Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
Organisations of every size and type have already discovered the security and convenience benefits of a CLIQ digital key access management system. Now, new CLIQ Readers and Updaters for indoor and outdoor use make extending the scope and reach of a CLIQ solution even simpler, including to third-party digital access devices. It takes CLIQ to new openings more easily than ever before. New additions These new additions to the CLIQ family are compatible with fully electronic eCLIQ and electromechanical PROTEC2 CLIQ solutions. They simplify both secure unlocking and the transfer of access updates to CLIQ keys. With new CLIQ Readers, all the keyholder needs to do is insert their key and wait for visual confirmation from its inbuilt LED – they do not even turn it, which minimizes key wear-and-tear. The Updater incorporates the same intuitive LEDs as CLIQ Wall Programming Devices (PDs) – informing the keyholder about update and key battery status. Fully integrated “The new CLIQ Readers are the first readers which are fully integrated with the CLIQ system,” explains Ralf Stange, Product Manager at ASSA ABLOY. “Managing access is simple because the software treats a Reader just like a cylinder. The new Updater makes it easier and more cost-efficient to add secure credential updating protocols to outside spaces.” A fast, reliable new Reader, inside or outdoors The CLIQ Reader is compatible with everything an organisation needs to manage access more flexibly: with CLIQ Web Manager and Local Manager; with the CLIQ Go mobile solution for small businesses; and with the full range of CLIQ programmable keys. The Reader itself offers customised setup options to suit individual needs. Switch delay may be set between 1 and 10 seconds, with a choice of activation on key insertion or on removal. An optional remote relay unit can add an extra layer of security. Installing and connecting a Reader can put a CLIQ system in control of user access to doors with electric strikes or motorized locks, automatic revolving doors or sliding glass doors, lift priority and more. In addition, the Outdoor Reader model packs all this convenient functionality into a durable stainless-steel housing designed for exterior use. With certified protection against water, dust (IP65), and vandalism (IK09), it extends CLIQ’s use-cases reliably to external barriers, gates, turnstiles and other entrances. Secure outdoor credential management with a new Updater Another new addition to the device range, the CLIQ Updater provides a secure way to add CLIQ key updates outside a building. Because connecting the Updater does not require a network cable, the device is fast and secure to install even on retrofit projects. The Updater is simply linked via RS485 cable to an existing CLIQ Wall PD (Gen 2), up to 200 metres away, with no need for network configuration. All security-related elements remain in the building interior. When connected to a Wall PD featuring a free output switch function (FO1), the Updater can activate third-party devices such as electric strikes. For installation convenience, all CLIQ Readers and Updaters come in a choice of flush and surface-mounted configurations to suit the specific application. The Outdoor Reader and Updater are also available as e-modules for seamless, integration with steles, tableaus, and outdoor intercom systems, including ASSA ABLOY’s DoorBird solution. Secuting homes and businesses “With these new additions to the CLIQ device range, facility managers can implement even more comprehensive and flexible access protocols,” adds Ralf Stange. “And like every CLIQ product, they are backed by decades of ASSA ABLOY investment and innovations in lock and key technologies to secure homes and businesses.”
Genetec Inc., the global pioneer in enterprise physical security software, is urging organisations to strengthen credential governance across connected physical security systems, as AI accelerates the scale and sophistication of cyber threats. Credential based attacks AI‑driven tools are accelerating credential‑based attacks by increasing their speed, scale, and precision. For organisations managing connected cameras, access control systems, servers, and cloud services, weak or poorly governed credentials can expose sensitive operations and create new pathways into organisations. This includes the passwords used to connect directly to devices themselves, which are often overlooked but can provide a direct entry point if not properly managed. In this environment, relying on periodic password changes or basic cyber hygiene is no longer sufficient. Risks of misusing AI “AI is changing the speed and scale of cyber risk,” said Mathieu Chevalier, Principal Security Architect at Genetec Inc. “Attackers can now move faster and are using AI to impersonate people, tailor social engineering attacks, uncover vulnerabilities at scale, and evade detection. To respond, organisations need to actively govern access and identity across their systems, not just set controls once and hope they hold.” These risks are already affecting organisations that manage physical security systems. The recent Genetec Enterprise Physical Security in the Cloud Era research, which was based on insights from more than 7,300 physical security professionals worldwide, found that 58.7% of organisations have experienced an increase in phishing and smishing attacks, while 41% reported a rise in overall physical or cyber incidents. Social engineering was identified by 43.5% as a leading attack vector. Identity management Ahead of World Password Day, Genetec is encouraging organisations to move beyond isolated credential controls and adopt a governance‑first approach to identity management in physical security environments, including: Strengthen identity and credential controls: Organisations should eliminate default and shared credentials, enforce strong authentication such as passkeys, and adopt multi-factor authentication (MFA) to reduce common attack entry points. This must extend to devices as well, replacing static passwords with certificate-based authentication when possible, and ensuring centralised management and regular credential rotation. Closer alignment between IT and physical security teams: Bringing IT and physical security teams together helps apply consistent security standards, improve visibility into access risks, and coordinate incident response. As physical security systems become more connected to enterprise networks, cross-functional alignment can help organisations identify weak points and respond more effectively to credential-based attacks. Governance-first management of physical security systems: Organisations should manage physical security infrastructure with the same rigor as other mission-critical systems. This includes regular access reviews, controlled updates, and partnerships with trusted technology partners that support long-term security, transparency, and operational resilience.
