Mobile Access Trends

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

What are the most promising new technologies in security?
What are the most promising new technologies in security?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?   

2025 Access Control Solutions: Key trends & Innovations
2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations.  Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities.  2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.

Latest Access control news

OpenID's role in AI identity management
OpenID's role in AI identity management

The OpenID Foundation (OIDF), a pioneer in open identity standards, and the body behind identity protocols used by billions of people worldwide, announced the formation of the Artificial Intelligence Identity Management (AIIM) Community Group.  This new initiative addresses a critical gap in the advancing artificial intelligence (AI) landscape. Bringing together recognised pioneers and security experts from across the AI and identity ecosystems, its goal is to bridge the growing disconnect between advancing artificial intelligence systems and established identity management practices. Specific needs of AI agents The separation between AI and identity development presents significant challenges around privacy As AI systems expand across social interactions, digital commerce, financial services, and the broader digital ecosystem, the separation between AI and identity development presents significant challenges around privacy, security, and interoperability. Current standards only partially address the specific requirements of AI agents, particularly around delegated authority, agent authentication, authorisation propagation between agents, and agent discovery and governance. Why this matters now The AIIM Community Group has arrived at a critical stage, as AI integration spans multiple dimensions of digital infrastructure. Without appropriate identity management frameworks, AI deployments face substantial security vulnerabilities and interoperability challenges that could undermine confidence in AI systems. "The pace of AI development is accelerating rapidly, but we must ensure that security and privacy remain foundational," said Atul Tulshibagwale, co-chair of the AIIM Community Group and CTO at SGNL. "This Community Group provides the essential forum where AI innovators and identity experts can collaborate to establish secure, trusted frameworks for AI deployment. We're here to enable responsible innovation at scale." Identity management frameworks AIIM Community Group has arrived at a critical stage, as AI integration spans multiple dimensions Co-chair Tobin South, AI Agents Lead at WorkOS and Research Fellow at Stanford University, emphasised the significance: "We're seeing AI agents making decisions and taking actions on behalf of users at unprecedented scale. Without proper identity management frameworks, we risk building systems without solid foundations." "The AIIM Community Group will help establish the robust infrastructure that AI systems require to operate securely and interoperably." AI and identity communities Co-Chair Jeff Lombardo, Principal Identity Specialist at AWS, highlighted the collaborative approach: "What distinguishes this initiative is our commitment to creating an open forum where conversations currently happening in isolation can converge." "Our goal is to develop a comprehensive taxonomy, mental model, and roadmap that advance through multiple standards bodies and forums, leveraging the collective expertise of both AI and identity communities." Proven leadership in identity standards The OpenID Foundation's leadership in this space builds upon its established track record in creating interoperable, secure identity standards that scale globally. For example: With OpenID Connect now used by billions of people across millions of applications, and FAPI securing open banking and open data in hundreds of implementations worldwide, the foundation brings proven expertise in bridging complex technical communities.  OpenID Foundation is also at the forefront of standards work in verifiable credentials (OpenID for Verifiable Presentation and OpenID for Verifiable Credential Issuance) adopted by the European Commission, the UK government, the Swiss Government, the State of California, and many open source projects.  OpenID Foundation’s existing and emerging standards OpenID Foundation’s existing and emerging standards could help underpin emerging AI deployments The OpenID Foundation’s existing and emerging standards could help underpin emerging AI deployments to support and accelerate their ability to deliver high-quality, robust use cases.  "The OpenID Foundation has spent nearly two decades developing the standards that enable secure, interoperable identity at internet scale through millions of public and private sector implementations," said Gail Hodges, Executive Director of the OpenID Foundation.  Partner with the AI community Hodges added: "Our community can partner with the AI community to identify where existing specifications can help, where gaps need to be addressed, and the most expeditious way to fill those gaps without sacrificing privacy and security.”   “Regardless of whether the gaps are closed with the OpenID Foundation or in other expert groups, we hope to establish a shared roadmap so that AI systems and use cases can leverage and enhance identity infrastructure for years to come." Key objectives and deliverables The AIIM Community Group will focus on five strategic areas: Gap identification: mapping areas not currently addressed by existing standards that require focused attention from the identity community. Terminology consensus: establishing shared vocabulary to enable clear communication across AI and identity domains. Industry engagement: facilitating dialogue with major platform vendors and stakeholders. Use case definition: developing agentic AI champion use cases that organisations can reference and implement. Regulatory monitoring: tracking government AI regulations that impact identity management. Open participation and community building The AIIM Community Group operates as a forum for open discussion protected by intellectual property agreements, removing barriers to participation while ensuring that ideas and work products remain freely available to the global community. The group operates under core principles of respect, privacy through consent, and interoperability, with no participation fees to encourage broad engagement from AI and identity experts worldwide. Organisations and individuals interested in participating, please visit: Artificial Intelligence Identity Management Community Group - OpenID Foundation where they can sign the Participation Agreement to take part.

