Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

Invicti, the pioneer in dynamic application security testing (DAST), announced the launch of its next-gen Application Security Platform featuring AI-powered scanning capabilities, enhanced DAST performance, and full-spectrum visibility into application risk. The platform enables organisations to detect and fix real vulnerabilities faster and with greater accuracy. DAST-first platform “Your applications are dynamic, shouldn’t your AppSec tools be too?” said Neil Roseman, CEO of Invicti. “Attackers live in your runtime, but most security tools are stuck in static analysis. With Invicti, we’re cutting through the static with a DAST-first platform that continuously uncovers real risk in real time - so security teams can take action with confidence.” DAST improvements with AI The latest release introduces major enhancements to Invicti’s DAST engine, reinforcing its position as the industry’s most accurate dynamic scanner: 8x faster than leading competitors Finds 40% more high and critical vulnerabilities Delivers the industry's best 99.98% accuracy with proof-based scanning AI-driven features and integrated discovery The Invicti platform now combines AI-driven features and integrated discovery to expose more of the real attack surface and deliver broader, more accurate security coverage: LLM scanning secures AI-generated code by identifying risks produced by large language models AI-powered DAST reveals vulnerabilities that traditionally required manual penetration testing Integrated ASPM brings complete visibility into application posture, enabling teams to prioritise and manage risk across the SDLC Enhanced API detection identifies and tests previously hidden or unmanaged APIs - now with native support for F5, NGINX, and Cloudflare Stronger DAST engine The Invicti Application Security Platform unifies DAST, API security, SCA, and ASPM “A stronger DAST engine gives our customers more than better scan results—it gives them clarity,” said Kevin Gallagher, President of Invicti. “They can see what truly matters, cut through the noise, and move faster to reduce risk. This launch continues our push to make security actionable, efficient, and focused on what’s real.” The Invicti Application Security Platform unifies DAST, API security, SCA, and ASPM to help teams focus on what matters most - securing their real attack surface without the noise. It is the latest step in advancing Invicti’s mission to deliver application security that is accurate, scalable, and free of false positives.

Lab 1, the major AI, Exposed Data Intelligence platform, launched “File Previews”, an industry-first capability for businesses to safely preview exposed files breached through direct cyberattacks, supplier breaches, employee and contractor errors, cloud misconfigurations and more. Lab 1 uses sophisticated AI agents to scrape breached datasets from the surface, deep and dark web, extracting and analysing file contents, to rapidly identify an organisation’s exposure. Files are categorised and summarised before matching to organisation based on the data discovered, including domains, emails, IPs, IBANs, US Social Security Numbers, customer data and more. Lab 1 Platform File Previews enables companies to safely preview files that have been exposed The Lab 1 Platform alerts customers to files in breached datasets that contain information that represents a potential risk to their business. File Previews enables companies to safely preview files that have been exposed, within the security of the Lab 1 Platform. It builds on its AI summary feature, which leverages an LLM to provide an overview of what company information is exposed within the document, whether a statement, a database of customer details, an email exchange or an invoice revealing a supplier relationship. Together, this Exposed Data Intelligence (EDI) enables organisations to review and assess every relevant file in a breach, taking a content-aware response to information leaked into the public domain, where the nature of what is leaked and not just how much information, is a determinant of damage and regulatory exposure. Fast and accurate risk assessment Robin Brattel, Co-founder and CEO, Lab 1 said: “Until now, businesses that wanted to find out whether their information is in exposed data sets would have to take on the security risks of downloading files to manually analyse or pay a Cyber Threat Intelligence (CTI) company to conduct the assessment, both were highly manual, time consuming and expensive.” “The launch of File Previews means that companies can not only be notified of their exposure in breaches they weren’t aware of, but they can also safely see the exposed files for themselves. This, in turn, means a faster, more accurate risk assessment takes place and enables them to take steps to mitigate the risk.” Assessing exposure The Lab 1 platform dramatically cuts down the time to assess a breached dataset for exposure The Lab 1 platform dramatically cuts down the time to assess a breached dataset for exposure and understand the associated risks, whether security, commercial or compliance. Cutting out the need for a middleman CTI firm, businesses can assess exposure at scale and safely see what private information has entered the public domain. Lab 1 supports the extraction of and previews for a wide range of file types, including documents, metadata from common image and video formats, code and data files, and executable files. IPv4 Addresses Commonly extracted data includes PII relating to customers, suppliers and employees, including names, email addresses, US social security numbers, and passport details. As well as more technical information, such as IPv4 Addresses, IPv6 Addresses, CVE Code, IBANs, Bank Account Numbers, HTTP Basic Auth URLs, AWS S3 File Paths and Virtual Hosts, RSA and SSH Private Keys, and more.

