Mobile Access Trends

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

What are the most promising new technologies in security?
What are the most promising new technologies in security?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?   

2025 Access Control Solutions: Key trends & Innovations
2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations.  Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities.  2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.

Latest Access control news

RAD revolutionises security with AI-driven robotics
RAD revolutionises security with AI-driven robotics

Artificial Intelligence Technology Solutions, Inc., announced that its CEO/CTO and founder, Steve Reinharz, has issued an op-ed to Reuters responding to recent coverage of public concerns around artificial intelligence and job displacement. In the piece, titled “AI Isn’t the Enemy. Standing Still Is.”, Reinharz challenges both business pioneers and consumers to reject fear and instead move decisively to embrace the opportunities that AI acceleration presents. Technology’s rapid rise Reinharz counters that while the concern is understandable, standing still is the greater danger A Reuters/Ipsos poll recently revealed that 71 percent of Americans fear AI will permanently displace jobs, reflecting a wave of uncertainty about the technology’s rapid rise. Reinharz counters that while the concern is understandable, standing still is the greater danger. He argues that success in this era will belong to those who adapt quickly, embrace intelligent tools, and build confidence in AI’s ability to amplify human potential rather than replace it. Use AI to build smarter “Fear is natural, but fear cannot be the strategy,” said Reinharz. “In every great transformation there are winners and losers. Winners in this new era will be the ones who act with purpose, learn faster than the competition, and use AI to build smarter, stronger organisations. Those waiting on the sidelines will simply be left behind.” Reinharz is no stranger to tackling the future of work and the challenges of automation. He previously authored ‘Navigating the New Economy: Jobs & Automation, Challenges & Opportunities’, a comprehensive look at how industries and workers can adapt to automation, and most recently, the ‘AIR (Autonomous Intelligent Response) Manifesto’, which explores how AI-driven systems will redefine security and beyond. These works underscore his commitment to preparing businesses and society for the accelerating changes ahead. Intelligent automation to scale and innovate Reinharz points out that AI is not just another technology upgrade, but a change on par with electricity Reinharz points out that AI is not just another technology upgrade, but a transformation on par with electricity, the internet, and smartphones. The difference, he emphasises, is the speed. What once took decades to reshape industries is now happening in months. For individuals, this means skills and adaptability matter more than titles. For businesses, the choice is even starker: embrace intelligent automation to scale and innovate, or risk falling permanently behind competitors who do. Future already unfolding Reinharz concludes that the real threat is not artificial intelligence itself but the failure to act. He urges businesses, investors, and consumers alike to recognise that the future is already unfolding, and the only way to benefit is to participate. “The future does not wait for permission,” Reinharz added. “AI is already shaping our world. The question is whether we will shape it with intention or allow it to shape us.” Stationary and mobile robotic solutions RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house.  Completion of its SOC 2 Type 2 audit The Company’s operations and internal controls have been validated through the successful completion of its SOC 2 Type 2 audit, reinforcing the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients, generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.

Blackline Safety expands Middle East presence with ADNOC
Blackline Safety expands Middle East presence with ADNOC

Blackline Safety Corp., a pioneer in connected safety technology, announced that the Abu Dhabi National Oil Company (ADNOC), one of the world’s pioneering energy producers, has placed its first purchase order under a multi-year agreement for up to 28,000 Blackline devices plus services. The order was secured through Blackline’s channel partner, Al Masaood. The initial order includes approximately 1,000 G6 wearable single-gas detectors with four years of service and 1,200 Blackline Location Beacons to enhance location signals inside ADNOC facilities. ADNOC’s commitment ADNOC generates over 4 million barrels of oil per day along with substantial volumes of natural gas ADNOC generates over 4 million barrels of oil per day along with substantial volumes of natural gas. This deployment marks a significant step in protecting frontline energy workers in the region with connected safety technology — reinforcing ADNOC’s commitment to operational excellence and workforce safety at scale. “This first order under the new agreement with ADNOC is an important milestone in our multi-year growth strategy in the Middle East,” said Andrea Lamond, Vice President, Growth Operations and Interim VP of International Sales, Blackline Safety. “Through our partnership with ADNOC and Al Masaood, we are investing in the region and delivering advanced connected worker technology that helps protect workers while improving operational efficiency.” Best-in-class safety features The award-winning G6 delivers a new standard in single-gas detection with long-lasting connectivity, best-in-class safety features, and an industry-pioneering service life. Blackline Location Beacons further enhance location accuracy, providing protection even in indoor It not only detects hazardous gas but can also provide precise real-time location data, enabling responders to reach workers quickly in the event of an emergency, when every second counts. Blackline Location Beacons further enhance location accuracy, providing protection even in indoor or GPS-challenged environments. Blackline Safety’s footprint Blackline Safety’s footprint in the Middle East has grown significantly over the past three years, with connected safety deployments across leading energy companies in the region. This latest long-term purchase agreement underscores the demand for Blackline’s connected safety ecosystem—combining wearable devices, cloud-hosted software, and 24/7 live monitoring—to help organisations safeguard workers in even the most challenging conditions.

