh security fencing system. A secure and durable solution To ensure the safety of students, the decision was made to replace the outdated fencing with a more secure and durable solution. After thorough consideration, EuroGuard® Extra was chosen for its strength, resilience, and anti-climb design, making it the ideal choice for a school setting. Installed by 1st Aid 4 Fencing, a Jacksons Approved Installer, the system consists of 5mm thick wire mesh panels with a 200 x 30mm mesh pattern, providing significantly enhanced security compared to standard V mesh fencing. The tamper-proof fixings and rigid mesh construction ensure durability and resistance to impact, making it particularly suited for schools where students may come into contact with the fencing. EuroGuard Extra system EuroGuard Extra system is rigid and secure, making it perfect for schools EuroGuard® Extra is more resilient than traditional V mesh fences, which often feature a thinner 4mm wire thickness and larger 200 x 50mm apertures. What’s more, the wire in Jacksons mesh fencing is always measured before coating, for an accurate representation of strength. With its tamper-proof fixings and smaller mesh apertures, the EuroGuard Extra system is rigid and secure, making it perfect for schools where children may lean on or interact with the fence. It also features an anti-climb design, making it an ideal solution for schools where protection against truancy and trespassing are needed on both sides of the boundary. Open mesh design Beyond its security benefits, the open mesh design allows for unobstructed visibility, enabling staff to supervise students effectively while maintaining a sense of openness. The increased visibility offered by the EuroGuard Extra fencing also enables staff and teachers to supervise the students more effectively while maintaining a sense of openness on the school grounds. Unlike solid barriers that can feel closed off, the V mesh design provides clear views of the outside environment, helping reduce anxiety and creating a more welcoming atmosphere. Enhanced security with modern aesthetics EuroGuard Extra is designed to withstand the elements, resisting rust and corrosion To further reinforce perimeter security, a double-leaf green V mesh gate was installed to replace the previous wooden gate, which had fallen into disrepair. This upgrade not only enhances security but also integrates seamlessly with the school’s overall aesthetic. Manufactured from galvanized steel and finished with a green polyester powder coating, EuroGuard Extra is designed to withstand the elements, resisting rust and corrosion. Backed by Jacksons Fencing’s 25 year guarantee, the system offers a long-term, low-maintenance security solution, providing peace of mind for the school. High quality fencing solution Commenting on this successful project, Peter Jackson, Managing Director at Jacksons Fencing, expressed, “At Jacksons Fencing, we understand that schools like Newbury Manor require security solutions that go beyond just perimeter protection-they need durability, visibility, and an environment that feels open yet secure." "EuroGuard Extra delivers on all these fronts, ensuring both safety and peace of mind. We’re proud to have contributed to this important project, reinforcing the school’s commitment to student welfare with a long-lasting, high quality fencing solution.”
Genetec Inc., the global pioneer in enterprise physical security software, announced The City of Edinburgh Council is using Genetec™ Security Center as the backbone of its Smart City Strategy. The software is transforming public safety, city services and urban planning by allowing the council to manage all smart city technologies from a single interface. Integrate new applications and technologies The council’s Smart City Strategy focuses on introducing innovative technologies to manage aids The council’s Smart City Strategy focuses on introducing innovative technologies to manage resources more efficiently and improve public services. A key barrier to this vision was the city's outdated public space security system, which lacked the ability to integrate new applications and technologies. With funding from the European Regional Development Fund (ERDF) and in partnership with North, Edinburgh has launched a state-of-the-art Smart City Operations Center built on Genetec Security Center, a unified platform that combines video surveillance, analytics, and IoT sensors, through one platform. Open hybrid-cloud architecture “All truly connected Smart Cities start with unified security as success depends on centralizing your operations under one platform. Otherwise, every new IoT device deployed will make you data-rich but information poor,” comments Ben Durrant, Account Executive, Genetec Inc. "Our platform differs from conventional alternatives because of its open hybrid-cloud architecture that offers the flexibility and functionality needed to evolve and keep pace with new requirements.” Capabilities beyond physical security The system not only supports day-to-day functions and the control of large-scale events With a unified platform in place, Edinburgh has been able to expand CCTV coverage in public spaces and enable secure data sharing with partners like Police Scotland, the Fire Service, and Transport for Edinburgh. The system not only supports day-to-day operations and the management of large-scale events such as the Edinburgh Fringe, the Royal Military Tattoo, and the Hogmanay celebrations, but it also extends its capabilities beyond physical security. Security Center ecosystem Andrew Foster, MD, Public Services at North comments: "The Security Center ecosystem allows us to gather and visualize useful data sets from advanced analytics IoT sensors on how the city is actually being used by residents and visitors." "This enables the council to make more informed decision making on how Edinburgh can become even safer, greener and better maintained." Improved quality of footage The council credits the software with saving hundreds of man hours that were yet spent manually The council credits the software with saving hundreds of man hours that were previously spent manually trawling through surveillance footage. As well as with helping it to more than double the number of viewing requests from Police Scotland that it can positively respond to. The improved quality of footage submitted as evidence is also expected to increase the number of early guilty pleas, reducing the time police officers must spend attending court to give evidence. Smart City strategy “The benefits for Edinburgh residents are massive. Enhanced public safety, improved services, optimized traffic flow, better infrastructure and city planning,” concludes Gavin Brown, Head of Network Management & Enforcement, Edinburgh City Council. “Genetec and North have proved instrumental in helping deliver our Smart City strategy.”


Round table discussion
The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?
In the physical security marketplace, artificial intelligence (AI) has evolved beyond the novelty phase. The emphasis has now shifted to the more practical aspects of implementing AI technology. That a system implements AI is no longer impressive in and of itself. The question becomes: What can this AI system do for me? How can it improve my physical security stance? We asked our Expert Panel Roundtable: How is artificial intelligence (AI) transforming physical security?
In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximize both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?
Products


White papers

Using Artificial Intelligence (AI) To Automate Physical Security Systems
Download
Integrating IT & Physical Security Teams
Download
Verkada Workplace Safety Survey
Download
How To Create A Successful Physical Security Roadmap
Download
5 Easy Steps To An Upgraded Video Surveillance System
Download
Improving City Mobility Using Connected Video Technology
Download
5 Ways To Strengthen Physical Security With An Integrated System
Download
The Benefits of Edge AI + Cloud For Security Systems
Download
Unified Physical Security
Download
Integrated Access Control: Reap The Benefits Of Connected Security
Download
Securing Unmanned Infrastructure at the Network Edge
Download
10 Top Insights In Access, Cloud And More
Download
12 Questions To Ask Your Access Control Provider
Download
Moving to Mobile: A Guide for Businesses Switching to Mobile Access Control
Download
School Security Moves to the Cloud
Download

Videos
Physical security: Manufacturers & Suppliers

The Key To Unlocking K12 School Safety Grants
Download
Honeywell GARD USB Threat Report 2024
Download
Physical Access Control
Download
The 2024 State Of Physical Access Trend Report
Download
The Security Challenges Of Data Centers
Download