Codelocks has launched its Adjustable Gate Latch, giving locksmiths and facilities managers an easier way to control access through perimeter gates where the gate and post spacing exceeds the range of a traditional mortice latch. Jo Milne-Rowe, Managing Director at Codelocks, said: “This new product is quite literally filling a gap that other products can’t. There are many scenarios where standard mortice latches won’t work, and often the space between the post and gate will change over time. Giving locksmiths and facilities managers a customisable option lets them create secure, reliable fittings that can be readjusted in the future without the cost of replacements.” Codelocks’ easy-to-use product Codelocks’ easy-to-use product bridges these gaps with its manually adjustable bolt that can be extended Non-standard gaps are a common occurrence in outdoor applications where the ground, weather and a multitude of changing factors can result in non-standard post spacing. Codelocks’ easy-to-use product bridges these gaps with its manually adjustable bolt that can be extended or shortened by rotating it. Once installed, a locking faceplate prevents further adjustment to create a secure fitting and fastens the bolt at the desired length. It is adjustable from 12.5 mm (8/16”) up to 20.5 mm (13/16”), and to make readjustments, the faceplate must be removed by a user with the access code for the accompanying lock. Codelocks’ Gate Solutions range The latch is compatible with the CL400 Mechanical, CL500 Mechanical, and CL5000 Electronic ranges of locks, giving installers a wide selection of suitable locks for different applications. The Adjustable Gate Latch is part of Codelocks’ Gate Solutions range; a line of products designed and made for withstanding frequent use and outdoor conditions in residential and commercial settings.

i-PRO Americas Inc. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced a new education-focused integration between its i-PRO BWC4000 Body-Worn Camera and VideoInsight™ Video Management System (VMS). VideoInsight now offers native support for BWC4000 devices, allowing K–12 schools to live stream, capture, manage, and review body-worn video and audio through a single, secure platform. i-PRO body-worn cameras Unlike unsecured recordings from smartphones, footage captured by i-PRO body-worn cameras Designed specifically for the unique needs of school environments, the comprehensive end-to-end solution helps administrators, IT directors, and security personnel to extend their video coverage beyond traditional fixed cameras without adding operational complexity or excessive costs. Unlike unsecured recordings from smartphones, footage captured by i-PRO body-worn cameras is uploaded directly to the VideoInsight VMS. This process ensures that the footage is never stored on personal devices, thereby protecting student privacy and helping schools stay legally compliant. Integrating body-worn camera video "K–12 schools face rising demands to improve safety and shorten response times, all while managing tight budgets and limited resources," said Adam Lowenstein, Americas Product Director, i-PRO. "By integrating body-worn camera video seamlessly into the trusted VideoInsight platform, we’re giving schools a powerful, cost-effective tool to protect students and staff, streamline investigations, and enhance real-time situational awareness." Law-enforcement-centric body-worn solutions Schools can unify mobile video and audio captured by resource officers or staff with fixed cameras Unlike generic or law-enforcement-centric body-worn solutions, this integration is purpose-built for education. Schools can now unify mobile video and audio captured by resource officers or staff with fixed camera footage, improving coverage in hallways, buses, playgrounds, and off-campus events where fixed cameras cannot reach. Key benefits & features Instant Capture: One-touch recording with optional hands-free activation ensures critical incidents are documented quickly Greater Transparency & Accountability: The visible presence of BWCs helps deter aggressive behaviour and supports counselling or intervention strategies with clear, unbiased documentation Secure Evidence Management: Footage is automatically uploaded to the VideoInsight VMS platform, ensuring data integrity while protecting student privacy Dock & Go Simplicity: Cameras auto-upload, charge, and offload footage via docking stations, saving time and reducing human error Live Streaming Capabilities: Wi-Fi-enabled live streaming provides real-time situational awareness for faster response Built to withstand the daily demands of school operations, the rugged BWC4000 is MIL-STD-810H-tested and IP67-rated, combining the proven reliability of public safety deployments with new education-specific controls and workflows optimised for K–12 use. Availability The i-PRO BWC4000 and VideoInsight VMS integration is available now through i-PRO’s distribution partners or directly from i-PRO.