Konica Minolta's innovative print security solutions
Konica Minolta's innovative print security solutions

The global market insight and research firm, which specialises in the convergence of print and digital technologies in the future workplace, recognises how Konica Minolta ‘retains a keen focus on enhancing print and endpoint security across three pillars – device-level resilience, managed security services, and workflow automation – aligned to support zero trust environments and evolving compliance demands'. AI-driven threats redefine print security priorities Published in July, Quocirca’s Print Security Landscape 2025 report includes an Industry Survey, which was conducted among 400 IT decision-makers involved in the print infrastructure in their organisations. Quocirca’s report highlights the growing culture of threats targeting corporate print infrastructure Quocirca’s report highlights the growing sophistication of threats targeting corporate print infrastructure, especially with the rise in use of AI-powered devices. It is therefore no surprise that 40% of respondents are concerned about the risks posed by AI, and 86% of respondents say it’s important for vendors to use AI and machine learning to detect potential security threats and cyber-attacks. Mixed and older fleets pose a major security risk A total of 56% of companies report a data security breach in connection with printing. Mixed printer fleets and older printing devices posed a major security risk. While the average cost of print-related data loss in companies operating printer fleets from multiple vendors was £937,000 (~ €1.082.000), it was £630,000 (~ €727,000) in companies with standardised fleets. Unlike modern MFPs, which are equipped with advanced security features, older ‘legacy’ print devices do not have robust embedded security features, making them more vulnerable. Integrating older devices into modern, centralised security management platforms is also often difficult or even impossible. Other risk factors Quocirca also found that there is a wide range of authentication methods and identifies this diverse Quocirca also found that there is a wide range of authentication methods and identifies this diverse and fragmented approach as a potential security vulnerability. Private printing environments are another major security vulnerability. A total of 53% of respondents stated that unauthorised persons had accessed documents in a private setting. While large companies (27%) cite lost IT time spent dealing with the problem as the biggest disadvantage of data loss, the biggest consequence for SMEs is the disruption to business continuity (28%). According to Quocirca, improving print security posture therefore ‘requires a multi-layered approach – prioritising standardised, secure print infrastructure, implementing robust identity and access management frameworks including mandatory authentication across all devices, and deploying solutions that prevent sensitive document printing in unsecured home environments.’ Multi-layered security approach Quocirca’s report acknowledges how Konica Minolta's 'multi-layered approach to security helps Quocirca’s report acknowledges how Konica Minolta's 'multi-layered approach to security helps businesses of all sizes reduce risk, ensure compliance, and future-proof their print infrastructure within broader information security strategies.' The report states, "Konica Minolta continues to invest across all areas of its security portfolio – recent examples include developments in authentication, secure firmware delivery, and the Konica Minolta Marketplace for cloud-based print and scan solutions." "Its commitment to ongoing investment in resources and development reinforces its long-term roadmap around secure digital transformation." Compliance with data protection regulations Quocirca considers Konica Minolta's multi-factor authentication support as a strength. ‘Embedded PKI support for smartcard (CAC/PIV) authentication and MFA support enables organisations to centrally manage authentication policies, enforce secure print release, and ensure compliance with data protection regulations – while providing a seamless, user-friendly experience across the print environment.’ Olaf Lorenz, Head of International Marketing Division, Konica Minolta Business Solutions Europe, stated, “Print security needs to be an intrinsic part of every organisation’s cybersecurity strategy. The good news is that this message is getting through and Konica Minolta is dedicated to expanding its range of workplace solutions, to help every organisation equip its employees to work productively and securely.”