Group-IB, a foremost creator of predictive cybersecurity technologies to investigate, prevent, and fight digital crime, has been named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. This recognition places Group-IB among just five vendors to achieve Leader status in the first Magic Quadrant™ Gartner® has ever published for the threat intelligence market, an evaluation that assessed eighteen vendors across completeness of vision and ability to execute. This recognition is a testament to more than two decades of adversary-centric research, the scale and sophistication of its Unified Risk Platform, and the predictive threat intelligence advantage built on unique sources of threat intelligence and 21 years of proprietary telemetry, over 1,500 joint investigations with law enforcement agencies, and continuous 24/7 dark-web monitoring. Recognition for innovation in predictive cyber defense and unified risk intelligence In its 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies report, Gartner® highlighted Group-IB’s verticalised intelligence as a key strength, specifically the platform’s ability to combine dark web and closed-group access, incident response validation, proprietary fraud telemetry, and unique capabilities such as BGP (Border Gateway Protocol) threat monitoring and its Cyber Fraud Fusion model. These give Group-IB particular depth in financial services, telecommunications, and government and law enforcement sectors. Gartner® also recognised the breadth and cost predictability of Group-IB’s Unified Risk Platform, a consolidated intelligence data lake spanning threat intelligence, fraud, Managed XDR, sandboxing, and investigations, offering unlimited users, APIs, hunting rules, and takedowns at enterprise scale. Group-IB’s innovation trajectory was further noted, with Gartner® acknowledging a clearly articulated roadmap shift from detection to prediction-first defense, encompassing attack-path modeling, predictive fraud disruption through Cyber Fraud Fusion, and unified incident management across Threat Intelligence, Attack Surface Management, Digital Risk Protection, and Cloud Security Posture Management. A milestone for Group-IB “Being named a Leader in the first-ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies is a milestone for Group-IB, and a validation of the direction we have taken since 2003. Cybersecurity can no longer be reactive, and organisations need adversary-centric, predictive intelligence from unique threat intelligence sources that helps them anticipate attacks before they materialise. This recognition reflects the strength of our Unified Risk Platform, the depth of our proprietary telemetry, and the expertise of our global teams who work every day to help customers, partners, and law enforcement stay ahead of cybercriminals,” said Dmitry Volkov, CEO of Group-IB. Intelligence built on two decades of adversary visibility Group-IB’s Leader positioning reflects capabilities forged in the field. Its Threat Intelligence solution delivers Predictive Indicators of Attack, generated from longitudinal intelligence and 24/7 dark-web monitoring, empowering organisations to forecast attacker tactics, toolsets, and regional campaigns before they fully materialise. Group-IB’s Threat Intelligence has powered more than 1,500 joint investigations with law enforcement agencies, including INTERPOL, Europol, AFRIPOL, and underpins the threat visibility delivered to enterprises, financial institutions, and governments across Group-IB’s global network of 11 Digital Crime Resistance Centers. Group-IB’s Cyber Fraud Fusion model, which integrates fraud intelligence with threat intelligence at the data layer, eliminates the blind spots that emerge when cybersecurity and fraud teams operate in silos. In an environment where Group-IB’s proprietary research confirms that ransomware groups and fraud ecosystems are increasingly converging and sharing infrastructure, this unified view is not a feature advantage, but a strategic necessity for any organisation serious about prediction-first defense.
