Mobile Access Trends

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

What are the most promising new technologies in security?
What are the most promising new technologies in security?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?   

2025 Access Control Solutions: Key trends & Innovations
2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations.  Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities.  2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.

Latest Access control news

AI-Powered FireMon Insights boosts security operations
AI-Powered FireMon Insights boosts security operations

FireMon, the major network security and firewall policy management company, releases powerful new findings from its AI-powered analytics platform, FireMon Insights: 60% of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34% falling short at critical levels. These aren’t just technical oversights; they’re signs of deeper governance issues that can lead to audit failures, operational downtime, and increased exposure to threats. FireMon Insights Across on-premises, cloud, and hybrid environments, FireMon found misconfigurations, outdated rules, and bloated policies that bog down performance and leave security teams struggling to keep up. FireMon Insights was built to change that. It gives organisations a clear picture of their firewall risk, compares them to industry peers, and shows exactly where and how to fix what’s broken. It’s about helping teams see the problem, understand the impact, and move faster with fewer surprises. These findings were collected anonymously from FireMon Insights deployments across new customers in large enterprises and regulated industries. And the data is striking: 60% of firewalls fail high-severity compliance checks; 34% fail at critical severity. 95% of application objects and 82% of service objects show zero usage, creating unnecessary overhead and expanding the attack surface. 30% of firewall rules are completely unused; 62.6% lack any owner or documentation, introducing audit gaps and operational blind spots. More than 10% of rules are redundant or shadowed, reducing performance and masking dangerous misconfigurations. Policy management “Organisations have been trying to untangle firewall complexity for years, but too often the tools fall short, either offering static snapshots or failing to provide the operational context that teams actually need,” said Mark Miller, CRO at EncoreCyber. “That’s why platforms like FireMon Insights matter. They offer a level of clarity and benchmarking that helps teams move from reactive fixes to informed, proactive decisions. FireMon has long been a trusted name in policy management, and it’s good to see them pushing the industry forward in this space.” Threat to resilience and trust “Firewall complexity isn’t just a configuration issue, it’s a threat to resilience and trust,” said Jody Brazil, CEO and founder at FireMon. “Security teams are buried under policies they can’t explain, map to business objectives, or manage at scale. FireMon Insights cuts through the noise. It benchmarks your performance, exposing what’s been missed, and helping you take action before it turns into disruption.” AI-powered analytics platform FireMon provides always-on visibility across hybrid, multi-vendor infrastructures These findings surfaced through FireMon Insights, a next-generation AI-powered analytics platform that continuously benchmarks firewall environments, tracks compliance KPIs, and identifies misconfigurations in real time. Unlike legacy approaches that rely on static scans and siloed views, FireMon provides always-on visibility across hybrid, multi-vendor infrastructures, enabling security and IT teams to move from reactive cleanup to proactive governance. FireMon Insights stands apart from traditional tools by delivering always-on visibility across multi-vendor, hybrid environments, no waiting on scans or outdated dashboards. New enhancements With new enhancements to FireMon Insights, users get: Device-Level Metrics grouped by Complexity, Risk, and Environment for deeper context. Tighter integration with FireMon Policy Manager for seamless analysis and remediation. AI-powered natural language search and chatbot, so teams can surface insights fast—no training required. Expanded peer benchmarking to help leaders understand where they stand in the industry. And unlike other vendors, FireMon provides these capabilities at no additional cost to existing customers. Go-to analytics platform “Since its initial launch in January 2025, FireMon Insights has quickly become the go-to analytics platform for our customers’ security teams,” said Brandy Peterson, CTO of Cloud Security Operations. “What’s been most exciting is the engagement—early adopters across roles are having real ‘aha’ moments, and their feedback directly shaped this release.” Network security teams FireMon Insights helps teams shift from reactive ticket-crunching to strategic execution Network security teams are expected to move fast—but speed without direction leads to missed priorities and unmanaged risk. FireMon Insights helps teams shift from reactive ticket-crunching to strategic execution by providing clear visibility into policy health, peer benchmarks, and baseline controls. It enables network security operations to measure progress against business-aligned goals, course correct where needed, and build a sustainable plan that reduces risk while supporting the pace of the organisation. Cybersecurity industry “Collectively, the cybersecurity industry has been driving organisations to a point of sophistication that actually distracts their cyber strategy from implementing required capabilities and measuring operational outcomes,” said Dan Rheault, Director of Product Management at FireMon. “Teams are turning to FireMon for a smarter, more sustainable path forward.” Strong momentum for FireMon “Most tools only tell you what happened,” said Rich Mogull, SVP of Cloud Security at FireMon. “Insights tells you what’s happening now and more importantly, what to do next. It’s not about more alerts. It’s about clarity and action, at scale.” The Insights 1.5 launch follows strong momentum for FireMon this year. The company was recently named a CRN Tech Innovator finalist for FireMon Insights, recognised for redefining how teams approach policy risk. FireMon also appointed Alex Bender as Chief Marketing Officer to drive global expansion and brought on four veteran sales pioneers from the former Skybox Security, doubling down on execution as demand grows.