Athena Security's iPad hospital VMS launch
Athena Security's iPad hospital VMS launch

Athena Security, a pioneer in AI-driven physical security solutions, has announced the launch of its new Hospital Visitor Management System (VMS) on the Apple iPad. Purpose-built to meet the critical needs of healthcare facilities. Athena’s Hospital VMS is the first Apple iPad solution in the industry to offer seamless offline capabilities—ensuring that hospitals stay operational and secure, even amidst internet interruptions due to down servers, power outages, or natural disasters. Cyberattacks on hospital systems Cyberattacks on hospital systems are increasing, and mitigation is critical Cyberattacks on hospital systems are increasing, and mitigation is critical. According to the American Hospital Association, the February 2024 cyber attack on Change Healthcare, “disrupted health care operations on an unprecedented national scale, endangering patients' access to care, disrupting critical clinical and eligibility operations, and threatening the solvency of the nation's provider network.” Five months later in July of 2024, over 750 U.S. hospitals experienced a network disruption as a result of the CrowdStrike outage, and more than 200 of those hospitals experienced outages that directly affected patients, according to a University of California, San Diego report published in the Journal of the American Medical Association Network. Unlike some industries, hospital outages can have life-threatening consequences–especially when a delay of hours, or even minutes, can increase mortality rates for stroke, heart attack and other patients seeking emergency care. Key features “Hospitals can’t afford downtime,” says Lisa Falzone, President and co-founder of Athena Security. “Our new VMS is designed on the Apple iPad to be always up and running, much like our last company’s solution, Revel’s iPad Point of Sale for restaurants, which changed the history of POS." "We stay up even during natural disasters, internet outages or cyberattacks. In a world where seconds matter, we’ve made resilience the default.” Key features of the new hospital visitor management system include: Always-On, Offline Mode: The system functions with or without internet—enabling check-in/check-out, badge printing, and visitor logging even during connectivity or server disruptions. Data syncs automatically once back online. End-to-End Security: From pre-registration to real-time watchlist screening, Athena’s VMS protects patients, staff, and visitors with client-server certificates for encrypted data handling and robust access control integration. The system works in tandem with Athena’s proprietary H-Sheild, a private, authenticated, and authoritative DNS platform that protects a healthcare organisation’s most critical digital assets, PHI, and PII information. H-Shield is an intelligent gatekeeper at the most fundamental point of network communication–Visitor Management. Customised Workflows: User experience workflows can be customised for each healthcare department: User experiences can be tailored for different visitor types—contractors, family members, vendors, or VIPs. Hospitals can build protocols that match their compliance needs and operational goals. Nationwide Predator Lists: The VMS protects against individuals listed on nationwide child predator lists and other perpetrator lists, so that hospitals are alerted upon entry, even when offline. Athena Security’s VMS integrates effortlessly with the hospital’s AI-powered Weapon Detection System, providing hospitals with a unified solution to manage both visitor access and physical threats in real time. Designed with healthcare in mind Hospitals are among the most complex and security-sensitive environments in the U.S. With workplace violence at an all-time high and increasing regulatory pressures, Athena’s new VMS system offers hospitals a vital tool to enhance safety without compromising efficiency or care delivery. “Whether it’s preventing unauthorised access, enabling faster emergency response, or ensuring compliance with visitor protocols, our new Hospital Visitor Management System is setting a new standard for healthcare security,” says Chris Ciabarra, co-founder and CTO of Athena Security.

Access control applications

Delta Scientific expands at American Family Field
Delta Scientific expands at American Family Field

This July, Delta Scientific expanded its partnership with American Family Field, home of the Milwaukee Brewers, delivering new levels of crowd protection for fans and staff alike. After deploying MP5000 portable barriers for perimeter safety, stadium officials turned to Delta again, this time for a flexible solution at tighter access points. The answer: the MP100, Delta Scientific’s newest portable barrier with M30/P3 crash rating, rapid setup, and custom Brewers decals. Whether protecting large entries or smaller choke points, Delta solutions help keep the focus on the game, not the risks. 

