Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

An upgrade to the Johnson Controls flagship building automation system (BAS), Metasys 14.1 offers a suite of new and enhanced features that answers the need for more comprehensive energy management. The BAS, which combines HVAC, fire, security and lighting systems into one, seamless platform, allows facility managers, IT teams and decision makers to optimise operations, fortify cybersecurity, advance energy and emissions goals, boost productivity and strategically modernise facilities. Building automation system “Metasys is the pioneering-edge building automation system in the industry for many reasons. With 14.1, we’ve continued our innovation of the Metasys User Interface to focus on spaces and equipment with an emphasis on data visualisation that gives users a direct line of sight into energy management." "The enhancements to BACnet Advanced Workstation, as well as expanded architectural flexibility, sets Metasys apart by meeting the global market demand for a regulatory-compliant BAS that delivers enhanced building management together with operational efficiency,” said Kaishi Zhang, Vice President of Global Product Management, Building Automation Systems and Controls at Johnson Controls. Energy management capabilities Metasys 14.1 significantly improves energy control abilities with a growth of the renowned Metasys UI Metasys 14.1 significantly improves energy management capabilities with an expansion of the renowned Metasys User Interface (UI). Energy Dashboard and Reporting (EDR), which replaces Energy Essentials, visualises and contextualises energy usage as it relates to equipment and spaces. EDR supports a broader range of energy types, including electricity, natural gas, steam and chilled and heated water, and makes it easier to track usage and consumption for actionable insights. Metasys UI enhancements Additional Metasys UI enhancements include: Mean kinetic temperature (MKT) calculation and reporting to maintain optimal product quality and ensure compliance in temperature-sensitive environments Spaces Manager for Metasys UI allows users to adapt to changes with capability to easily add/edit/delete spaces via browser Electric demand monitoring (EDM), visible in Metasys UI, monitors and forecasts demand, helping execute contracts with electric companies Advanced capabilities of Metasys Ghelamco, an international real estate investor and developer responsible for The Wings, a triple-certified, state-of-the-art and first-of-its-kind modern office complex praised for its sustainable design and energy-neutral status, utilises Metasys. “Together with Johnson Controls and our contractor SPIE, we are enabling an excellent, vibrant and versatile working environment and enhanced wellbeing for our tenants at all times. Leveraging the advanced capabilities of Metasys, including its robust EDR functionality and built-in cybersecurity features, we are able to achieve this while reducing energy usage and keeping emissions to an absolute minimum,” said Tim Van de Voorde, Project Manager at Ghelamco. Performance on ADS systems With system and architectural flexibility, Metasys 14.1 has grown deployment options to suit various active needs With system and architectural flexibility, Metasys 14.1 has expanded deployment options to suit various operational needs. This version allows for both Microsoft and Linux operating systems to help process data quickly, improving performance on ADS systems with multiple users and giving users more visibility into the Linux OS. Metasys 14.1 is the first version to exclusively use Metasys UI, since the legacy Site Management Portal (SMP) has officially been discontinued. Legacy GGT and UGT graphics continue to function in Metasys UI. Enhancements of Metasys 14.1 Metasys 14.1 has earned BACnet Advanced Operator Workstation (B-AWS), the highest level among BACnet operator workstation certifications. This enhancement provides: Comprehensive system configuration and commissioning: Discover and integrate all BACnet devices while simplifying configuration and commissioning Support for a wide range of BACnet objects: View and modify all standard BACnet properties in most general-purpose BACnet objects for comprehensive oversight. Electric demand monitoring (EDM), visible in Metasys UI, monitors and forecasts demand, helping execute contracts with electric companies Enhanced alarms and events management: View, manage and adjust BACnet alarms and events as well as access detailed summaries for proactive management Advanced scheduling and trending capabilities: Access complex scheduling and trending for precise control over building systems and in-depth analysis of performance over time Extensive device and network management: Manage devices and networks more comprehensively Like Metasys 14, this version harmonises capabilities with the Metasys engine at the server level. This allows users to seamlessly integrate devices over various IP protocols with the Metasys server, making expansion easier and more cost-effective.

