Mobile Access Trends

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

What are the most promising new technologies in security?
What are the most promising new technologies in security?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?   

2025 Access Control Solutions: Key trends & Innovations
2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations.  Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities.  2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.

Latest Access control news

Southco E5 cam latches: Affordable and versatile
Southco E5 cam latches: Affordable and versatile

E5 cam latches offer affordable simplicity and superior flexibility due to their efficient modular design. New options for these latches include the Protected Cams and adjustable grips. These additions make the E5 line even more versatile than before. The Grip Protected Cam is an upgrade from existing flat cams, and perfect for those seeking to avoid wear and cosmetic damage that comes from a flat cam scraping against an enclosure frame. Southco's next addition Southco’s next addition provides additional flexibility for its Wing Knob, T-Handle, and L-Handle cam latches The Protected Cam adds a plastic cover to the end of a cam, providing protection from frame damage and smoother actuation. Fixed Grip Protected Cams are compatible with all E5 and H3 latches. Southco’s next addition provides additional flexibility for its Wing Knob, T-Handle, and L-Handle cam latches. The Adjustable Grip option lets those using E5-9 hand-operated cam latches manually adjust the cam location on each latch. This allows users to freely change the grip strength of the latch, and adjust for variations in frame dimensions. Variability also allows manufacturers to use one latch for multiple frame designs. Southco E5 Cam Latches These additions open up new possibilities for Southco E5 Cam Latches. Whether they need a durable protected lock for an outdoor latch, or a more compact device for smaller designs, the E5 has they covered.  The additions build on the affordable simplicity that the E5 is known for. E5 latches can be easily installed in a single hole, and provide a no-hassle solution for a wide range of applications.

Cequence AI Gateway: Transforming enterprise security
Cequence AI Gateway: Transforming enterprise security