Siren integrates Flashpoint for enhanced investigations
Siren integrates Flashpoint for enhanced investigations

Siren, the all-in-one investigation company, and Flashpoint, the pioneer in threat data and intelligence, announced a strategic partnership to deliver a unified environment to streamline end-to-end investigations, surface hidden connections, and drive timely, intelligence-led decisions for security and intelligence teams. As geopolitical tensions rise, and hybrid threats, combining cyber, physical, and informational tactics, impact both private and public sectors, organisations face increasing challenges from sophisticated adversaries. This partnership brings together two industry pioneers to meet that challenge head-on. By integrating Flashpoint’s exclusive, human-augmented threat intelligence directly into Siren’s advanced investigative platform, teams gain the ability to detect, investigate, and respond to complex risks faster and with greater confidence. Primary-source data Flashpoint’s curated, primary-source data provides unique depth and context Flashpoint’s curated, primary-source data provides unique depth and context, empowering investigators to initiate new inquiries and solve cases by uncovering hidden connections. Siren’s open architecture allows this intelligence to be combined with a broad range of OSINT and internal data sources, including social media, law enforcement records, cyber threat feeds, and blockchain analytics. The integrated solution offers a flexible, unified environment tailored to each organisation’s needs, supporting various applications including public safety, fraud prevention, anti-money laundering, and cryptocurrency crime. Financial cyber threats This collaboration is especially timely as financial cyber threats and blockchain-related risks continue to escalate, as it delivers actionable insights to protect assets and maintain trust in an increasingly digital economy. “By embedding Flashpoint’s uniquely curated, human-augmented intelligence into Siren’s workflows, we’re delivering an end-to-end solution that accelerates investigations and generates actionable insights with unmatched speed and precision,” said Rachel Kavanagh, CMO of Siren. "In a world of increasingly sophisticated and converging threats, the ability to access and action comprehensive intelligence is paramount," stated Andrew Borene, Flashpoint Executive Director for International Markets and Global Security. "This integration delivers on that need. Combining Flashpoint’s unmatched collections with Siren’s investigative power gives multinational organisations a more actionable view of their risk landscape.” OSINT market The OSINT market is rapidly growing, valued at $13.5 billion in 2023 and projected to reach $43.3 billion by 2033, driven by demand for real-time, cross-domain intelligence. This partnership addresses that demand by offering: A unified end-to-end investigation experience - One interface to analyse Flashpoint collections alongside Publicly and Commercially Available Information (PAI and CAI), social media, law enforcement data, cyber threat intelligence, blockchain analytics, geospatial sources, and more. Faster time to insight - Integrated link analysis, relational search, and advanced visualation tools surface critical connections in seconds. Trusted, primary-source intelligence - Flashpoint’s global collections—enriched by human experts and AI—bring unmatched depth and relevance to every investigation. Siren and Flashpoint provide a comprehensive, scalable solution that equips intelligence teams to understand, anticipate, and respond to emerging threats with confidence, regardless of how complex or fast-moving the geopolitical environment may be.