Access control applications

EG.D, part of the E.ON group, supplies electricity to 2.7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations. According to the International Energy Agency (IEA), in 2024, global electricity consumption increased nearly two times the annual average of the past decade. How LiDAR technology could be used EG.D wanted to assess how volumetric and LiDAR technology could be used to bolster the physical security At the same time, new regulations such as the Critical Entities Resilience (CER) Directive, which will come into force across all European Union Member States in July 2026, and Germany’s KRITIS Umbrella law, are being introduced to guide organisations responsible for national critical infrastructure in ensuring their resilience in the face of existing and emerging threats. A longtime Hexagon customer, EG.D wanted to assess how volumetric and LiDAR technology could be used to bolster the physical security of its substations. For this, it chose Hexagon’s HxGN dC3 LidarVision. Ensuring the resilience of critical infrastructure For energy providers, transformer substations are an integral component of the energy grid, securely and reliably transmitting electricity to homes, businesses, schools, hospitals, etc., at the correct voltage. Major incidents involving substations are rare, due to the rigorous monitoring, maintenance, safety and security measures in place. However, when a situation arises, it can cause significant problems, as was highlighted in early 2025 when a fire at a site in the UK interrupted power to 5,000 homes and affected a large international airport. LiDAR-based 3D surveillance technology EG.D chose to embark on a pioneering pilot project that would test the capabilities Until recently, best practice for safeguarding unmanned substations focused on traditional forms of perimeter protection using fencing (typically steel and passive infrared sensors), alarms, remote monitoring via CCTV cameras and an access control system (often operated via a card or biometrics to manage authorised entrance). However, EG.D decided to embark on a pioneering pilot project that would test the capabilities of the very latest in LiDAR-based 3D surveillance technology. A pilot project for improved substation safety and security Tomáš Sofka, security technologies at EG.D explained, “We have partnered with Hexagon for many years in the field of GIS and were particularly impressed by their innovative solutions in volumetric detection and LiDAR technology." "We wanted to assess how the technology could be used to provide stronger security to keep unauthorised people out of substations, locate intruders and improve safeguards for maintenance personnel while they are working on-site near high-voltage equipment.” HxGN dC3 LidarVision was the solution chosen for the project. This advanced 3D surveillance software solution is based on volumetric detection technology and is designed to secure entire sites, unlike traditional perimeter protection systems, which tend to concentrate only on the fence line. Five LiDAR sensors The project uses five strategically placed LiDAR sensors that enable the virtual creation of secure The project uses five strategically placed LiDAR sensors that enable the virtual creation of secure, safe and sterile zones (including the perimeter fence). Crucially, these zones can be switched on and off or changed at the click of a button or drag of the mouse. For example, when maintenance is being carried out, the zone in which the work is taking place can be deactivated. Meanwhile, other areas remain live to prevent workers from straying into an unauthorised or potentially hazardous area. EG.D’s security control room Authorised personnel and trespassers can also be automatically monitored and tracked via a live, real-time feed into EG.D’s security control room. Furthermore, the system recognises the number of people and their precise positions, along with their speeds and directions of movement (if walking or running) and even their projected trajectories. This can be augmented further with PTZ cameras, alarms and speaker systems to communicate with the person(s) in question. Resilience of safety and security measures Another significant benefit of this type of system is the ability to create a digital twin for every substation Another significant advantage of this type of system is the ability to create a digital twin for every substation. In doing so, scenarios can be played out virtually to test the resistance and resilience of safety and security measures. Essentially, it creates a 3D representation/map of the entire facility that they can interact with. It enables the positioning of LiDAR sensors and cameras to be optimised to mitigate potential blind spots or poor viewing angles before anyone steps on site. The system can be enhanced further using thermal sensors and cameras that monitor the temperature of designated areas and raise an alert if it deviates from the norm. This is valuable for intrusion detection (whether human or animal) and the early detection of fire, before it begins to smoke or ignite. Setting a new standard that is gaining worldwide attention “Our experience working with Hexagon has been exceptional. The collaboration was exemplary and professional throughout all phases of the project,” said Sofka. “The response of the management team to the pilot operation has been overwhelmingly positive and we highly recommend Hexagon to other organisations.” As a result of the pilot’s success, EG.D and Hexagon are working together on a plan to roll out HxGN dC3 LidarVision to other energy facilities across the grid. The company is also actively sharing its knowledge with other national energy companies, including those in the U.S. and Asia-Pacific region, which are considering this new approach as the possible gold standard for substation resilience, safety and security.