Cequence Security, a pioneer in application security, unveiled the Cequence AI Gateway, a powerful new solution enabling enterprises to take full advantage of the productivity gains promised by agentic AI. Bridging the gap between AI agents and enterprise applications, the AI Gateway enables instant connectivity with the guardrails enterprises need to stay in control.         Power of artificial intelligence Enterprises, eager to embrace the power of artificial intelligence (AI), have lacked the tools needed Enterprises, eager to embrace the power of artificial intelligence (AI), have lacked the tools needed to do so safely and efficiently at scale. For CISOs and security-first engineering pioneers, the rush to expose applications to agentic AI is outpacing guardrails such as those outlined by the EU AI Act and Anthropic’s ASL. CIOs are understandably concerned about the opportunity cost incurred by having to up-skill needed developers. At the same time, they want a solution that accelerates ROI by avoiding insecure, one-off prototypes in favor of a scalable, enterprise-grade solution. Cequence AI Gateway Cequence AI Gateway is that missing layer, instantly connecting AI agents to enterprise applications and APIs using emerging standards like the Model Context Protocol (MCP) while enforcing real-time policies that prevent abuse, protect data, and ensure AI acts within bounds. “The race to adopt agentic AI in enterprises is well underway, but the foundation to support it is immature," said Ameya Talwalkar, CEO and co-founder of Cequence Security. “This has left organisations backed into a corner, connecting AI agents to critical systems without sufficient security, oversight, or context.” “With the combination of our Unified API Protection platform and the new AI Gateway, Cequence delivers both sides of the equation: open, seamless access for AI agents, and the enterprise-grade security, governance, and visibility that leaders need to trust this next wave of automation.” Cequence AI Gateway advantages Following are the advantages of Cequence AI Gateway: AI Easy Button – AI Gateway converts any API into an MCP-compatible endpoint, enabling agentic AI access to any internal, external, or SaaS application in minutes, without coding. Avoids time and costs associated with up-skilling, coding, QA, integration, hosting, and ongoing management. No need to update the solution when new protocol versions emerge, as the AI Gateway handles this for users. End-to-End Authentication and Authorisation – OAuth 2.0 IdP support ensures appropriate identity-based access to systems and data, preventing unauthorised AI agent access. Existing solutions lack seamless integration with enterprise IdPs. Monitoring and Visibility of AI Interactions – Real-time visibility into AI-API traffic with full audit logging enables detailed tracking of agent and user behaviour, what applications are being accessed, and which API calls are being made via agents. Enterprise-Ready – Unlike alternatives, Cequence is designed for the enterprise, offering a SaaS solution with continuous environment monitoring and discrete pre-prod/prod modes. Integrates with existing infrastructure without disruption. Cequence Unified API Protection The combination of AI Gateway and UAP allows Cequence customers to stop agent-fuelled attacks Today, the Cequence Unified API Protection (UAP) platform is used by a broad spectrum of the world’s largest organisations to monitor and secure their applications and APIs. The combination of AI Gateway and UAP allows Cequence customers to stop agent-fuelled attacks, fraud, and abuse such as the high-profile incidents recently publicised in the news. “Cequence doesn’t just secure applications and APIs. They enable entirely new business models,” said Amir Sarhangi, CEO and co-founder of Skyfire, creators of the KYAPay open payment and identity protocol for AI Agents. Critical infrastructure “The AI Gateway is critical infrastructure that brings agentic AI into the real world by making secure, compliant access to enterprise APIs scalable and seamless. Cequence is a trusted partner because they know how to protect real-time interactions without slowing innovation,” continued Amir Sarhangi. “It's a critical component as we build the infrastructure that gives AI agents everything they need to transact, including verified identity, real-time micropayments, and instant monetisation." AI Gateway value Early adopters have been quick to recognise AI Gateway value. “We were trying to enable a complex, customer-facing agentic application experience, a process we thought would take months,” said an early enterprise customer. “With Cequence AI Gateway, we went from ‘stalled’ to ‘operational’ in under 48 hours. Now, customers can ask natural language questions and get real-time answers, reducing costly support interactions. It solves a real business problem faster and more safely than we thought possible.” Natural evolution “This launch is a natural evolution of our Unified API Protection platform,” said Shreyans Mehta, CTO and co-founder at Cequence Security. “We’ve engineered the AI Gateway to transform any application or API into an MCP-compatible endpoint, with real-time enforcement policies baked in. It’s built to meet developers where they are, while giving security teams the control they need. It’s not just about enabling agentic AI; it’s about enabling it responsibly at scale.” Mehta added: “Building this requires deep knowledge of how APIs are structured, used, and abused at scale. That’s why Cequence is uniquely positioned to enable the next generation of intelligence automation responsibly.” Enabling agentic AI Enabling agentic AI starts at the API layer, and that’s where Cequence leads Enabling agentic AI starts at the API layer, and that’s where Cequence leads. Cequence was built to solve difficult API security challenges in real time, at scale. While others are still trying to figure out how to safely expose APIs to agentic AI, Cequence brings years of enterprise experience to a problem that demands security-first thinking. It’s designed by the same team that protects over 10 billion API interactions daily, and is built to handle the performance, governance, and authentication challenges unique to this new era of AI automation.

Tony Ball appointed new Chief Executive Officer (CEO) of Entrust Inc.
Tony Ball appointed new Chief Executive Officer (CEO) of Entrust Inc.

Entrust, a pioneer in providing identity-centric security solutions, announced the appointment of Tony Ball as its incoming Chief Executive Officer. Ball will replace Todd Wilkinson, who plans to retire on March 31, 2026, after 17 years leading the company. “I’m honoured to work with pioneers like Todd, Tony, and the entire senior leadership team,” said Bobby Mehta, Chair of the Entrust Board of Directors, adding “I’m pleased to see Tony step in to lead the organisation, and I want to thank Todd and wish him the best in his retirement.”  Entrust's committed mission  “I am grateful for the opportunity to have worked with the Entrust team and am confident that we have positioned the company for continued growth and success,” said Todd Wilkinson. He adds, “Entrust is committed to the mission of enabling customers and partners to fight fraud and cyber threats with confidence. Tony is the right pioneer to take Entrust into the future, with a deep understanding of the business and alignment with our vision.” Prior roles of Tony Ball Ball has led the growth and digital transformation of the issuance and identity businesses Tony Ball has been with Entrust for nine years and is currently President of the Payments & Identities business. He is an integral part of the Entrust senior leadership and has been a key driver of the company’s strategic growth plans.  Ball has overseen the expansion and digital transformation of the issuance and identity businesses, integrating new capabilities in digital card issuance, identity orchestration, and identity verification. His leadership of the Entrust channel program has deepened global partnerships that are critical for growth.  Entrust leadership team “I’m honoured to be taking on this role and am committed to making this a smooth transition,” said Tony Ball. He adds, “Todd and the Entrust senior leadership team have established a strong foundation with exceptional talent. The world has never needed Entrust more than right now, and we are ready to meet the moment.” Next quarter to ensure a seamless transition Todd Wilkinson joined the company in 2005 as the Chief Financial and Administrative Officer and was named CEO in 2008. During his tenure, the company grew to over $1B in annual revenues by expanding its footprint in the Digital Identity and Data Security markets.  He also unified the company’s go-to-market approach under the Entrust brand. Wilkinson will work closely with Ball and the senior leadership team over the next few quarters to ensure a seamless transition.

