Mobile Access Trends

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

Latest Access control news

Videx 6789 monitor: Advanced 2 wire video system
Videx 6789 monitor: Advanced 2 wire video system

Videx Security has introduced a new 7” handsfree video monitor that brings advanced functionality typically reserved for full IP systems to its popular 2 wire range.  The 6789 monitor, part of the 6700 series, is designed for use with the VX2300 system and 2 wire video kits, including the new ERA23V range. It combines a high-resolution capacitive touchscreen with tactile programmable buttons, offering intuitive control, remote connectivity, and smart integration features for residential, commercial and mixed-use applications. Videx CloudNected app As well as operating over the 2 wire bus, the 6789 includes built-in WiFi to enable remote access via the Videx CloudNected app. Users can receive calls, view entry panel cameras and unlock doors and gates from anywhere. The system also supports third-party CCTV integration via RTSP, and includes a web browser for remote management, event log access, and smart home control. Rob Sands, Technical Director at Videx, said: “The 6789 represents a major step forward in 2 wire video systems. It brings together the usability of a modern touchscreen monitor with features such as remote access, third-party integration and smart heating control – all in one unit. It’s an ideal solution for both new installations and retrofit upgrades.” Additional features Additional features include a thermostat and humidity sensor with programmable weekly schedules, smart intercommunication between monitors and the ability to adjust key settings via an internal web browser or IPure Wizard software. A desktop mount kit is also available for added installation flexibility. The 6789 is compatible with other monitors on the VX2300 system and can be used to upgrade existing installations where more advanced features are required.

Kong Inc. launches MCP innovations for AI security
Kong Inc. launches MCP innovations for AI security

Kong Inc., a major developer of cloud API and AI technologies, announced at API Summit 2025, new support to help enterprises adopt and scale MCP and agentic AI development. These innovations include new MCP gateway capabilities in AI Gateway, and MCP-enabled Konnect Developer Portal, designed to provide a unified and secure way to build, run, discover, and govern the MCP-based tools and applications powering today’s AI agents. The launch of these new solutions underscores Kong’s commitment to delivering the infrastructure and developer tools enterprises need to securely accelerate the adoption of AI coding assistants, AI workflows, and agentic AI. Tremendous opportunities for enterprises “Agentic AI offers tremendous opportunities for enterprises, but realising that potential requires the right infrastructure. While MCP has emerged as the backbone for agentic workflows, there are real challenges around security, reliability, and performance.” “With these new product features, we're proactively solving some of the most important infrastructure challenges inherent to the protocol, and helping organisations put advanced AI agents into production faster and more securely,” said Marco Palladino, CTO and Co-Founder, Kong Inc. MCP governance capabilities Kong’s MCP governance capabilities in AI Gateway include: Consistent MCP server autogeneration and protection: Automatically generate secure MCP servers from Kong-managed APIs to accelerate the time to market of smart and capable AI agents, improving developer productivity when building MCP-enabled workflows across the business. Centralised MCP authentication: Users can centrally secure all MCP servers in one place with Kong’s dedicated MCP OAuth 2.1 authentication plugin, validating tokens and applying consistent security policies across every server automatically, to unleash the new era of compliant and governed AI agents. Stronger MCP observability and governance: Capture data about MCP tools, workflows, and prompts, then analyse it in Kong Konnect dashboards for cost optimisation, performance monitoring, and improved governance. This – in addition to the existing LLM analytics capabilities – provides full visibility into all the agentic workflows that developers are building. Seamless, MCP-enabled access: Turn Konnect Developer Portals into MCP servers, enabling API discovery and access for AI coding assistants such as Cursor. AI Integration Composer: Discover, compose, and map intelligent API endpoints as tools for MCP servers; this marks the beginning of Kong’s entrance into AI-based integration. AI Integration Runner: Generate and run the code necessary for composed MCP tools, servers, and integrations – all with the security, reliability, and governance ensured by the Kong AI Gateway. Volcano Additionally, Kong is introducing Volcano, a new open-source software development kit (SDK) to simplify and accelerate the creation of MCP-powered AI agents. Volcano provides developers with a lightweight, secure framework for building, testing, and deploying agentic applications that integrate seamlessly with APIs, MCP servers, and other AI systems governed through Kong Konnect. “None of the existing frameworks for AI agent development have delivered on the ease, security, and simplicity that developers need,” said Palladino.  “Volcano changes that. Combined with the agentic infrastructure that Konnect provides, organisations from builders to Platform teams now have everything they need to start creating advanced AI powered integrations, workflows, and user experiences.”