Hikvision enhances security at Jogja Museum
Hikvision enhances security at Jogja Museum

When Jogja National Museum needed to protect priceless artworks while maintaining visitor accessibility, they turned to a smart security solution. This story reveals how this intelligent security system transformed their operations, reducing response times from hours to minutes, and enhancing protection of modern masterpieces by artists such as Affandi and Bagong Kussudiardja. Quest for wide artwork protection The institution houses an impressive collection that includes masterpieces by contemporary painters like Affandi Jogja National Museum stands as a guardian of Indonesia's artistic heritage, welcoming over 100,000 visitors each year to experience the country's rich cultural legacy. The institution houses an impressive collection that includes masterpieces by contemporary painters like Affandi, Abas Alibasyah, and Bagong Kussudiardja. But as the institution’s reputation grew, and visitor numbers increased, the museum team recognised the need for a more comprehensive approach to artwork protection. As custodians of Indonesia's artistic treasures, they recognised the need to enhance the security of their valuable collections while maintaining an enjoyable experience for visitors. Safeguarding the nation's identity "As museum caretakers, we're not just preserving artworks—we're safeguarding the nation's identity," explained Arka Njela Tevua Lestavi, the Marketing Manager at Jogja National Museum. “But the challenges are real: how do we ensure these pieces remain intact, meaningful, and accessible for future generations?” The museum team wanted to establish a system that could provide consistent monitoring throughout their galleries, particularly during busy periods and special exhibitions. The system should also help staff respond more effectively to various situations while maintaining the welcoming atmosphere that visitors expect. The goal was to create an environment where cultural preservation and visitor accessibility could coexist seamlessly. Deploying an AI-powered protection system Jogja National Museum partnered with Hikvision to create a protective network throughout the museum To address these needs, Jogja National Museum partnered with Hikvision to create a protective network throughout the museum's gallery spaces.  Four 4 MP ColorVu with Smart Hybrid Light Fixed Bullet Network Cameras (DS-2CD1047G2H-LIUF(2.8mm)) and four 2 MP Smart Hybrid Light Fixed Turret Network Cameras (DS-2CD1321G2-LIUF/SL(2.8mm)) have been strategically placed across the exhibition areas. These cameras provide continuous, high-quality color imaging even in challenging lighting conditions. With the Smart Hybrid Light technology, the cameras maintain infrared illumination at night when the museum is closed and lights are turned off, until an event triggers colour imaging to capture critical details. Built-in audio capabilities and alert systems The cameras also feature built-in audio capabilities and alert systems that allow security staff to provide guidance to visitors directly from the command centre if necessary. At the heart of the system is an AcuSeek NVR (DS-7616NI-Q2). This uses sophisticated algorithms to distinguish between normal movement and activities that require attention. It can, for example, identify when someone approaches restricted areas or lingers too close to artworks, while intelligently filtering out routine activities like cleaning. Hikvision’s Guanlan large-scale AI models AcuSeek NVR utilises massive parameter training and sample datasets to establish cross-modal Moreover, powered by Hikvision’s Guanlan large-scale AI models, the AcuSeek NVR utilises massive parameter training and sample datasets to establish cross-modal text-image comprehension capabilities.  Museum staff uses the smart search functions, such as Target Search and Intrusion Event Search, to streamline incident reviews and improve response times. Improved protection; faster response; better service The implementation has brought significant improvements to the museum's daily operations and long-term preservation goals. The most immediate benefit has been enhanced protection for the artwork collection. Staff can now respond quickly and appropriately to various situations, whether it's guiding visitors away from restricted areas or addressing concerns before they escalate. Ms. Lestavi noted, “We now have a peace of mind we never had before. This intelligent technology respects cultural values. For us, it’s not just a tool. It’s the new guardian of Indonesia’s legacy.” System's intelligent features Video review processes that previously required over an hour can now be completed in just a few minutes The system's intelligent features have dramatically improved operational efficiency. Video review processes that previously required over an hour can now be completed in just a few minutes using the AcuSeek smart search functions.  This time savings allows staff to focus more attention on visitor services and collection care rather than lengthy manual reviews. Another valuable feature has been the system's ability to assist with visitor services. When guests misplace personal items during busy exhibitions, the smart search capabilities enable staff to quickly locate lost belongings. How AIoT can revolutionise cultural preservation Not long ago, security staff has successfully recovered a visitor's camera during a crowded exhibition by rapidly reviewing footage to identify where the item was left behind. Building on this success, Jogja National Museum plans to extend the solution to a three-story complex hosting the prestigious annual "Artjog" festival. The museum's transformation showcases how AIoT (AI-powered Internet of Things) can revolutionise cultural preservation, proving that technology and heritage protection create a powerful partnership for safeguarding artistic legacies.