Matrix surveillance: Certified & secure solutions
Matrix surveillance: Certified & secure solutions

In 2017, 123 police CCTV surveillance cameras in Washington, D.C., were hacked and taken offline — right before a high-profile public event. The issue wasn’t the camera. It was a failure of cybersecurity compliance (Source: BBC). Imagine a scenario where a major supplier loses a multi-crore government contract in India because their CCTV cameras lacked a mandatory RDSO certification for use on moving coaches. Why are certifications necessary In both cases, the cameras worked. But they weren’t certified and didn’t comply with the norms. Certifications aren’t red tape. They prove the surveillance system is safe, secure, and legally fit for deployment — whether in a city, hospital, train, or airport. In this guide, they explain why certifications are necessary for the video surveillance system and what are the different kinds of certifications they need. Country-wise certifications: Ensuring legal operation Every country defines its own rules for what surveillance equipment is allowed Every country defines its own rules for what surveillance equipment is allowed. These certifications verify the system isn’t just functional — it’s legally compliant. These certifications protect you from failed tenders, seized shipments, and legal take-downs. Real risk: Non-compliance can lead to project rejection, product seizure, or forced removal post-installation. Data privacy: Securing the surveillance footage Surveillance doesn’t just record spaces — it records people. That’s why laws and certifications are in place to govern how video data is captured, stored, and interpreted, ensuring it’s handled ethically and lawfully. Real risk: Without compliance, footage may be unusable in court — or worse, land them in legal trouble. Cybersecurity: Protecting the surveillance systems Cybersecurity standards shield the surveillance plan from hacking, tampering, and unauthorised access Cybersecurity standards shield the surveillance system from hacking, tampering, and unauthorised access — ensuring that the footage remains intact, authentic, and out of the wrong hands. Real risk: Unprotected systems are open to hacking, live feed tampering, or footage theft. Engineered with multi-layered security and built to the highest standards, Matrix Network Cameras comply with ISO/IEC 27402, while Matrix Video Management System is STQC-certified and safeguarded against OWASP Top 10 desktop security risks—ensuring strong cyber defense and uncompromised surveillance data integrity. To sum up Even the best footage means little without the right certifications. Matrix Video Surveillance Solutions meet country-specific regulations and ensure data security—keeping the surveillance secure, compliant, and reliable.

Gallagher Security Charity Golf Day 2025 fundraising success
Gallagher Security Charity Golf Day 2025 fundraising success