Regula IDV platform simplifies identity verification
Regula IDV platform simplifies identity verification

Regula, a global developer of identity verification (IDV) solutions and forensic devices, has launched its brand-new Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale according to an organisation’s growth pace and fully vendor-agnostic, the platform enables businesses to manage every stage of the identity lifecycle, from onboarding through continuous reverification, without legacy constraints. Identity verification challenges Presently, nearly half of companies worldwide face the same identity verification challenges. Legacy systems lead to fragmentation and create blind spots in the processes. Enterprise environments often rely on a mix of services: one vendor for document checks, another for biometrics, a separate one for sanctions lists, etc., with data manually stitched together in inconsistent, sometimes chaotic ways. Every new application or service only adds another layer of complexity to the IDV infrastructure. This results in growing costs, increased security risks, and higher customer drop-off rates. Addressing IDV pain points How the Regula IDV Platform addresses the biggest IDV pain points: One-stop-shop solution. Regula IDV Platform unites the most comprehensive set of identity checks, from documents to biometrics, eliminating repeated uploads and failed or unnecessary steps. As a result, it transforms onboarding into a single, seamless, and trusted flow with proprietary solutions for the entire identity journey. Users complete verification in seconds, not minutes, while organisations get a unified, enterprise-grade solution. Flexible workflow orchestration. Regula IDV Platform makes complex, multi-step, multi-component identity verification workflows effortless. Unlike point solutions that handle single tasks, the platform supports complete end-to-end use cases. Easy customisation capabilities allow companies to build adaptable verification processes aligned with their business needs. Unified tools. The platform unites everything in one place: document and biometric checks, AML (Anti-Money Laundering) and PEP (Politically Exposed Persons) screening, databases, and more. Its vendor-agnostic architecture integrates with any tech stack and third-party systems, saving time and resources and closing blind spots. Comprehensive identity management. Regula IDV Platform maintains a single source of truth with centralised user profiles, secure storage, and advanced analytics. It optimises decision-making with transparent, reliable identity data and reduces complexity with single-flow user authentication. Built-in compliance. From KYC (Know Your Customer) and AML to GDPR (General Data Protection) and CCPA (California Consumer Privacy Act) and more, all required checks are included by default. Regula IDV platform keeps complete audit trails, protects sensitive data and provides full control over it, and allows both on-premise and cloud deployment. Additionally, the platform supports age assurance to instantly confirm age, protect minors, and comply with local regulations. Lower costs, faster scaling. By consolidating multiple solutions into a single platform, Regula helps to reduce operational expenses. This agile platform grows together with businesses—easily adapting to changing processes, expanding integrations, regulatory updates, or increased workloads—without costly redevelopment or re-integration. Speed and flexibility Beyond the orchestration of identity verification and management tools, the Regula IDV Platform ensures speed and flexibility. Its out-of-the-box, ready-to-use workflows and integrations let companies get started instantly without long setups. Powerful user data management and analytics tools help businesses store, process, and analyse identity data to optimise operations and decision-making. Thanks to its multilingual, multi-document, and multi-device support, the platform delivers native user experiences across geographies and channels and ensures reliable verification anywhere in the world. Creation and reuse of digital credentials Regula IDV Platform also supports the creation and reuse of digital credentials—verified identity attributes issued by trusted organisations such as banks, telecom providers, or government services. Once a user’s identity is confirmed during the KYC process, these credentials can be securely reused to authorise access to other services, with biometric verification ensuring authenticity at every step. This approach empowers businesses to streamline user journeys, enhance security, and take part in the growing digital identity ecosystem. Fragmented identity systems “For years, businesses have struggled with fragmented identity systems that are costly, slow, and hard to adapt. With Regula IDV Platform, we’ve taken our decades of in-house expertise in document and biometric verification and turned it into a single, unified solution.” “This platform gives enterprises the agility they need to scale, the flexibility to integrate with any system, and the orchestration capabilities to connect multiple processes into one seamless flow with the reliability of the most comprehensive identity checks—all while reducing complexity and cost.” “It’s the next step in helping organisations make identity verification both a strategic advantage and a seamless experience for their customers,” says Ihar Kliashchou, Chief Technology Officer at Regula.