CyberSafe acquired by SecurityBridge for SAP security
CyberSafe acquired by SecurityBridge for SAP security

SecurityBridge, the creator of the Cybersecurity Command Centre for SAP, announced the acquisition of CyberSafe, a UK-based pioneer in multi-factor authentication (MFA) and single sign-on (SSO) solutions for SAP users. The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication to multi-factor authentication across the SAP technology stack, with full insight into the SAP application layer. MFA across all SAP workflows “SAP’s native security lacks the depth today’s threat landscape demands,” said Christoph Nagy, CEO and Co-founder of SecurityBridge. “This acquisition reinforces our mission to ensure no SAP system or customer is ever compromised. By integrating TrustBroker with our platform, we enable customers to apply passwordless MFA across all SAP workflows, without compromising usability. However, customers can still use TrustBroker products standalone.” CyberSafe deep authentication capabilities CyberSafe brings deep authentication capabilities and a proven track record in enterprise-class identity protection With a growing global customer base spanning all industry segments and over three decades of cybersecurity expertise, CyberSafe brings deep authentication capabilities and a proven track record in enterprise-class identity protection. The TrustBroker products offer secure single sign-on (SSO), policy-based MFA during login, and step-up authentication (SUA), utilising leading MFA applications, such as Microsoft Entra MFA (formerly Azure MFA), Okta, PingID, Duo, RSA SecurID, and TOTP/HOTP apps. Once integrated with SecurityBridge, TrustBroker products will act upon real-time threat signals, such as anomalous logon behaviour, suspicious devices, and past user activity, to determine when MFA enforcement is necessary, thereby adding contextual intelligence to SAP user authentication. Integration with the SecurityBridge platform “For over three decades, CyberSafe has been at the forefront of integrating SAP user authentication with existing infrastructure, such as Microsoft Active Directory,” said Tim Alsop, Managing Director of CyberSafe. “Joining forces with SecurityBridge facilitates building new products and enhancing existing products while leveraging the growing adoption of modern authentication methods. I am also looking forward to being able to deliver integration with the SecurityBridge platform, so that our TrustBroker products can offer contextual and risk-based MFA.” Enforcement policies with MFA The combined platform offering behaviour-based enforcement policies with MFA takes SAP security to a new level by: Automatically enforcing MFA when users return after long periods of inactivity (e.g., 90+ days). Prompting MFA for logins outside of a user’s standard working hours. Enforcing MFA when logins originate from devices not previously associated with the user. Requiring additional authentication for users with past suspicious behaviour or flagged activity. Triggering MFA when access occurs from devices used by multiple individuals. These context-aware measures will seamlessly adapt authentication requirements to each situation, reducing user friction during normal activity while strengthening protection against abnormal or high-risk access attempts.

Zimperium unveils SarangTrap malware threat
Zimperium unveils SarangTrap malware threat

Zimperium, the world pioneer in mobile security, announced that its zLabs threat research team has uncovered a highly coordinated and emotionally manipulative malware campaign that is targeting mobile users through fake dating and social networking apps. The campaign, identified as SarangTrap, has already leveraged over 250 malicious Android apps and more than 80 phishing domains, all designed to steal sensitive data while masquerading as trusted platforms. Legitimate dating services These apps, once installed, request access to contacts, images, and other sensitive data, all while presenting a slick, believable interface that mimics legitimate dating services. Victims have reported being lured in with emotionally charged interactions and exclusive “invitation codes,” only to later face extortion threats after their private information was silently exfiltrated. Malicious configuration profiles on iOS The campaign is active across both Android and iOS platforms, using deceptive installation methods “This is more than just a malware outbreak, it’s a digital weaponisation of trust and emotion,” said the zLabs research team. “Users seeking connection are being manipulated into granting access to some of their most personal data.” The campaign is active across both Android and iOS platforms, using deceptive installation methods such as malicious configuration profiles on iOS to gain access to contacts, photos, and device identifiers. Many of the phishing domains were even indexed by popular search engines, making them appear legitimate to unsuspecting users searching for dating or social apps. Zimperium strongly urges mobile users Be cautious of apps requiring unusual permissions or invitation codes Avoid downloading apps from unfamiliar links or unofficial app stores Regularly review device permissions and installed profiles Install on‑device mobile security solution to help detect and block malicious apps

Access control applications

Dahua tech transforms Campeche traffic management
Dahua tech transforms Campeche traffic management