In what is fast becoming a calendar highlight, members of the Gallagher Security Australia team, together with their Channel Partners, End Users, Technology Partners, and Consultants took to the green on Thursday for their third annual Charity Golf Day event, raising money for child protection organisation, Bravehearts.   More than 130 people turned out to The Palms Golf Course at Sanctuary Cove in Queensland for an action-packed 18 holes, and their efforts were rewarded, with this year’s event raising AUD $57,000 to support Bravehearts, as they continue their vital work dedicated to the prevention and treatment of child sexual abuse, a crime experienced by one in four Australians. Gallagher raised in previous years Gallagher raised the bar on previous years, with Thursday’s event recording the highest donation Together with their sponsors, ADT Security, Assa Abloy, B&R Enclosures, Convergint, Hexagon, Optic Security, PMT, Salto, Securcom, Seme Solutions, and Traka, along with Print Partner, CV Services Group, Gallagher raised the bar on previous years, with Thursday’s event recording the highest donation tally to date and the largest pool of players.  Gallagher Security Executive Vice President for Asia Pacific (APAC) and India, Middle East, and Africa (IMEA), Craig Schutte, says, “We are thrilled with the success of this year’s event and are grateful for the continued support of our sponsors and all those who took part last week." Longstanding support of Bravehearts Schutte added: "Coming together to positively impact and support the critically important work of Bravehearts is something we remain firmly committed to, and I’d like to thank everyone who took part for their support and participation at this year’s event.”  “As a company, people are the cornerstone of everything we do, and we are committed to continuing our longstanding support of Bravehearts and together unlocking more opportunities to improve the lives of Australian children impacted by sexual abuse.”  Gallagher's wider security industry’s support Bravehearts CEO, Alison Geale says, "Bravehearts is deeply appreciative of the ongoing support from the Gallagher Security Australia team, whose contributions continue to play a vital role in sustaining our services."  “Their commitment, particularly through their annual Charity Golf Day, helps address funding gaps, ensuring the continued delivery of our support, and the expansion of our work in Australian schools and early learning centres."  “We are grateful for Gallagher and the wider security industry’s support. It is instrumental in advancing our mission to provide a coordinated approach to the prevention and treatment of child sexual abuse."  Gallagher’s 2025 Charity Golf Day Gallagher’s 2025 Charity Golf Day marked the largest fundraising event held by one of Bravehearts Bravehearts National Partnerships Manager, Kylie Hewitt, was delighted to note that Gallagher’s 2025 Charity Golf Day marked the largest fundraising event held by one of Bravehearts’ partners since it was established over 25 years ago.    “$57,000 goes an extremely long way at Bravehearts. It can fund 380 specialist trauma-informed counselling sessions for children affected by sexual abuse. It can also help Bravehearts educate over 4,750 children about personal safety, which could change the trajectory of children’s lives,” says Kylie. Introduce the Platinum Sponsor  Gallagher Security, National Events Manager, Nicola Johnson, was pleased to host the event after it was unfortunately postponed earlier this year due to inclement weather.   “Our Charity Golf Day is an annual highlight, and one the team proudly gets behind. Since its inception in 2023, we’ve seen support for the event increase year-on-year, and we simply could not do it without our sponsors. This year we’re proud to introduce our Platinum Sponsor, Securcom, whose support of Bravehearts has been integral over the years,” says Nicola.   Queensland businesses stepped with donations Nicola added: “Alongside this, several community-minded Queensland businesses stepped forward with donations for a highly sought after raffle to boost the amount we could fundraise for Bravehearts." "Worth over $7,000, our thanks go to Balter Brewing, Burleigh Brewing Co, Currumbin Wildlife Sanctuary, Drummond Golf Biggera Waters, Gemelli Broadbeach, Holy Ship, Johnson Controls, Kendor Distillery, Porsche Centre Gold Coast, Ray White Shore Group, Sanctuary Cove Golf and Country Club, Sofitel Gold Coast Broadbeach, Stratus and Vela Estate for their generous support.”   Gallagher’s local Channel Partners Bravehearts relies on the support and fundraising initiatives of companies and individuals As a not-for-profit organisation operating for more than 25 years, Bravehearts relies on the support and fundraising initiatives of companies and individuals to enable them to continue the work they do in the community.    Gallagher’s local Channel Partners were encouraged to bring along their customers to support the cause and benefit from the opportunity to network with like-minded businesses and industry suppliers.  Gallagher’s ongoing relationship In addition to Gallagher’s Charity Golf Day event, Gallagher’s ongoing relationship with Bravehearts, which began in 2022, includes supporting the annual Bravehearts Ball, Bravehearts’ own golf day, and the ongoing support and maintenance of the Gallagher security system donated and installed at Bravehearts HQ in 2022, in conjunction with Gallagher Security Certified Channel Partner and Platinum Sponsor of this year’s golf day, Securcom.