Eviden advances AI & NLP in defence with AtLaS project
Eviden advances AI & NLP in defence with AtLaS project

Eviden, the Atos Group product brand pioneering in advanced computing, cybersecurity products, mission-critical systems and vision AI, announces that it has been selected by the European Commission to provide the technical platform to host and integrate the applications developed by the nine selected organisations constituting the AtLaS consortium for the HLTP Challenge. This project, one of the four selected projects, is launched and financed by the European Defence Fund. Eviden will also supply BARTENDER, its own innovative software, which enables natural language processing in hundreds of languages. Defence communication and intelligence gathering AtLaS' objectives include developing resilient systems for noise and multiple language handling The AtLaS project focuses on advancing Human Language Technology (HLT) in defence, by combining artificial intelligence (AI) and Natural Language Processing (NLP) to handle low-quality and multilingual data. AtLaS' objectives include developing resilient systems for noise and multiple language handling, leveraging advanced training and technologies like denoising.  During the challenge, the participating consortium members will have the opportunity to improve defence communication and intelligence gathering, as well as create adaptable systems for a European library of language technologies. HLTP challenge Bernard Payer, Global Head of Mission-Critical Systems, Eviden, Atos Group, said: "We are proud to have been selected by the European Commission on the HLTP challenge and to leverage our expertise in Systems Integration and Human Language Processing within a consortium of industrial companies." He adds, "This is all the more important as HLTP is an essential tool for identifying threats and gathering information that can be exploited for defense purposes." Evaluate the ALP solutions AtLaS aims to evaluate the automatic language processing (ALP) solutions provided by various European partners in the defense sector. It addresses the specific constraints of these solutions' operational frameworks, such as processing different dialects and languages in degraded and varied contexts, including noisy environments, theatres of operation, and communications.

Access control applications

Port of Barcelona upgrades with Genetec Security Center
Port of Barcelona upgrades with Genetec Security Center

Genetec Inc., the pioneer in enterprise physical security software, announced that the Port of Barcelona has successfully implemented Genetec™ Security Center, significantly improving the port’s safety, efficiency, and operational capabilities. As one of the Mediterranean’s major logistics hubs, the Port of Barcelona has experienced continuous growth in recent years, leading to new operational and security challenges. In response, the Port Authority launched a modernisation initiative focused on transforming the port into a safer, smarter, and more sustainable environment. A unified approach to evolving security needs Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance While the port’s previous security system was effective, it lacked the flexibility and interoperability between devices made by different manufacturers required for current demands, hindering real-time decision-making – a critical factor when managing infrastructure of this scale. To overcome these limitations, the Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance, access control, intrusion detection, and other security technologies into a single interface. Port integrated advanced technologies Following a successful pilot using virtual servers, the port migrated its CCTV infrastructure – growing from 180 cameras to over 530, with plans to surpass 800 in the coming years. Alongside this expansion, the port integrated advanced technologies, including access control, intercom systems, video analytics, forensic tools, fire detection, and real-time occupancy analysis. Tangible results from day one Port operators can now manage all security systems through a single tool, streamlining workflows The deployment of Genetec Security Center has produced immediate results. Port operators can now manage all security systems through a single tool, streamlining workflows and significantly reducing response times to incidents. Additionally, maintenance and operational efficiency have improved across the board, contributing to significant cost savings. The system has proven especially valuable during high-traffic events like the America’s Cup and Nadal al Port, where it enhances crowd and vehicle management to ensure smooth and safe operations. How unified physical security can enhance not just safety? “The flexibility and scalability of Security Center have allowed us to centralise all our systems, reduce response times, and improve operations,” said Dídac Höflich, ICT Infrastructure Project Manager at the Port of Barcelona, adding “Genetec has provided us with a long-term solution that evolves with our needs, while also giving us peace of mind, knowing we are prepared for any challenge.” “Working with the Port of Barcelona demonstrates how unified physical security can enhance not just safety, but also efficiency and scalability for critical infrastructure,” said Jordi Charles Rodriguez, Account Executive at Genetec Inc., adding “We’re proud to support the Port Authority’s long-term vision and help lay the technological foundation for the port’s continued growth and innovation.”