The city of San Francisco de Campeche has taken a decisive step toward urban modernisation thanks to the implementation of an advanced smart traffic light solution from Dahua Technology. This pioneering project, the first of its kind in Latin America, has improved mobility, reduced traffic congestion, and provided greater road safety to thousands of citizens. The challenge With the sustained increase in vehicle traffic, citizens' daily mobility was severely impacted Campeche was facing a serious problem: its traffic light system with outdated technology suffered constant failures that caused traffic jams on main avenues and at critical intersections. With the sustained increase in vehicle traffic, citizens' daily mobility was severely impacted. The city urgently needed a transformation that would not only modernise its infrastructure but also prepare it for the challenges of 21st-century mobility. The solution: Smart traffic lights from Dahua Technology After a rigorous evaluation process that also included other suppliers, the Campeche authorities selected Dahua for its ability to offer a comprehensive, globally competitive solution based on advanced artificial intelligence algorithms. The implementation included: Dahua intelligent traffic controllers, which are capable of adjusting traffic light operation in real time. Specialized traffic cameras that monitor vehicle flow and detect congestion or incidents. Smart traffic light platform that centralises and automates traffic management throughout the city. The solution was deployed in phases, beginning with detailed mapping of critical intersections and an implementation plan that ensured a seamless transition. The project was actively assisted from planning to final delivery by Dahua's consulting, pre-sales, and delivery teams. The benefits: Mobility, improved safety, and greater efficiency The results have been significant: Streamlined urban traffic through the use of algorithms that enable proactive detection of traffic jams and the implementation of slow-entry and fast-exit strategies at problematic intersections. Increased road safety for drivers and pedestrians with continuous monitoring and real-time response capabilities. Reduction in travelling time by 27%, thus improving the quality of life of thousands of residents in the city. Centralized control and complete automation of the traffic light system, allowing for quick adjustments and solutions without the need for manual intervention. Positioning Campeche as the first city in Latin America to adopt this technology, setting a precedent for future smart cities. Dahua's modernise infrastructure "Dahua not only helped us modernise our infrastructure, but also offered us a solution that truly transforms mobility in Campeche," said Ricardo López Gomez, Head of Coordination of Strategy of Digital and Connectivity (CEDyC) at Campeche. "Today we can manage our traffic more efficiently and provide greater security for all our citizens," he added. Future prospects: More innovations on the way Following the success of this project, Campeche is already planning to expand its collaboration with Dahua. Upcoming projects include the implementation of video surveillance solutions and automated fare collection using NFC cards in the Ciudad del Carmen bus system. This commitment reaffirms the path toward smarter and more sustainable urban mobility throughout the country.

Port of Barcelona upgrades with Genetec Security Center
Port of Barcelona upgrades with Genetec Security Center

Genetec Inc., the pioneer in enterprise physical security software, announced that the Port of Barcelona has successfully implemented Genetec™ Security Center, significantly improving the port’s safety, efficiency, and operational capabilities. As one of the Mediterranean’s major logistics hubs, the Port of Barcelona has experienced continuous growth in recent years, leading to new operational and security challenges. In response, the Port Authority launched a modernisation initiative focused on transforming the port into a safer, smarter, and more sustainable environment. A unified approach to evolving security needs Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance While the port’s previous security system was effective, it lacked the flexibility and interoperability between devices made by different manufacturers required for current demands, hindering real-time decision-making – a critical factor when managing infrastructure of this scale. To overcome these limitations, the Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance, access control, intrusion detection, and other security technologies into a single interface. Port integrated advanced technologies Following a successful pilot using virtual servers, the port migrated its CCTV infrastructure – growing from 180 cameras to over 530, with plans to surpass 800 in the coming years. Alongside this expansion, the port integrated advanced technologies, including access control, intercom systems, video analytics, forensic tools, fire detection, and real-time occupancy analysis. Tangible results from day one Port operators can now manage all security systems through a single tool, streamlining workflows The deployment of Genetec Security Center has produced immediate results. Port operators can now manage all security systems through a single tool, streamlining workflows and significantly reducing response times to incidents. Additionally, maintenance and operational efficiency have improved across the board, contributing to significant cost savings. The system has proven especially valuable during high-traffic events like the America’s Cup and Nadal al Port, where it enhances crowd and vehicle management to ensure smooth and safe operations. How unified physical security can enhance not just safety? “The flexibility and scalability of Security Center have allowed us to centralise all our systems, reduce response times, and improve operations,” said Dídac Höflich, ICT Infrastructure Project Manager at the Port of Barcelona, adding “Genetec has provided us with a long-term solution that evolves with our needs, while also giving us peace of mind, knowing we are prepared for any challenge.” “Working with the Port of Barcelona demonstrates how unified physical security can enhance not just safety, but also efficiency and scalability for critical infrastructure,” said Jordi Charles Rodriguez, Account Executive at Genetec Inc., adding “We’re proud to support the Port Authority’s long-term vision and help lay the technological foundation for the port’s continued growth and innovation.”