Keysight’s Application and Threat Intelligence (ATI) research team has uncovered a novel Transport Layer Security (TLS) handshake exploit that uses protocol-compliant behaviour to evade traditional network defenses. This newly discovered covert channel allows attackers to manipulate TLS handshake packets by simply rearranging parameter settings, without injecting malicious code, making detection by firewalls and intrusion prevention systems nearly impossible. By leveraging the flexible, permutation-friendly structure of TLS Client Hello packets, attackers can exfiltrate data or establish command and control (C2) communications, all while remaining invisible to most security tools. Exploiting encryption protocols like TLS Adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS This finding highlights how adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS. “The discovery of this novel covert channel that leverages legitimate TLS protocol behaviours for malicious purposes is a game changer,” said Ram Periakaruppan, Vice President and General Manager of Network Test & Security Solutions at Keysight. “It helps shift the balance of power back to cyber-defenders.” Robust testing The average breach costs $4.88 million and takes over 250 days to contain The prevalence of TLS encryption in nearly every internet-connected system makes this exploit especially dangerous. According to IBM’s 2024 Cost of a Data Breach Report, the average breach costs $4.88 million and takes over 250 days to contain, amplifying the need for early detection and robust testing. This isn’t just another update, it’s a vital breakthrough. At the recent Silicon Valley Cybersecurity Conference, Keysight presented its findings, offering the first opportunity for the security community to learn about this previously unknown class of threats. The presentation earned the Best Paper Award, underscoring its significance as a major advancement in cybersecurity research. Security innovation With this discovery, Keysight continues to lead the charge in security innovation, helping enterprises, service providers, and network equipment manufacturers confidently validate that their infrastructure is protected against even the most evasive and cutting-edge threats. To help organisations proactively mitigate this unprecedented threat, Keysight has integrated the TLS covert channel exploit into the latest ATI update of its network application and security test solutions. This enables organisations to: Emulate the TLS exploit in a controlled lab environment Validate whether their defenses can detect and block the attack Measure performance impacts of mitigation strategies, before deploying them in production “Cybersecurity is a constant race to stop new and emerging attacks while also maintaining the network performance that users demand,” said Periakaruppan. “Our ATI research team worked tirelessly to uncover this covert exploit. By quickly integrating it into our products, we are empowering our customers to proactively test their systems’ ability to both defend against this threat, and maintain system performance, before attackers can gain widespread traction.”

Sepura, a global pioneer in mission-critical communications solutions, announces that its Chief Technology Officer, Peter Hudson, has been appointed to the Board of The Critical Communications Association (TCCA). Peter brings over 25 years of experience in the critical communications industry, with a deep understanding of both TETRA and broadband technologies. As Sepura’s CTO, he has led the company’s technology strategy, spearheading innovation in TETRA, LTE, and hybrid communication solutions to support frontline professionals around the world. Sepura’s commitment to international collaboration His appointment to the TCCA Board reflects Sepura’s ongoing commitment to international collaboration His appointment to the TCCA Board reflects Sepura’s ongoing commitment to international collaboration and thought leadership within the critical communications ecosystem. “We are extremely proud that Peter has been selected to join the TCCA Board,” said Steve Barber, CEO of Sepura. “Peter’s experience and insight will be invaluable in helping to shape the future of mission-critical communications, and we look forward to the positive impact his leadership will have on the wider community.” Promoting open standards Peter Hudson commented: “It is a privilege to join the TCCA Board at such a transformative time for our industry. We must ensure that the TETRA standard continues to deliver for users as it has done over the past 20 years, and as users increasingly transition to broadband technologies, it is essential that we maintain the same high standards of reliability, interoperability and security that narrowband systems have delivered for decades.” “I look forward to working with TCCA members to support this evolution and ensure that our solutions continue to meet the critical needs of users worldwide.” The TCCA plays a central role in promoting open standards and supporting the deployment of interoperable critical communications technologies. Peter’s appointment further strengthens the association’s technical leadership as it continues to drive global progress in mission-critical broadband and narrowband systems.