The precise recording of passenger numbers is essential for transport companies - it helps to optimise timetables, make better use of capacities and organise local public transport more efficiently. A modern solution for this is camera-based passenger counting. Intelligent image processing systems automatically and precisely record how many people board and alight - without any manual counting. With Adigo nPax, the Norwegian company Adigo Mechatronics has developed such a system especially for ferries. The required images are supplied by an industrial camera from IDS Imaging Development Systems GmbH. But how exactly does this technology work, what advantages does it offer and where is it already being used? Digital toll technologies International shipping laws require ferry operators to know the exact number of passengers on board International shipping regulations require ferry operators to know the exact number of passengers on board - a task that has traditionally been handled in conjunction with the ticketing process. However, in the course of automation, ferry boarding has increasingly shifted to free-flow models. Vehicles and passengers can drive or walk directly onto the ferry without traditional ticket controls or barriers. Automated systems such as cameras, sensors or digital toll technologies record the vehicle's licence plate number or the amount of passengers in real time. The aim: a fast and smooth boarding process without long waiting times or manual checks. Adigo nPax system However, counting passengers in moving vehicles is still a challenge that often requires staff - especially when there are large numbers of passengers or when small children are sitting in vehicles with tinted windows. This is where the Adigo nPax system comes in: Using a combination of a camera and AI-supported algorithms, it automatically records the number of passengers and transmits it directly to the ship's logging system. The data is documented centrally and thus made available for authorities or internal processes. If necessary, the crew can check the count manually using a mobile device. Every correction helps to continuously improve the system. More efficiency thanks to precise passenger data With Adigo nPax, counting accuracy and operating efficiency can be greatly increased With Adigo nPax, counting accuracy and operational efficiency can be significantly increased. Specially selected industrial cameras with customised lighting solutions reliably capture clear images - even at high vehicle speeds. The data is analysed directly on site: State-of-the-art AI models process the images in real time and immediately provide exact passenger numbers for every vehicle that passes through the system. In the interests of data security, all image data is used exclusively locally on board. No external storage or transmission takes place - a prerequisite and a decisive contribution to protecting the privacy of passengers. Control tests with hundreds of vehicles The system has been in use on the Arsvågen-Mortavika route for over a year. "Control tests with hundreds of vehicles have shown a counting accuracy of over 98 percent." "Despite challenges such as tinted windows, child seat covers and the changeable weather conditions that are typical of the Norwegian coast, Adigo nPax reliably delivers precise results," says André Ødegårdstuen - Product Developer at Adigo Mechatronics. Camera with exceptional light sensitivity Adigo relies on a particularly powerful model with an e2v 1.3 megapixel CMOS sensor The camera used - a GigE uEye CP - was supplied by IDS. Its compact magnesium housing (29 x 29 x 29 mm) is both light and robust at around 50 g and emphasises the camera's suitability for industrial use. It is ideal for tasks in the fields of automation, medical technology and life sciences, agriculture, logistics, traffic and transport, for example. Adigo relies on a particularly powerful model with an e2v 1.3 megapixel CMOS sensor - one of the most sensitive sensors in the IDS portfolio. In addition to the outstanding light sensitivity in CCD quality, it offers two global and rolling shutter variants that can be switched during operation, thus maximising flexibility for changing requirements and environmental conditions. Integration into the Adigo nPax system Several parts can be checked simultaneously or the AOIs can be captured in a series of exposures In addition, a maximum of four areas of interest are available. This means that either several features can be checked simultaneously or the AOIs can be captured in a series of exposures with different parameters. “The camera was specifically chosen because it has exceptional sensitivity in the critical wavelength range and delivers high-quality images at the required frame rates," says Ødegårdstuen. "Seamless integration into the Adigo nPax system was achieved through the IDS peak C++ interface, which enables robust and efficient operation.” Passenger counting solutions Interest in automated passenger counting solutions is growing rapidly not only in Adigo's home market of Norway, but also internationally. This is due to the increasing demand for efficient, data-driven solutions to optimise public transport. Automated systems, especially those based on camera technology, not only provide accurate passenger counts, but also valuable insights into traffic flows and enable better resource utilisation. At a time when sustainability and efficiency are playing an increasingly important role in the public sector, such technologies are helping to make the transport sector fit for the future.