HID pioneers NFC ticketing at Chester Racecourse
HID pioneers NFC ticketing at Chester Racecourse

HID, the pioneer in trusted identity solutions, announced that Chester Race Company, owner of the world’s oldest racecourse still in operation, has adopted Near Field Communication (NFC)-based ticketing technology – the first major sports venue in the UK to adopt an end-to-end solution provided by HID. Leveraging HID’s Event Management Platform (EMP) and Janam’s rugged XT3 handheld scanners, the organisation has revolutionised its guest admissions process, offering a seamless and efficient entry experience at Chester Racecourse. Oldest operational racecourse The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering Founded in 1539 during the reign of King Henry VIII, Chester Racecourse holds the Guinness World Record as the oldest operational racecourse. Operated by Chester Race Company, the venue welcomes over 200,000 guests annually to its 15-race season, including the renowned Boodles May Festival, which features the Chester Cup. The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering, hospitality, hotel and recruitment businesses. HID’s NFC ticketing technology “Admissions are our first touch point with our guests on a race day, so delivering an excellent customer experience is critical,” said Gareth Simpson, Head of Racecourse Operations at Chester Race Company. “By adopting HID’s NFC ticketing technology, we’ve transformed the entry process, offering guests the ease of smartphone-based tickets in their Apple or Google Wallets. It’s just like downloading a mobile boarding pass for an airline flight.” Chester Racecourse’s new system streamlines Chester Racecourse’s new system streamlines the ticketing process from purchase to entry Chester Racecourse’s new system streamlines the ticketing process from purchase to entry. Guests now receive encrypted e-tickets within seconds, downloadable directly to their smartphones, along with guidance about dress code, race program and directions. On race day, reminders appear on guests’ devices as they approach the venue, further enhancing convenience.  Key to the implementation is the purchase of 45 Janam XT3 rugged mobile computers which enable offline ticket validation for continuity of service. This is important as the racecourse is in a low-lying area in Chester where the mobile signal strength is poor. Upgrade its network infrastructure Preloaded ticket data on each device eliminates reliance on Wi-Fi connections, enabling swift and accurate access even during peak times. With a scan time of less than a second, the Janam XT3 units significantly reduce congestion and wait times and work well in poor light conditions. To support the NFC ticketing solution, Chester Race Company has made significant financial investments to upgrade its network infrastructure, deploying Wi-Fi 7 access points along with new routers, switches and robust 10-gigabit Ethernet connections to the Internet. Access control solution in real-time HID's EMP integrates with a ticket sales platform from SeatGeek, with a bespoke API recently written to integrate the two systems to enable ticket purchases to be updated automatically in the access control solution in real-time, thereby removing a cumbersome manual process adopted in the past.  “We’ve addressed all our entrance issues,” added Simpson. “From faster entry to real-time visibility of guest attendance, HID’s solution has been transformational.” Terms of enclosure and stands NFC-based system offers more benefits as Chester Racecourse knows exactly the number of people The NFC-based system offers additional benefits as Chester Racecourse knows exactly the number of people who have entered (out of the tickets sold) and where people are in terms of enclosure and stands. This helps it meet its compliance with capacity obligations, along with consideration for forthcoming legislation such as Martyn's Law. It also reduces ticket fraud by eliminating barcode sharing or resale opportunities by touts. Additional features within HID's EMP Looking ahead, Chester Race Company plans to expand NFC ticketing across its portfolio and explore additional features within HID’s EMP, such as accreditation management for staff and contractors, as well as loyalty program integration. “We’re the oldest racecourse in the world using pioneering-edge technology,” concluded Simpson. “HID’s solutions are enabling us to create modern, memorable experiences for our guests by streamlining admissions totally using a tool that everyone has in their pocket – a smartphone.”