Semperis, a provider of AI-powered identity security and cyber resilience, released new research into nOAuth known vulnerability in Microsoft’s Entra ID that enables full account takeover in vulnerable SaaS apps with minimal attacker effort, posing a severe risk to enterprises relying on cross-tenant Entra integrations. Eric Woodruff, Semperis’ Chief Identity Architect, presented his findings this week at the Troopers 2025 in Heidelberg, Germany. Semperis’ follow-up research nOAuth was first disclosed in 2023 by Omer Cohen of Descope, highlighting a flaw in how some SaaS applications implement OpenID Connect. Semperis’ follow-up research focused on Entra-integrated applications in Microsoft’s Entra Application Gallery, identifying a wide range of applications still vulnerable to nOAuth abuse more than a year later. OpenID Connect standards Traditional safeguards like MFA, conditional access and Zero Trust policies offer no protection Discovered through cross-tenant testing, nOAuth exploits Entra ID app configurations that permit unverified email claims as user identifiers, a known anti-pattern per OpenID Connect standards. In these scenarios, attackers need only an Entra tenant and the target’s email address to assume control of the victim’s SaaS account. Traditional safeguards like MFA, conditional access and Zero Trust policies offer no protection. Insecure patterns “It’s easy for well-meaning developers to follow insecure patterns without realising it and in many cases, they don’t even know what to look for,” said Woodruff. “Meanwhile, customers are left with no way to detect or stop the attack, making this an especially dangerous and persistent threat.” Safeguarding against the nOAuth vulnerability MSRC advises SaaS vendors to follow its offers to prevent nOAuth abuse or risk expulsion In a broad test of more than 100 Entra-integrated SaaS applications, Woodruff found nearly 10% were vulnerable to nOAuth abuse. Once the vulnerability is exploited, attackers can gain full access to a user’s account in the SaaS app, enabling data exfiltration, persistence and potential lateral movement. The Microsoft Security Response Centre (MSRC) advises SaaS vendors to follow its recommendations to prevent nOAuth abuse or risk expulsion from the Entra Application Gallery. Bypasses end-user protections “nOAuth abuse is a serious threat that many organisations may be exposed to,” continued Woodruff. “It’s low effort, leaves almost no trace and bypasses end user protections." "We’ve confirmed exploitation is still possible in many SaaS apps, which makes this an urgent call to action. We encourage developers to implement the necessary fixes and help protect their customers before this flaw is exploited further.” Deep log correlation Semperis reported its findings to both affected vendors and Microsoft, beginning in December 2024 Semperis reported its findings to both affected vendors and Microsoft, beginning in December 2024. While some vendors have since remediated their applications, others remain vulnerable. Without deep log correlation across both Entra ID and the SaaS platform, detecting nOAuth abuse is nearly impossible. New detection capabilities Semperis researchers, pioneers in identity threat detection, recently announced new detection capabilities in the company’s Directory Services Protector platform to defend against BadSuccessor, a high-severity privilege escalation technique targeting a newly introduced feature in Windows Server 2025. Last year, Semperis researchers discovered Silver SAML, a new variant of the SolarWinds-era Golden SAML technique that bypasses standard defences in Entra ID-integrated applications.
Access control applications

Centro Ilarco is a state-of-the-art commercial office building in the heart of Bogotá, Colombia. Designed to accommodate three corporate towers with a total of 90 offices, this landmark structure focuses on providing innovative, secure, and seamless access experiences for its tenants. The solution As a multi-building office complex, Centro Ilarco required a robust access control system to ensure security, manage tenant entry, and streamline visitor access at every entry point. To meet these needs, the DNAKE S617 8” Facial Recognition Door Station was installed across the building. Since its implementation, Centro Ilarco has experienced a significant boost in both security and operational efficiency. Tenants now enjoy hassle-free, touchless access to their offices, while building management benefits from real-time monitoring, detailed access logs, and centralised control of all entry points. DNAKE smart intercom solution has not only enhanced security but also improved the overall tenant experience. Installed products S617 8” Facial Recognition Android Door Station Smart Pro APP