dormakaba Innovation Lab opens at German headquarters
dormakaba Innovation Lab opens at German headquarters

dormakaba has opened its first Innovation Lab at its German headquarters in Ennepetal. The new innovation centre provides a creative environment for employees, where new ideas are brought to life through real-world application scenarios, practical tests, and interdisciplinary collaboration. It is part of a strategic investment in innovation and the long-term development of the site. Concrete products and innovations "With the Innovation Lab, we are creating a lively, creative space where market and technology expertise come together," says Magin Guardiola, Chief Innovation Officer at dormakaba. "It's not just about visionary concepts – the lab also serves to develop concrete products and innovations based on real-world application scenarios. A key goal is co-creation with our customers: close collaboration results in practical solutions that create real added value. Setting up innovation centres like this is an integral part of our global innovation strategy.” dormakaba's key areas of application The installations are regularly updated and are based on the firm's current product development The work in the Innovation Lab is based on lean startup principles, with rapid feedback, continuous improvement, and agile iteration being key elements. The installations are regularly updated and are based on the company's current product development and innovation plans. The Innovation Lab comprises modular installations that reflect dormakaba's key areas of application, including private homes, critical infrastructures, and hotels and restaurants. The focus is on innovative access solutions, rather than individual products, often in combination with existing offerings. Artificial intelligence in the access area The technologies currently on display include artificial intelligence in the access area and intelligent security gates, mobile access solutions, and cloud-based access control. The Innovation Lab in Ennepetal is the first of its kind within the dormakaba Group. Further labs are already planned at key locations. The initiative is part of the company's strategy to expand its global innovation network, promote cross-functional exchange, and accelerate the development of future-proof access solutions.

Access control applications

Secure access with ASSA ABLOY ARX and Sharry integration
Secure access with ASSA ABLOY ARX and Sharry integration

Seamless ASSA ABLOY digital access is now part of the Sharry workplace experience. By connecting Sharry with ASSA ABLOY’s ARX access control solution, businesses can administer secure employee access via mobile credentials as well as visitor management, all from a single unified platform, helping to save time and costs. This new integration combines ASSA ABLOY’s digital access expertise with the convenient functionality of a Sharry workplace platform. It allows administrators to control access permissions, streamline credential management and simplify guest registration directly within Sharry's ecosystem. With Sharry and ARX, customers now have a choice of mobile credentials, supporting Wallet, NFC and BLE unlocking. Integration with the Sharry workplace platform “It is exciting that we can expand our ARX solution via integration with Sharry workplace experience platform to make day-to-day life easier for our customers,” says Matti Kuismin, VP & Head of Product Unit EAC at ASSA ABLOY Opening Solutions EMEIA. “The ARX security solution is an open platform and easy to integrate. Through integration with Sharry as a mobile-first technology, we enable easy-to-use mobile keys within Wallet – and do that with the highest security standards.” “We have already deployed the integrated solution with a customer in Scandinavia. Their employees now access their offices with the tap of a phone or smartwatch, thanks to the use of HID mobile credentials, both app- and Wallet-based.” Enhance security with integrated access management Integration with Sharry now enables skills and security chiefs to combine access and visitor management Developed from decades of access expertise and experience, ASSA ABLOY ARX combines digital access with alarm functionality, and is available for both Offline and Online (real-time) management. ARX is built on an open platform model, to connect seamlessly with a broad range of complementary business systems and software. The integration with Sharry now enables facilities and security managers to combine access and visitor management within a single solution. Sharry streamlines the process of employee onboarding (and offboarding), which is now integrated with access permission management, including the easy distribution of mobile credentials. It simplifies visitor management, saving staff time, and provides workplace analytics with a genuine ROI. ARX’s robust security infrastructure “We’re excited to expand our access control ecosystem with ASSA ABLOY ARX, a proven and trusted security solution,” says Karel Hudínek, Head of Technology Partnerships at Sharry. “This integration brings seamless credential management, automated access assignments, and an enhanced user experience to enterprises and property managers." "By combining ARX’s robust security infrastructure with Sharry’s mobile-first technology, we enable a smarter, more efficient approach to access management – one that simplifies operations while maintaining the highest security standards.” The Sharry/ARX integration is now available to all ASSA ABLOY customers in the Scandinavia region.