Joseph Grillo joins Azure Access board of directors
Joseph Grillo joins Azure Access board of directors

Azure Access Technology, a U.S.-based manufacturer of enterprise-grade access control hardware platforms, proudly announces the appointment of Joseph Grillo to its Board of Directors. A recognized pioneer in the electronic security and identification industry, Grillo brings over 30 years of experience driving growth and innovation in the security technology sector. Integration timelines and supports Azure Access Technology empowers software-focused enterprises to build world-class access control solutions through its flexible, open-architecture hardware platform. With a comprehensive SDK that accelerates integration timelines and supports proprietary customization, Azure Access ensures partners can focus on what sets their solution apart — while relying on robust, U.S.-made hardware and world-class support from integration through deployment. Azure Access’ growth journey “Joseph’s appointment marks a significant milestone in Azure Access’ growth journey,” said Evan Zinger, Executive Vice President of Azure Access Technology.  “His deep industry expertise, entrepreneurial leadership, and track record of scaling security businesses globally will be invaluable as we accelerate our mission to become a pioneer in the enterprise access control space.” Acquisitions in the electronic security Grillo is best known for founding ACRE, LLC in 2012, a platform for strategic acquisitions in the electronic security market. ACRE’s portfolio included Mercury Security — a similar business model to Azure Access — which under Joseph’s leadership, generated rapid growth and expanded market presence. Before ACRE, he held influential roles at HID, where he participated in a management buyout in 1995 and led the company as President, growing it from a $15 million enterprise into a $100 million industry pioneer before its successful sale to ASSA ABLOY in 2001. Grillo later led ASSA ABLOY’s $750 million Global Technology Division and served as President and Board Member of the Security Industry Association (SIA) from 1998 to 2007. Development and strategic growth initiatives “I’m excited to join Azure Access Technology at such a pivotal time,” said Grillo. “I have confidence in the ability of the management team to execute their vision of empowering enterprise software companies with their open, yet customizable access-control product platform." "Combined with their commitment to partner support and U.S.-based manufacturing, Azure Access is positioned for substantial growth. I look forward to contributing to Azure Access’ development and market leadership.” In his new role, Grillo will focus on business development and strategic growth initiatives, guiding Azure Access as it expands its presence and influence within the security technology landscape.

Access control applications

Hikvision facial recognition at Rodwell House
Hikvision facial recognition at Rodwell House

Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specialises in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.

RAD's AI solutions transform mobile home security
RAD's AI solutions transform mobile home security

Artificial Intelligence Technology Solutions, Inc., along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced the publication of a new case study detailing the successful deployment of RAD’s RIO 180 units powered by SARA at a mobile home community managed by Champion Real Estate Services. The project, conducted in collaboration with RAD dealer HUB Enterprises, demonstrates how autonomous security solutions can dramatically reduce incidents, restore resident confidence, and redefine community safety. Newly published case study The newly published case study, titled “Transforming Mobile Home Park Security with RAD and HUB Enterprises,” showcases how the partnership between Champion, HUB, and RAD addressed long-standing security challenges at a large mobile home community. The report details how HUB deployed two RIO 180 units powered by RAD’s agentic AI platform, SARA (Speaking Autonomous Responsive Agent), resulting in a near elimination of resident complaints and a sharp decline in trespassing, theft, and disruptive activity. This case joins a growing collection of real-world examples where RAD’s autonomous technologies are redefining safety and operational efficiency across residential, commercial, and critical infrastructure sectors. LED display and talk-down features “HUB brought us a solution from RAD that works,” said Shannon Noble, Managing Broker at Champion Real Estate Services. “The collaboration between Champion, HUB, and RAD has given us a new level of confidence in how we manage security at our communities. The LED display and talk-down features make a powerful impact. Residents see and hear that their community is protected, and it has completely changed the atmosphere.” Technology-driven adoption “This worked where our patrols just couldn’t,” said Jarrett Willoughby of HUB Enterprises. “It’s visible, it’s active, and it gave Champion the confidence to start talking about more deployments right away. What really surprised us was SARA. We thought of it as just a monitoring tool, but the way it responds on its own, the speed of it, that’s what really sold us.” “The results at Champion’s community clearly show how technology-driven adoption can make neighborhoods safer,” said Mark Folmer, CPP, PSP, President of RAD. “RIO powered by SARA provides an immediate and visible deterrent that residents recognise and appreciate. This collaboration with HUB and Champion demonstrates how autonomous security can deliver measurable improvements in safety and peace of mind.” Transforming residential community safety The full case study is now available for download, offering detailed insights into how autonomous security solutions are transforming residential community safety. Property managers, security providers, and industry professionals are encouraged to review the results and explore how AI-powered autonomy can deliver stronger deterrence, faster response, and greater confidence for the communities they serve. ROSA units Sitting atop a standard RIO 180 configuration is a single ROSA units. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-colour, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at mobile home parks, retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. Customised assessment and demonstration The Company encourages property managers, business owners, and municipal leaders seeking to improve security in downtown and high-traffic areas to connect with RAD for a customised assessment and demonstration of its autonomous security solutions. AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. The Company’s operations and internal controls have been validated through successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Led by Steve Reinharz RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry pioneership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Prospective sales pipeline RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.