HID pioneers NFC ticketing at Chester Racecourse
HID pioneers NFC ticketing at Chester Racecourse

HID, the pioneer in trusted identity solutions, announced that Chester Race Company, owner of the world’s oldest racecourse still in operation, has adopted Near Field Communication (NFC)-based ticketing technology – the first major sports venue in the UK to adopt an end-to-end solution provided by HID. Leveraging HID’s Event Management Platform (EMP) and Janam’s rugged XT3 handheld scanners, the organisation has revolutionised its guest admissions process, offering a seamless and efficient entry experience at Chester Racecourse. Oldest operational racecourse The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering Founded in 1539 during the reign of King Henry VIII, Chester Racecourse holds the Guinness World Record as the oldest operational racecourse. Operated by Chester Race Company, the venue welcomes over 200,000 guests annually to its 15-race season, including the renowned Boodles May Festival, which features the Chester Cup. The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering, hospitality, hotel and recruitment businesses. HID’s NFC ticketing technology “Admissions are our first touch point with our guests on a race day, so delivering an excellent customer experience is critical,” said Gareth Simpson, Head of Racecourse Operations at Chester Race Company. “By adopting HID’s NFC ticketing technology, we’ve transformed the entry process, offering guests the ease of smartphone-based tickets in their Apple or Google Wallets. It’s just like downloading a mobile boarding pass for an airline flight.” Chester Racecourse’s new system streamlines Chester Racecourse’s new system streamlines the ticketing process from purchase to entry Chester Racecourse’s new system streamlines the ticketing process from purchase to entry. Guests now receive encrypted e-tickets within seconds, downloadable directly to their smartphones, along with guidance about dress code, race program and directions. On race day, reminders appear on guests’ devices as they approach the venue, further enhancing convenience.  Key to the implementation is the purchase of 45 Janam XT3 rugged mobile computers which enable offline ticket validation for continuity of service. This is important as the racecourse is in a low-lying area in Chester where the mobile signal strength is poor. Upgrade its network infrastructure Preloaded ticket data on each device eliminates reliance on Wi-Fi connections, enabling swift and accurate access even during peak times. With a scan time of less than a second, the Janam XT3 units significantly reduce congestion and wait times and work well in poor light conditions. To support the NFC ticketing solution, Chester Race Company has made significant financial investments to upgrade its network infrastructure, deploying Wi-Fi 7 access points along with new routers, switches and robust 10-gigabit Ethernet connections to the Internet. Access control solution in real-time HID's EMP integrates with a ticket sales platform from SeatGeek, with a bespoke API recently written to integrate the two systems to enable ticket purchases to be updated automatically in the access control solution in real-time, thereby removing a cumbersome manual process adopted in the past.  “We’ve addressed all our entrance issues,” added Simpson. “From faster entry to real-time visibility of guest attendance, HID’s solution has been transformational.” Terms of enclosure and stands NFC-based system offers more benefits as Chester Racecourse knows exactly the number of people The NFC-based system offers additional benefits as Chester Racecourse knows exactly the number of people who have entered (out of the tickets sold) and where people are in terms of enclosure and stands. This helps it meet its compliance with capacity obligations, along with consideration for forthcoming legislation such as Martyn's Law. It also reduces ticket fraud by eliminating barcode sharing or resale opportunities by touts. Additional features within HID's EMP Looking ahead, Chester Race Company plans to expand NFC ticketing across its portfolio and explore additional features within HID’s EMP, such as accreditation management for staff and contractors, as well as loyalty program integration. “We’re the oldest racecourse in the world using pioneering-edge technology,” concluded Simpson. “HID’s solutions are enabling us to create modern, memorable experiences for our guests by streamlining admissions totally using a tool that everyone has in their pocket – a smartphone.”