Motorola enhances safety for Northwell Health Network
Motorola enhances safety for Northwell Health Network

Motorola Solutions announced that Northwell Health, New York’s largest healthcare system, is expanding the deployment of safety and security technologies across its growing network. Northwell Health relies on Motorola Solutions’ AI-powered video security and analytics, two-way radio communications, mass notification and panic button technologies to help detect, analyse and manage threats. This integrated solution supports the distinct security needs of healthcare settings, which range from protecting staff and vulnerable patients to prioritising patient care during fast-paced and often high-stakes health emergencies. New installations “Managing security across a growing health network can be complex,” said Mark Swensen, Senior Manager of Operations, Security, Safety and Emergency Management, Northwell Health. He adds, “Investing in a security system where the technologies work together simplifies scaling new installations when hospitals and clinics join our network. We can add more security cameras or expand radio use across multiple sites without the challenges that can arise when security systems don’t easily connect.” Integration between video and radio systems The health system is broadening its use of AI-powered Avigilon security cameras with analytics This security expansion builds upon Northwell Health’s well-established safety and crisis management framework that supports its fast-growing healthcare network, which now encompasses nearly 30 hospitals and over 1,000 care locations. The health system is broadening its use of AI-powered Avigilon security cameras with analytics that can identify unusual activity or potential threats and alert security personnel and clinical personnel via two-way radios and other types of push-to-talk devices. This real-time integration between video and radio systems helps to improve both security and operational responsiveness. Use of a scalable digital communication network The hospital is also expanding its use of a scalable digital communication network that is designed to share voice and data across the variety of devices that different hospital staff rely on, including two-way radios and smart phones, to help ensure security teams, medical staff and administrators can connect at a moment's notice. “Northwell Health is creating a more secure work environment where doctors, nurses and clinical teams can focus on what they do best: taking care of patients,” said Scott Schoepel, Vice President, Video Security & Access Control, Motorola Solutions. He adds, “They're setting the standard for security and safety in healthcare. We're proud to provide solutions that blend seamlessly into their routines, offering peace of mind in feeling safe and protected so they can focus on caring for people who need them most.”

SightLogix enhances airport perimeter security in Florida
SightLogix enhances airport perimeter security in Florida

SightLogix, a pioneer in AI-powered thermal security for critical infrastructure environments, has announced that an undisclosed South Florida airport has completed a lifecycle refresh of SightSensor cameras, the core component of the airport’s advanced perimeter security infrastructure. The perimeter surveillance system from SightLogix leverages advanced thermal cameras with edged-based artificial intelligence capabilities to validate threats, minimising false alarms by over 90% and reducing monitoring resources, increasing operational efficiency. Durability of the SightSensor camera The durability of the SightSensor camera provides clients with a reliable and wide approach Cutting-edge SightSensors can detect intrusions at long distances, in complete darkness, and without false alarms—even in challenging Florida environmental conditions including heavy rain and extreme heat and humidity.  The durability of the SightSensor camera provides customers with a reliable and comprehensive approach for intelligent airport perimeter monitoring. AI-driven thermal cameras “The SightLogix solution automates surveillance of the entire perimeter at the airport,” noted Dan Flynn, President of SRI, the system integrator. “The AI-driven thermal cameras provide consistent performance regardless of lighting or weather conditions, which is crucial for airport security, and the system integrates into the existing access control system to leverage previous investments.”