Videonetics, a global pioneer in True AI-powered video computing, has been awarded the “AI-Driven Critical Infrastructure Security Excellence Award” at the prestigious 25th Edition of Data Center Summit & Awards 2026, organised by UBS Forums in ITC Maratha, Mumbai. The recognition highlights Videonetics’ pioneering role in transforming critical infrastructure security through advanced AI-powered video intelligence, enabling organisations to move from reactive monitoring to proactive, insight-driven operations. Insightful session Adding to the company’s strong presence at the event, Harsh Mehta, Vice President – Enterprise Sales, Videonetics, delivered an insightful session on “Beyond Surveillance: When Data Centers Start Seeing, Thinking and Acting.” The session focused on how real-time visual intelligence, predictive analytics, and adaptive systems are reshaping modern data center environments enhancing security, operational efficiency, and resilience. Speaking on the occasion, Harsh Mehta said: “Data centers are evolving into intelligent ecosystems where visibility, speed, and decision-making are critical. At Videonetics, we are enabling this transformation by turning video data into real-time intelligence helping organisations anticipate risks, optimise operations, and ensure continuous uptime.” Award and recognition The Data Center Summit & Awards 2026 brought together leading CIOs, CTOs, and infrastructure experts to discuss emerging trends such as AI-driven operations, hybrid cloud, sustainability, and next-generation data center strategies. This recognition reinforces Videonetics’ commitment to innovation and its vision of building intelligent, secure, and future-ready infrastructure through True AI-powered video intelligence platform.
Access control applications
U.S. Bank Stadium in Minneapolis, Minnesota is a 66,200-person venue, hosting regular football games for the NFL and NCAA as well as baseball and soccer games, concerts, weddings, and many other events. Approximately 3,500 people make up the staff on a game day or during a major event. These concession workers, cleaning personnel, police, guest experience team, security officers and supervisors, operations managers and more are on site to deliver not only a safe and secure event, but also a memorable experience for all guests in the stadium. Access control systems While under construction, U.S. Bank Stadium managed their keys by using a complicated pencil-and-paper system that required key users to provide collateral against key removal; this proved to be both time-consuming and inefficient. When looking to upgrade their internal access control systems to provide the security and efficiency they required at such a large facility, U.S. Bank Stadium while working with Hoffman Security Solutions, chose Morse Watchmans’ KeyBank system for cost-effective, highly capable key management throughout their facility. Automated key control systems “There were a few different automated key control systems we looked at,” said Billy Langenstein, Director Event Services, U.S. Bank Stadium. “But when it came down to not only the financials, but also the capabilities, reporting and infrastructure that Morse Watchmans KeyBank has, I personally believe there’s nothing comparable on the market that amounts to how we wanted to use the system here at the stadium. This is the first time I’ve used this system in my career, and if I have the opportunity to open up another stadium, Morse Watchmans will be installed there as well.” In February 2016, Hoffman Security Solutions installed one KeyBank managing 120 key locations throughout U.S. Bank Stadium. In June 2017, they added 2 expansion cabinets to fill out the system, bringing their total managed key locations to 360. Maintaining business operations Each day, U.S. Bank Stadium has different staff working throughout the stadium to fulfill the varied roles needed for their many events. Contractors working on the facility itself, temporary staff, and other day-to-day workers all require access to different workspaces. By requiring that staff check out a key from the KeyBank system, U.S. Bank Stadium security staff are able to account for all the keys in the system, who removed each key, and what time they were checked out or returned through the KeyBank’s timestamp feature. At the end of each day, a report is delivered to security staff that displays this data in an easy-to-read manner, allowing staff to account for the many keys they use throughout the stadium during the day. With access control a strong component of U.S. Bank Stadium’s security, consistent reporting of key access is essential to maintaining business operations. Guest experience team U.S. Bank Stadium’s guest experience team, consisting of ushers, lobby hosts, ticket takers, scan ambassadors, and others, arrives early each morning and requires their own separate access. Through the KeyBank system, they are allowed to prepare for a game while simultaneously reporting that access to security staff. Each team member is given access to the keys they require, while ensuring safety throughout the stadium by keeping other keys restricted. This ease of use and reporting ability are what have made KeyBank an essential element of U.S. Bank Stadium’s access control and security systems. “We’re looking at installing another Morse Watchmans KeyBank here at the Stadium because we’re already outgrowing the one we have, and we want to start creating efficiencies within our own departments,” said Mr. Langenstein. “Having a Morse Watchmans KeyBank gives us a sense of security and a sense of convenience while providing the level of accountability that we want. It’s a fantastic product that we’re very proud to have here.”