85°C enhances security with VIVOTEK VORTEX AI Cloud
85°C enhances security with VIVOTEK VORTEX AI Cloud

Founded in Taiwan, 85°C Bakery Cafe has rapidly expanded into an internationally recognised brand, known for its diverse baked goods and beverages. With over 80 locations across the United States, the company faced the complex challenge of managing security and operations at scale—especially with a lean IT team of just seven people. To keep operations running smoothly, they partnered with VIVOTEK, a global pioneer in security solutions, to deploy the AI-powered VORTEX Cloud Surveillance Platform, which enhances visibility, reliability, and operational efficiency across their retail operations. “Retail is not just about selling things. It’s about building trust and creating relationships.” — Ariel, IT Director, 85°C Bakery Cafe Challenge Legacy surveillance systems can’t keep up with expansion  Growth outpaces surveillance: As 85°C expanded rapidly across the U.S., their existing surveillance systems struggled to keep pace, resulting in operational challenges. In retail, fast incident resolution is crucial to customer satisfaction. At 85°C Bakery Cafe, their legacy surveillance system became a bottleneck, leading to increased costs, time delays, and operational risks.  Unstable legacy systems: NVR failures occurred monthly, taking upward of 25 days to repair, with a cost impact of around $2,000 annually for replacements.  Fragmented management: Lack of centralised access made it difficult to monitor, retrieve, or share video footage. Limited support: With only a seven-member IT team, managing all systems across multiple stores and scaling was challenging. Solution Built for retail efficiency: Faster setup & deployment and centralised cloud control  To overcome these challenges, 85°C Bakery Cafe implemented VORTEX by VIVOTEK, an AI-powered cloud surveillance solution designed for retail efficiency. For a small IT team managing dozens of busy stores, simplifying setup, streamlining operations, and supporting growth without overhauling infrastructure were critical. Hybrid compatibility: VORTEX unifies over 200 legacy cameras and 150 cloud cameras onto one platform without extra replacement costs.  Centralised management: It enables remote access control, receives instant alerts, searches the video footage in seconds with AI technology, and simplifies incident handling. Rapid deployment: Plug-and-play setup cuts deployment time by 50%, keeping store launches efficient and streamlined.  “Setting up in each location used to take us two to three days… With VORTEX plug-and-play, we’re done in just one day.” — Jason Chow, Tech Support Manager, 85°C Bakery Cafe. Results Smoother operations and better customer experience  For 85°C Bakery Cafe, VORTEX made physical security operations more proactive by improving response times, reducing disruptions, and giving staff the tools to stay focused on customers, not equipment. The plug-and-play setup cut installation time by up to 50%, while cloud-based management reduced site visits and operational costs. These improvements not only lightened the technical workload and streamlined daily operations but also strengthened customer trust with faster service and reliable incident resolution. "With Deep Search, we can find people or items in seconds. If a customer loses something, we trace it and recover it quickly."— Nolan Carter, Facilities Manager, 85°C Bakery Cafe. "VORTEX helps us prevent disputes and track items that go missing. It keeps the entire store running smoothly. When stores run better, customers stay longer and they come back more often."— Ariel, IT Director, 85°C Bakery Cafe.