Eagle Eye precision AI intrusion detection system
Eagle Eye precision AI intrusion detection system

Eagle Eye Networks, the pioneer in cloud video surveillance, introduced Eagle Eye Precision Person & Vehicle Detection. This AI-powered feature runs entirely in the cloud, and works on any connected camera, setting a new benchmark for highly accurate detection and alerting when intruders are present. Businesses can instantly deploy Eagle Eye Precision Person & Vehicle Detection on any camera connected to the global Eagle Eye platform with the push of a button–no new hardware or setup is required. Intrusion detection system “This advanced, AI-powered feature reduces crime by detecting people and vehicles with precision and immediately alerting the business owner, security team, or monitoring centre when intruders are detected,” said Dean Drako, CEO of Eagle Eye Networks. “Eagle Eye Precision Person & Vehicle Detection turns existing security cameras into an intrusion detection system–helping businesses respond faster, prevent incidents, and operate more efficiently, all without costly upgrades.”  Feature in the Eagle Eye cloud VMS Eagle Eye Precision Person & Vehicle Detection uses AI and multiple images to detect moving people and vehicles Eagle Eye Precision Person & Vehicle Detection uses AI and multiple images to detect moving people and vehicles with very high accuracy. Used primarily for remote or on-premise monitoring, its deep learning algorithms discern people and vehicles from other objects or activity (such as tree branches moving in the wind, shadows, or lights from vehicle movements) even in poor weather conditions and at long distances, significantly reducing expensive and time-consuming false positive alarms. Long-range accuracy and reliability Ideal for enterprise businesses, apartment complexes, warehouses, car dealerships, schools, and municipalities, Precision Person & Vehicle Detection easily scales across multiple locations. Eagle Eye customers such as Centurion Fire and Security, a security integration company based in Huddersfield, England, praise the long-range accuracy and reliability of the new feature. AI-based false alarm filtering systems Eagle Eye clients such as Centurion Fire and Security, a security integration firm based in Huddersfield "Eagle Eye's new Precision People & Vehicle Detection feature, which sends real-time alerts when people or vehicles are detected, is a game-changer for us and our customers. Unlike many AI-based false alarm filtering systems, Eagle Eye’s analytics have proven exceptionally sensitive and reliable—even detecting a person through a Heras fence 40 meters (130 feet) away." "Crucially, it doesn’t trigger on parked vehicles, which is a major problem with other providers. This level of accuracy is exactly what we need to support our users and our monitoring station effectively," said Nathan Smith, Director, Centurion Fire and Security Ltd. Additional benefits Improved Security – Empowers security professionals to focus on real threats by detecting only people and vehicles, enhancing intrusion detection and crime prevention Camera Compatibility – Works with existing cameras and Eagle Eye Cloud VMS infrastructure, requiring no additional hardware, specialty AI cameras or complicated setup Faster Response Time – Actionable, accurate alerts enable quicker decision-making and response to potential threats Cost Savings – Fewer false positive alarms reduce the workload on security personnel, lowering monitoring costs and improving efficiency Customer Satisfaction –Advanced AI-driven security increases customer satisfaction and engenders customer loyalty for resellers and professional monitoring centres Customizable Alerts – Users can set detection zones, schedules, and preferences for better control Automate additional security processes — Ability to trigger alarm monitoring applications such as Immix and Sentinel via webhook integration Integration with professional monitoring services — Seamlessly and instantly alert third-party monitoring provider. Development of Precision Person & Vehicle Detection "We were pleased to collaborate with Eagle Eye Networks in the development of Precision Person & Vehicle Detection,” said Steven Ballard, Managing Member, iNet Security and Surveillance. “Resellers can offer their business customers 24/7 AI-powered intrusion detection using the cameras they already have. It’s cloud-based, so there’s no need for extra hardware or complicated configurations. Eagle Eye’s Precision Person & Vehicle Detection delivers proactive protection that helps stop crime, not just record it."