A leading K-12 school district in the southeastern United States, recognised for its excellence in education, innovation, and community engagement, faced the growing challenge of keeping students and faculty safe while managing a complex video infrastructure. To maintain its high standards for safety and modernisation, they turned to Arcules cloud-based Video Surveillance as a Service (VSaaS). The result is a flexible, scalable foundation that enhances visibility, strengthens cybersecurity, and simplifies daily operations. With hundreds of cameras deployed across multiple campuses, the district now manages its video infrastructure more efficiently than ever before. Challenge: Growing district, growing demands The district’s on-premises video systems were aging, difficult to maintain, and expensive to upgrade. The addition of planned new schools and expanding facilities created greater coverage requirements that their existing technology could not meet. Administrators needed a secure, cost-efficient solution that could scale quickly, reduce maintenance time, and improve access for security staff across multiple campuses. They wanted a platform that could evolve with their needs, provide reliable visibility during emergencies, and ensure consistent performance with limited local IT resources. The system also had to align with cybersecurity and data privacy requirements while supporting the schools’ long-term digital transformation strategy. By modernising through the cloud, administrators saw an opportunity to standardise technology across campuses and free IT staff from constant system upkeep. Solution: Modernising security through the cloud After evaluating several options, the district selected the Arcules cloud-based VSaaS platform to replace its legacy systems. Built on Google Cloud, Arcules provides centralised monitoring, automatic updates, and strong cybersecurity protections. The subscription-based model turned large capital investments into predictable operating costs, allowing the district to expand video coverage as new schools were added, without the expense of physical servers or extensive reconfiguration. The transition also simplified security management, turning what was once a patchwork of local systems into one cohesive, always-up-to-date network, accessible from anywhere. Results: Safer campuses, simplified management The new Arcules VSaaS system gives security teams the ability to monitor all campuses from a single, intuitive interface. Real-time video access improves situational awareness and speeds up investigations. Automated updates reduce IT workload, while the cloud-based structure ensures consistent performance and uptime. With improved accessibility and lower maintenance demands, the district has gained a more reliable and cost-effective solution that supports its goal of creating safer learning environments. This success demonstrates how modern, cloud-connected infrastructure can strengthen campus safety while reducing the IT burden — a vital combination for growing school districts.
The Adrian Public Schools Board of Education approved the renewal of its ZeroEyes AI-based gun detection and intelligent situational awareness platform during its April 13 meeting, continuing the use of artificial intelligence technology designed to enhance school safety by monitoring existing security camera systems for potential firearms. The deployment has been in place since 2023. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Security safety enhancements If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and district officials as quickly as 3 to 5 seconds from detection. ZeroEyes is just one component of the multi-layered security safety enhancements that have taken place over the past few years. The District has implemented multiple safety enhancements including a full overhaul of its security camera systems, the addition of weapon detection K-9 support across school facilities, and the installation of bullet-resistant and shatter-resistant glass in key areas of school buildings. Proactive safety planning Superintendent Nate Parker stated that the District remains committed to proactive safety planning. “The safety of our students and staff remains our highest priority,” Parker said. “We continue to take intentional, layered steps to strengthen our security systems and ensure our schools are prepared and protected. The renewal of ZeroEyes reflects that ongoing commitment.” Officer Joshua Perry of the Adrian Police Department, who serves as a School Resource Officer and participates in District safety planning, said collaboration has been central to the District’s approach. “These improvements demonstrate a strong partnership between schools and law enforcement,” Perry said. “The combination of training, communication, and technology significantly strengthens our ability to keep students and staff safe.” Partnerships with innovative technology As these collaborative safety efforts continue to evolve, partnerships with innovative technology providers like ZeroEyes remain a key component of the district’s strategy. “Adrian Public Schools’ continued investment in layered, proactive security demonstrates a clear commitment to protecting students and staff,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By renewing their partnership with ZeroEyes, the district is strengthening its ability to identify and respond to potential threats in real time, giving first responders critical information when every second counts. We’re proud to support Adrian in creating a safer learning environment for its community."