Slavija Residence Luxury, a premium residential complex in Novi Sad, Serbia, has implemented its security infrastructure with DNAKE’s cutting-edge smart intercom systems. The installation covers 16 high-end apartments, combining sleek design with advanced technology to enhance resident safety and access control. The solution In the connected world, modern residents prioritise both security and convenience—demanding access control that’s not just robust but also effortlessly integrated into their lifestyles. DNAKE’s smart intercom systems deliver exactly that, blending advanced protection with intuitive technology for a smarter living experience. Unmatched Security: Facial recognition, instant video verification, and encrypted access management ensure residents’ safety is never compromised. Effortless Connectivity: From HD video calls with visitors to remote door release via smartphone, DNAKE keeps residents connected and in command, anytime, anywhere. Designed for Simplicity: With an Android-powered interface, sleek indoor monitors, and the Smart Pro App, every interaction is streamlined for users of all tech levels. Installed products S617 8” Facial Recognition Android Door Station H618 10” Android 10 Indoor Monitor Smart Pro APP

Dickensa 27, a modern residential complex in Warsaw, Poland, sought to enhance its security, communication, and convenience for residents through advanced intercom solutions. By implementing DNAKE’s smart intercom system, the building now features top-tier security integration, seamless communication, and an elevated user experience. With DNAKE, Dickensa 27 can offer its residents peace of mind and easy access control. DNAKE smart intercom system DNAKE smart intercom system was smoothly integrated with existing security features DNAKE smart intercom system was smoothly integrated with existing security features, providing an intuitive and reliable communication platform. Facial recognition technology and video monitoring ensure that only authorised individuals enter the building, while the easy-to-use interface helps to streamline security operations. Residents now enjoy quick, secure access to the building and can easily manage guest access remotely. List of installed products S615 4.3” Facial Recognition Android Door Station S213K SIP Video Door Station with Keypad E211 Audio Indoor Monitor 902C-A Master Station S212 One-button SIP Video Door Station H618 10.1" Android 10 Indoor Monitor E416 7" Android 10 Indoor Monitor Solution benefits Advanced security With facial recognition and video access control, Dickensa 27 is better protected, allowing residents to feel safe and secure. Convenient communication The system enables clear, direct communication between residents, building staff, and visitors, improving day-to-day interactions. Remote access control Residents can manage guest entry and access points remotely using the DNAKE Smart Pro App, providing greater flexibility and convenience.

HORIZON is a premium residential development located east of Pattaya, Thailand. With a focus on modern living, the development features 114 luxurious detached homes designed with sophisticated security and seamless communication in mind. In line with the project's commitment to providing top-tier amenities, the developer partnered with DNAKE to enhance the security and connectivity of the property. DNAKE smart intercom solutions With DNAKE smart intercom solutions in place, the development stands out not only for its luxurious homes but also for the seamless integration of modern technology that ensures both security and convenience for all residents. Coverage 114 Luxurious Detached Homes Installed products C112 One-button SIP Door Station E216 7" Linux-based Indoor Monitor Solution benefits Streamlined security C112 One-button SIP Video Door Station, allows residents to screen visitors and see who is at the door before granting access. Remote access With DNAKE Smart Pro App, residents can remotely manage visitor entry and communicate with building staff or guests from anywhere, at any time. Ease of use The user-friendly interface of the E216 makes it easy for residents of all ages to operate, while the C112 offers simple yet effective visitor management. Comprehensive integration The system integrates seamlessly with other security and management solutions, such as, CCTV, ensuring full coverage across the property.