Connect ONE's ERP: Boosting school emergency response
Connect ONE's ERP: Boosting school emergency response

In an emergency, first responders, School Resource Officers (SROs) and responsible parties need to gain access to campus buildings to assess alerts and potential threats. With Connect ONE®’s new Emergency Response Platform (ERP), included with any service level at no additional charge, first responders and SROs can view cameras, unlock doors and outputs, activate task functions, initiate lockdown and see recent activity. Connect ONE ERP Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins The Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins. Integrators can offer 911 and dispatch centres viewing and access control of schools to assist responders during critical threats. The cloud platform ERP provides a separate agency login with specific designated permissions for first responders, who can only see customer site locations shared by the security dealer. Emergency Response Platform “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to diffuse an emergency quickly and effectively with powerful information to view and control facility security,” said Dan Simon, Technical Director, Connected Technologies.  He adds, “It’s a great solution to heighten safety and create safer experiences for the public, while ensuring you keep a customer long-term with a valuable service.” ERP: Use-case in action Nightwatch Security & Telephone LLC has executed the ERP at several of the area’s school districts Nightwatch Security & Telephone LLC, Sedalia, Mo., has implemented the ERP at several of the area’s largest school districts serving more than 5,000 students. Nightwatch Owner, Jeff Kesterson said it’s simple to update proximity key fobs and input agency officer’s access codes to stay current with staffing changes or modifications to permissions. “First responders and SROs maintain access to schools with proximity access control key fobs, but staying current with staffing changes was unwieldy before the ERP,” said Jeff Kesterson. Key fob credentials The Sedalia Police Department, which has access to schools in the city, said the ERP is a huge timesaver for administering key fob credentials. “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” said Commander Joshua Howell, Operation’s Support Bureau, Sedalia Police Department. Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping – a real-time Google mapping feature, which adds the capability of seeing floor plans of the building along with point and click control of doors and cameras. Dispatch can easily respond to officers on-site and unlock doors for quick entry by clicking on GeoView’s map and door icon. Other features of the ERP A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Integrates with leading intrusion, access control, video, fire, temperature, humidity, MNS, environmental and weather systems. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness.

Siemens transforms San Juan Hospital with AI tech
Siemens transforms San Juan Hospital with AI tech

Siemens Smart Infrastructure has partnered with San Juan de Dios Hospital in Seville, Spain, to transform it into a smart and sustainable asset. With buildings accounting for around 40 percent of global carbon emissions, and healthcare facilities increasingly facing financial and sustainability pressures, improving operational efficiency is crucial. At San Juan de Dios Hospital, Siemens has turned this challenge into an opportunity with its AI-based digital building technology. By deploying its innovative solutions, Siemens enabled the hospital to cut operating costs of the analysed assets by 35 percent, setting another benchmark for hospitals across the globe. Siemens’ AI-powered building platform The solution integrates energy and security control, as well as HVAC automation into a single system San Juan de Dios Hospital, which enjoys a history spanning more than 450 years, has undergone an impressive transformation using Siemens’ fully digital, AI-powered building platform Building X and digital services. The solution integrates energy and security management, as well as Heating, Ventilation and Air Conditioning (HVAC) automation into a single system. This leads to significant operational, as well as energy efficiency gains for building managers. Siemens’ technology and services are expected to enable a further reduction of 10 percent in operating costs, thanks to early fault detection and optimised equipment use. Harnessing AI and interoperable platforms “With Siemens’ technology, we have gone beyond simple automation. We now have an intelligent system that coordinates, optimises, and anticipates the functioning of our facilities, improving care quality and the well-being of those around us,” said María Jesús Pareja, Managing Director at San Juan de Dios Hospital. “This project sets another benchmark for hospital digitalisation globally. By harnessing AI and interoperable platforms, healthcare facilities can transform operational complexity into simplicity and resilience – ultimately improving care outcomes while cutting costs,” said Delphine Clément, Global Head of Verticals at Siemens Smart Infrastructure Buildings. Integrates remote digital services Siemens deployed a digital layer that merges remote digital features for fault detection and diagnostics At San Juan de Dios Hospital in Seville, Siemens has deployed a digital layer that integrates remote digital services for fault detection and diagnostics, intrusion detection via Siemens Siveillance Suite, and the Desigo CC building management system.  As part of the Building X platform, Operations Manager and Energy Manager provide real-time visibility into building performance and energy consumption, enabling smarter decision-making, improved operational efficiency, and measurable sustainability gains. Digital building platform Building X is a digital building platform that supports customers to digitalise, manage, and optimise their building operations. It is part of Siemens Xcelerator, an open digital business platform that enables customers to accelerate their digital transformation easier, faster and at scale.