The healthcare organisation based in Washington state has begun a journey of unifying its video surveillance and access control under one platform, yielding better situational awareness, streamlining investigations, and providing an additional level of safety and security to staff and patients alike. Multicare Health System in Washington State employs more than 20,000 team members across 11 hospitals and more than 300 medical clinics, laboratories, medical imaging, pharmacies and specialty services locations. Physical security assets As a large healthcare organisation, Multicare has many levels of security to attend to, including slips and falls, patient care, guest management, parking and perimeter security, staff and security officer safety and much more. “We had multiple video management system (VMS) solutions and multiple systems were outdated and past their end of life. We needed to consolidate into a single, unified solution with a global interface,” Davis explains. When Joshua Davis, technology system support coordinator, joined MultiCare in 2018, he oversaw the upkeep, implementation and eventual retirement of the organisation’s physical security assets, including its outdated NVR solution, legacy analogue surveillance cameras, as well as access control and video management solutions. Access control solutions Like many robust and expanding organisations, MultiCare has added new sites and facilities over the years, finding itself with disparate security, video surveillance and access control solutions. Prior to upgrading that technology, operators were pulling video footage via a flash drive transfer at legacy sites when incidents occurred. The organisation was experiencing challenges of using older equipment too, and the access control solution didn’t have two-way integration with the VMS, making analytics cumbersome and difficult to manage. Centralised security operations With a focus on efficiency, as well as saving time and money, Multicare wanted a consolidated, easy-to-navigate platform for security staff to be able to view, respond to incidents and pull security video footage as needed. With one centralised security operations centre running 365/24/7, along with about 100 other workstations running video at any given time throughout the organisation’s locations, Davis also needed a way to streamline the number of permissions, access and remote troubleshooting and capabilities across the entire organisation. So, a few years ago, Multicare partnered with integrator Entrance Controls and technology partners, Salient Systems and AMAG Technology, to begin the process of integrating its video surveillance, while upgrading its cameras, VMS, surveillance capabilities and access control operations. IP video capabilities “This was a team effort to pull off a project of this size. We needed to make sure that calculations, server type, and correct camera counts/types were accounted for. We all worked together to make sure that everyone was kept in the loop,” explains Blake Albertsen, regional sales manager for Salient Systems in the Pacific Northwest and Western Canada. The healthcare organisation has nearly completed its security upgrades: upgrading the VMS to a unified platform from Salient Systems; installing roughly 90 servers to allow the organisation to experience full IP video capabilities; upgrading its 3,000-plus analog cameras to IP as they age out, as well as using Salient’s GEN II Capture card technology to get extra life and optimised capabilities out of other existing analogue cameras without having to invest in encoders. Better situational awareness In addition, two-way integration with AMAG’s Symmetry Access Control system and Salient Systems’ CompleteView VMS allows Davis and his team to pull up, search and see motion-related video clips associated with access control events whenever necessary, yielding better situational awareness and streamlining investigations. “We spent over 18 months developing the plan and design of each server before we ever placed one server into the Multicare platform. There were so many different moving pieces we needed to make sure were in place for a successful upgrade,” Albertsen says. Single VMS solution The upgrades have allowed Multicare to not only boost security, safety and efficiency, but it has also saved Davis and his staff significant time already. “Before we had a centralised, single VMS solution, we didn’t have capabilities of customising camera views at every location. Some locations have more cameras than others and once our staff had a view that had been created for them, they couldn’t change the view,” Davis says. Now, the VMS allows staff and operators the ability to easily customise their surveillance views and change those views depending on the locations, cameras and angles they need to see. This has come in handy in many ways, especially when hospital staff need to see a specific room for a day or a period of time depending on what’s happening, but don’t need to watch that view all the time. “The interface has improved our usability dramatically because it’s so customisable,” Davis adds. Indoor and outdoor cameras Another unexpected benefit of the security upgrades thus far has been the peace of mind a unified security platform has given to Multicare employees. Because both indoor and outdoor cameras are all on one centralised platform, hospital employees can be escorted by security to access perimeter cameras in parking garages or outdoor locations when leaving at night so they can virtually scan the area before exiting the building. “That has given many team members a feeling of additional safety, which has been great for staff,” Davis says. Over the next several years, Multicare will continue to upgrade its legacy cameras and servers across sites it hasn’t reached yet, with the ultimate goal of having all its video surveillance under one, customisable platform. Benefits of centralised security In addition, according to Davis, as the healthcare system has begun to experience the benefits of centralised security, they would like to expand the number of cameras and views at many facilities, while also expanding uses and capabilities of the system. “We are taking baby steps as it’s an expensive endeavour, but we are growing exponentially and we see an opportunity to expand our capabilities and use into continuing to provide excellent patient treatment and overall security at our locations,” Davis says.