Seamless ASSA ABLOY digital access is now part of the Sharry workplace experience. By connecting Sharry with ASSA ABLOY’s ARX access control solution, businesses can administer secure employee access via mobile credentials as well as visitor management, all from a single unified platform, helping to save time and costs. This new integration combines ASSA ABLOY’s digital access expertise with the convenient functionality of a Sharry workplace platform. It allows administrators to control access permissions, streamline credential management and simplify guest registration directly within Sharry's ecosystem. With Sharry and ARX, customers now have a choice of mobile credentials, supporting Wallet, NFC and BLE unlocking. Integration with the Sharry workplace platform “It is exciting that we can expand our ARX solution via integration with Sharry workplace experience platform to make day-to-day life easier for our customers,” says Matti Kuismin, VP & Head of Product Unit EAC at ASSA ABLOY Opening Solutions EMEIA. “The ARX security solution is an open platform and easy to integrate. Through integration with Sharry as a mobile-first technology, we enable easy-to-use mobile keys within Wallet – and do that with the highest security standards.” “We have already deployed the integrated solution with a customer in Scandinavia. Their employees now access their offices with the tap of a phone or smartwatch, thanks to the use of HID mobile credentials, both app- and Wallet-based.” Enhance security with integrated access management Integration with Sharry now enables skills and security chiefs to combine access and visitor management Developed from decades of access expertise and experience, ASSA ABLOY ARX combines digital access with alarm functionality, and is available for both Offline and Online (real-time) management. ARX is built on an open platform model, to connect seamlessly with a broad range of complementary business systems and software. The integration with Sharry now enables facilities and security managers to combine access and visitor management within a single solution. Sharry streamlines the process of employee onboarding (and offboarding), which is now integrated with access permission management, including the easy distribution of mobile credentials. It simplifies visitor management, saving staff time, and provides workplace analytics with a genuine ROI. ARX’s robust security infrastructure “We’re excited to expand our access control ecosystem with ASSA ABLOY ARX, a proven and trusted security solution,” says Karel Hudínek, Head of Technology Partnerships at Sharry. “This integration brings seamless credential management, automated access assignments, and an enhanced user experience to enterprises and property managers." "By combining ARX’s robust security infrastructure with Sharry’s mobile-first technology, we enable a smarter, more efficient approach to access management – one that simplifies operations while maintaining the highest security standards.” The Sharry/ARX integration is now available to all ASSA ABLOY customers in the Scandinavia region.

Motorola Solutions announced that Northwell Health, New York’s largest healthcare system, is expanding the deployment of safety and security technologies across its growing network. Northwell Health relies on Motorola Solutions’ AI-powered video security and analytics, two-way radio communications, mass notification and panic button technologies to help detect, analyse and manage threats. This integrated solution supports the distinct security needs of healthcare settings, which range from protecting staff and vulnerable patients to prioritising patient care during fast-paced and often high-stakes health emergencies. New installations “Managing security across a growing health network can be complex,” said Mark Swensen, Senior Manager of Operations, Security, Safety and Emergency Management, Northwell Health. He adds, “Investing in a security system where the technologies work together simplifies scaling new installations when hospitals and clinics join our network. We can add more security cameras or expand radio use across multiple sites without the challenges that can arise when security systems don’t easily connect.” Integration between video and radio systems The health system is broadening its use of AI-powered Avigilon security cameras with analytics This security expansion builds upon Northwell Health’s well-established safety and crisis management framework that supports its fast-growing healthcare network, which now encompasses nearly 30 hospitals and over 1,000 care locations. The health system is broadening its use of AI-powered Avigilon security cameras with analytics that can identify unusual activity or potential threats and alert security personnel and clinical personnel via two-way radios and other types of push-to-talk devices. This real-time integration between video and radio systems helps to improve both security and operational responsiveness. Use of a scalable digital communication network The hospital is also expanding its use of a scalable digital communication network that is designed to share voice and data across the variety of devices that different hospital staff rely on, including two-way radios and smart phones, to help ensure security teams, medical staff and administrators can connect at a moment's notice. “Northwell Health is creating a more secure work environment where doctors, nurses and clinical teams can focus on what they do best: taking care of patients,” said Scott Schoepel, Vice President, Video Security & Access Control, Motorola Solutions. He adds, “They're setting the standard for security and safety in healthcare. We're proud to provide solutions that blend seamlessly into their routines, offering peace of mind in feeling safe and protected so they can focus on caring for people who need them most.”
Global Security Exchange (GSX) 2025 news
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2025 with in-per...