Regula devices enhance Ecuador's border security
Regula devices enhance Ecuador's border security

Ecuador’s border control authorities have significantly enhanced their identity verification capabilities by deploying a suite of advanced document examination devices from Regula. The nationwide upgrade, supported by the International Organisation for Migration (IOM) and local partner INSETK, brings automation, precision, and speed to the country’s border checkpoints, which collectively process nearly 1.5 million travellers annually. Regula’s advanced forensic devices The project is a major step in Ecuador’s mission to modernise all land, air, and maritime entry points The project is a major step in Ecuador’s mission to modernise all land, air, and maritime entry points, including key international airports in Quito and Guayaquil, as well as northern and southern border crossings. These strategic locations now benefit from Regula’s advanced forensic devices, which enable fast and reliable detection of fraudulent documents—critical in the fight against identity-related crime. Closing the gap with a set of forensic devices Previously, document checks at Ecuador border crossings were largely manual and supported by outdated equipment, often handled by just two officers per site. This made the process slow, error-prone, and vulnerable to sophisticated fraud. To address this, Ecuador’s border checkpoints were equipped with the following Regula solutions: Regula 4308 at Quito International Airport: Ideal for high-traffic airports, this dual-video spectral comparator supports the full spectrum of light sources and optical filters. It also offers high-quality image capture capabilities thanks to its up to 320x optical zoom and up to 140,000 ppi resolution. As a result, border officers can thoroughly inspect all of the ID security features, including printing techniques, holograms, optically variable inks, and more. Regula 4306 at Guayaquil International Airport and major land borders: A space-saving device with an 8 MP high-resolution camera and over 40 LED light sources for analysing document authenticity, just like its counterpart, the Regula 4308. Regula 4205D at frontline checkpoints: A multi-functional device tailored for primary control zones. It includes 12 light sources, automated cross-checks, and up to 30x on-screen magnification for thorough document authentication. Regula 8333M at mobile checkpoints: Designed for remote or non-standard border control situations, such as processing charter flights or cruise ship passengers, this compact mobile document reader ensures that ID checks remain reliable and consistent outside traditional migration offices. Regula’s Information Reference System Regula’s video spectral comparators are controlled via Regula Forensic Studio (RFS), a cross-platform software solution for advanced document checks. It enables precise measurements, image comparison, report generation, and scripted workflows for faster, consistent inspections. With RFS, officers can also verify MRZs, RFID chips, barcodes, and IPI—all without extra tools. For deeper document examination, border control officers have real-time access to Regula’s Information Reference System (IRS), which provides synchronised reference images and lighting presets for fast, precise comparison of travel documents. Data cross-verification and robust authenticity checks RFS also integrates with Regula Document Reader SDK to automate travel document verification RFS also integrates with Regula Document Reader SDK to automate travel document verification and prevent fraud through data cross-verification and robust authenticity checks. Importantly, Regula’s software is backed by its proprietary identity document template database—the world’s largest—featuring over 15,000 templates from 252 countries and territories, ensuring reliable validation at border checkpoints. Trusted results, faster than ever Since implementing Regula’s solutions, Ecuadorian border control authorities have noticed notable improvements: Document authentication now takes minutes instead of hours. Detection of forged documents has significantly increased. Automation reduces human error and increases operational efficiency. Officers have more time to focus on complex cases and decision-making. Technology upgrade and fraud detection “Apart from the technology upgrade and fraud detection improvement at the border crossings, our collaboration with Regula demonstrated another success." "The project was fulfilled very smoothly. From the beginning, we’ve received full support from Regula’s team—they were always ready to help with any issue, even those caused by users on the ground. It’s definitely a level of service that makes a real difference,” says Diego Calderon, Chief Executive Officer at INSETK. How technology can turn critical inspection tasks “Border security is where precision, speed, and trust must converge. We're proud to support Ecuador in modernising its checkpoints with tools that meet forensic standards while being easy to use in the field." "This project shows how technology can turn critical inspection tasks from time-consuming to streamlined, without compromising security,” comments Arif Mamedov, CEO at Regula Forensics, Inc.