Eagle Eye precision AI intrusion detection system
Eagle Eye precision AI intrusion detection system

Eagle Eye Networks, the pioneer in cloud video surveillance, introduced Eagle Eye Precision Person & Vehicle Detection. This AI-powered feature runs entirely in the cloud, and works on any connected camera, setting a new benchmark for highly accurate detection and alerting when intruders are present. Businesses can instantly deploy Eagle Eye Precision Person & Vehicle Detection on any camera connected to the global Eagle Eye platform with the push of a button–no new hardware or setup is required. Intrusion detection system “This advanced, AI-powered feature reduces crime by detecting people and vehicles with precision and immediately alerting the business owner, security team, or monitoring centre when intruders are detected,” said Dean Drako, CEO of Eagle Eye Networks. “Eagle Eye Precision Person & Vehicle Detection turns existing security cameras into an intrusion detection system–helping businesses respond faster, prevent incidents, and operate more efficiently, all without costly upgrades.”  Feature in the Eagle Eye cloud VMS Eagle Eye Precision Person & Vehicle Detection uses AI and multiple images to detect moving people and vehicles Eagle Eye Precision Person & Vehicle Detection uses AI and multiple images to detect moving people and vehicles with very high accuracy. Used primarily for remote or on-premise monitoring, its deep learning algorithms discern people and vehicles from other objects or activity (such as tree branches moving in the wind, shadows, or lights from vehicle movements) even in poor weather conditions and at long distances, significantly reducing expensive and time-consuming false positive alarms. Long-range accuracy and reliability Ideal for enterprise businesses, apartment complexes, warehouses, car dealerships, schools, and municipalities, Precision Person & Vehicle Detection easily scales across multiple locations. Eagle Eye customers such as Centurion Fire and Security, a security integration company based in Huddersfield, England, praise the long-range accuracy and reliability of the new feature. AI-based false alarm filtering systems Eagle Eye clients such as Centurion Fire and Security, a security integration firm based in Huddersfield "Eagle Eye's new Precision People & Vehicle Detection feature, which sends real-time alerts when people or vehicles are detected, is a game-changer for us and our customers. Unlike many AI-based false alarm filtering systems, Eagle Eye’s analytics have proven exceptionally sensitive and reliable—even detecting a person through a Heras fence 40 meters (130 feet) away." "Crucially, it doesn’t trigger on parked vehicles, which is a major problem with other providers. This level of accuracy is exactly what we need to support our users and our monitoring station effectively," said Nathan Smith, Director, Centurion Fire and Security Ltd. Additional benefits Improved Security – Empowers security professionals to focus on real threats by detecting only people and vehicles, enhancing intrusion detection and crime prevention Camera Compatibility – Works with existing cameras and Eagle Eye Cloud VMS infrastructure, requiring no additional hardware, specialty AI cameras or complicated setup Faster Response Time – Actionable, accurate alerts enable quicker decision-making and response to potential threats Cost Savings – Fewer false positive alarms reduce the workload on security personnel, lowering monitoring costs and improving efficiency Customer Satisfaction –Advanced AI-driven security increases customer satisfaction and engenders customer loyalty for resellers and professional monitoring centres Customizable Alerts – Users can set detection zones, schedules, and preferences for better control Automate additional security processes — Ability to trigger alarm monitoring applications such as Immix and Sentinel via webhook integration Integration with professional monitoring services — Seamlessly and instantly alert third-party monitoring provider. Development of Precision Person & Vehicle Detection "We were pleased to collaborate with Eagle Eye Networks in the development of Precision Person & Vehicle Detection,” said Steven Ballard, Managing Member, iNet Security and Surveillance. “Resellers can offer their business customers 24/7 AI-powered intrusion detection using the cameras they already have. It’s cloud-based, so there’s no need for extra hardware or complicated configurations. Eagle Eye’s Precision Person & Vehicle Detection delivers proactive protection that helps stop crime, not just record it."