Nightwatch's ERP: Enhancing school security access
Nightwatch's ERP: Enhancing school security access

Nightwatch Security & Telephone LLC, Sedalia, Mo., took a common problem for first responders – ready access to schools in an emergency – and turned it into a positive with a cloud management platform. Nightwatch owner Jeff Kesterson is partnering with local law enforcement on implementing an Emergency Response Platform (ERP) which gives police, sheriff and state highway patrol agencies in Sedalia and Pettis County greater accessibility and situational awareness at local school campuses. Cloud management platform The company provides access control, intrusion detection and video surveillance, managed via the Connect ONE Leveraged through the Connect ONE® by Connected Technologies cloud management platform, first responders and School Resource Officers (SROs) can view real-time activity at local schools, initiate immediate access, or lock down the protected premises. Nightwatch is the systems integrator and physical security service provider to the Sedalia School District (Sedalia 200), one of the largest districts in the county with over 4,500 students in PK-12 facilities; Sacred Heart School; La Monte R-IV School in neighbouring La Monte, Mo., and Greenridge R-VIII. The company provides access control, intrusion detection and video surveillance, managed through the Connect ONE cloud platform management interface. Remote locking and unlocking capabilities “We asked Connected Technologies to develop a simple way to update, administer and input agency officer’s codes/credentials for the schools through Connect ONE,” said Jeff Kesterson. “They came back with the ERP, which unifies all the school’s individual systems into one interface for viewing, management and control without separate site logins. It goes even further, and allows remote locking and unlocking capabilities during critical threats,” he said. Fobs and system permissions Users can manage the fobs and system permissions in one place for all the schools viathe ERP Kesterson added that first responders, as well as SROs at each school, maintain access with proximity access control key fobs, but updating the devices to stay current with staffing changes was unwieldy. Now, users can manage the fobs and system permissions in one place for all the schools through the ERP. Sedalia 200 school administration manages more than 700 fobs annually, utilising the Connect ONE platform daily. The ERP provides agencies with a separate login with certain designated permissions for first responders who can only see customer site locations shared by Nightwatch. Via the emergency dashboard, first responders can login to view cameras (where implemented), unlock doors and outputs, activate task functions, initiate lockdown and view recent activity. Door access control and camera viewing The Sedalia Police Department has access to schools within the city limits: Sedalia 200 which includes 10 schools plus administration and maintenance buildings and Sacred Heart School. The Missouri State Highway Patrol A has access to the same schools as the Pettis County Sheriff’s Office The Pettis County Sheriff’s Office has access to Sedalia 200 schools and buildings; Sacred Heart School; La Monte R-IV; and Greenridge R-VIII school districts. The Missouri State Highway Patrol A has access to the same schools as the Pettis County Sheriff’s Office. The ERP allows Nightwatch to easily set up various zones of jurisdiction, giving first responders access to the schools they are obligated/expected to respond to an emergency. Of the four school districts using the ERP, all except Sacred Heart School provide both door access control and camera viewing/playback to the departments with access. ERP for enhanced accessibility and response Commander Joshua Howell, Operation's Support Bureau, Sedalia Police Department, said the ERP is a huge timesaver, and allows the department to administer key fob credentials, streamlining the process when personnel access requires modification.  “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” he said. Commander Howell added that the platform allows authorities to unlock doors if an emergency responder doesn’t have a proximity device, saving time as opposed to dispatching a patrol officer to the scene. The Pettis County Sheriff’s Office is also leveraging the ERP for enhanced accessibility and response readiness. School safety planning Sheriff’s Office has over 650 square miles in the county, including Sedalia and smaller cities “This has been a great tool for us,” said Sergeant John Cline, SRO Unit Supervisor, Pettis Co. Sheriff’s Office. “We’re continuing to build it out and have integrated it into our school safety planning. Being able to remotely manage key fobs and initiate lockdowns – there’s substantial benefit to having that immediate control,” he said. The Sheriff’s Office has jurisdiction over 650 square miles in the county, including Sedalia and several smaller cities. It manages some 40 key fob credentials issued to patrol officers and SROs assigned to the schools. SROs serve the daily law enforcement needs of the schools, but if they aren’t available to provide access in an emergency, the ERP provides that function in real-time. Emergency Response Platform Nightwatch provided training on the interface to the units, and Sgt. Cline said it was intuitive “Our schools recognise the importance of having a close relationship with law enforcement,” Sgt. Cline continued. “Being able to get into a building quickly when seconds count has made the relationship that much stronger,” he said. Nightwatch provided training on the interface to the departments, and Sgt. Cline said it was intuitive and easy to grasp in a one-hour session. “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to defuse an emergency quickly and effectively with powerful information to view and control facility security,” says Dan Simon, Co-Founder, Connect ONE. “It’s a great solution to assist in public safety while also ensuring you keep a customer long-term.” Other benefits of the Emergency Response Platform A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness for first responders.