Hikvision tech transforms Indonesian fishing port
Hikvision tech transforms Indonesian fishing port

Nizam Zachman Port, one of Indonesia's most important fishing hubs, supports thousands of local fishermen and maritime businesses. Recognizing the potential to enhance operations and better serve the community, the port management deployed Hikvision’s AIoT (AI-powered Internet of Things) technologies to make the port smarter and more efficient. Standard AIS signalling Port management identified several key areas where they believed technology could make a significant difference Every day, Nizam Zachman Port handles huge volumes of fish destined for both the Indonesian domestic market and for export around the world. Such an operation relies heavily on technologies that can make the port safer, more efficient, and more secure. Recently, the port management identified several key areas where they believed technology could make a significant difference. The first was to develop comprehensive capabilities to identify ships entering their waters, including unregistered fishing boats that don't use standard Automatic Identification System (AIS) signalling. They wished to adopt a unified detection approach that would operate effectively in all weather conditions, from foggy mornings to dark nights. Traditional communication methods The management team also recognised the value of upgrading their ship-counting and reporting systems. While their experienced staff performed excellent manual counting, management knew that combining human expertise with automated technology could deliver even more accurate records. This would be particularly valuable during busy periods, and when ships arrive at night and depart before dawn. Another area for improvement was communication. Here, the management team wanted to replace traditional communication methods with a modern audio system for efficient message delivery across the harbour. Innovative technologies for a smarter port To put their plans into action, Nizam Zachman Port partnered with PT. Dea Global Niaga, who designed a comprehensive system that perfectly matched the port's ambitious goals. Ship detection and identification: At the heart of the new system is an Anti-corrosion Thermal & Optical Bi-spectrum Network Positioning System (DS-2TD6267-100C4L/WY). This specialised camera uses thermal imaging to detect heat signatures from ship engines and hulls up to 2 km away and works equally well in fog, rain, or darkness. The casing meets the NEMA-4X anti-corrosion standard, ensuring durability in the salty sea environment. The camera is complemented by a Security Radar (DS-TDSB0W-FK/2km). At any point in time, this can identify and track the movement of up to 32 vessels in the harbour, providing detailed speed and distance information. When the radar detects movement, it automatically directs the camera system for seamless coordination. Enhancing perimeter security: To enhance perimeter security, two DarkFighter IR Network Speed Domes (DS-2DE5425IW-AE(T5)) have been installed. These cameras, with their Pan-Tilt-Zoom (PTZ) functionality, offer flexible movement and orientation. They come equipped with a 25x optical zoom, enabling them to provide detailed views of the port’s perimeter, ensuring that any incidents are quickly identified, even in low-light conditions. Improving communications across the port: For communication, seven Network Speakers (DS-QAZ1310G1T-E) have been installed across the port. These speakers allow the command centre to broadcast announcements and alerts much more efficiently than before. Centralized intelligence: Everything connects through Hikvision’s 64-Channel 8K Network Video Recorder (DS-9664NI-M16/R), to the HikCentral Professional Platform. This video management platform serves as the system’s brain, automatically counting ships, analysing patterns, and generating comprehensive reports that provide valuable insights into port traffic. Enhanced efficiency, accuracy, and community safety According to Mr. Al Fajar Alam, a Port Master at Nizam Zachman Port, the results have been remarkable. “The capability to maintain high performance in all-weather ensures that no ship goes undetected,” he said. The automated ship counting system delivers accurate information that improves everything from fee collection to capacity planning. As a result, port operations became significantly more efficient, with automated systems handling routine monitoring while staff focus on higher-value activities. Benefit from enhanced security and smoother processes For the broader fishing community, these advances mean a safer, more organised port experience “Communication has also been improved dramatically,” Mr. Alam added, “Port staff can now deliver clear messages instantly throughout the harbour. Emergency announcements, docking instructions, and routine communications now flow smoothly through the IP speaker system.” For the broader fishing community, these improvements mean a safer, more organised port experience. Fishing operations benefit from enhanced security and smoother processes, while the entire local maritime economy gains from having a truly modern facility. Maritime tradition meets AIoT The transformation showcases what's possible when maritime tradition meets AIoT. Nizam Zachman Port hasn't just upgraded technology–they've reimagined how a fishing port operates in the modern era. As other ports across Indonesia seek modernisation, this project stands as an inspiring example of how AIoT can enhance community-focused maritime facilities while preparing them for future growth.