Mobile Access Trends

What is the role of ethical hacking in physical security?
What is the role of ethical hacking in physical security?

In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?

What is the next generation of physical security solutions?
What is the next generation of physical security solutions?

Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Latest Access control news

Milestone XProtect 2026 R1: Enhance security operations
Milestone XProtect 2026 R1: Enhance security operations

Milestone Systems Strengthens Security Operations and Expands Cloud Capabilities with XProtect 2026 R1 and Arcules Updates Milestone Systems, a world pioneer in open platform video management software, today announced XProtect 2026 R1 and Arcules VSaaS platform enhancements, delivering updates to strengthen security operations, simplify system management, and expand cloud flexibility across a wide range of deployment environments. Greater operational intelligence “XProtect 2026 R1 and the latest Arcules enhancements reflect two priorities central to where Milestone is headed: advancing our core platform to deliver greater operational intelligence and accelerating our cloud capabilities to give customers more flexible, scalable options for deploying and managing video security,” said Andy Burnett, Chief Technology Officer, Milestone Systems. “These updates create tangible value for everyone in the ecosystem, from operators in the field to the partners and decision-makers who depend on clear insight into system performance.” Simplifying ongoing management The latest Milestone releases support this direction by strengthening the platform's operational foundation, making system insights more accessible, simplifying ongoing management, and enabling greater flexibility as security environments evolve across on-premises and cloud models. A key highlight is the expansion of XProtect Remote Manager, a browser-based system management tool available to Milestone Care Plus customers. The latest release introduces customisable, scheduled reporting that automatically transforms technical system data, including health metrics, performance indicators, maintenance activity, and inventory status, into structured, visual reports tailored for multiple audiences. Enterprise security operations The new reporting capabilities address a persistent challenge in enterprise security operations: system administrators have traditionally spent significant time manually compiling and interpreting technical data before presenting to decision-makers and end-customers. XProtect Remote Manager now automates that process, enabling organisations to shift their focus from reactive reporting to proactive system insight. The reporting enhancements deliver measurable value across the security ecosystem: System administrators reduce manual workload and improve scalability across multi-site deployments Decision-makers gain clear, non-technical overviews of system performance, compliance, and return on investment Resellers and service providers gain a scalable way to deliver data-driven proof of managed service value End-customers receive consistent, accessible reporting that supports confidence and accountability in their security investments Customisable and scheduled reporting is available for XProtect installations with Milestone Care Plus. Additional XProtect 2026 R1 Enhancements XProtect 2026 R1 also includes additional enhancements across system administration, mobile usability, and device support: New LogServer features a redesigned interface with centralised log visibility, improved filtering and notifications, and more efficient workflows for faster troubleshooting across complex deployments Mobile Client What's New Archive allows operators to revisit previously released features and updates at any time, rather than relying on one-time launch notifications Device Pack 14.1 expands verified device compatibility to more than 16,300 devices, with 181 new devices added from 15 technology partners since the previous release Full advantage of high-coverage Milestone Systems continues to expand its cloud-native offerings through enhancements to Arcules, its VSaaS, with a series of Spring 2026 enhancements that expand camera-to-cloud capabilities, strengthen cloud retention options, and improve real-time control and mobile usability. Camera-to-Cloud support now extends to Axis multi-sensor cameras, allowing multiple sensor views to be managed entirely in the cloud without additional on-premises hardware. The update enables customers to take full advantage of high-coverage, multi-sensor deployments within a simplified cloud architecture. Camera-to-Cloud support has also been added for supported i-PRO cameras, further broadening the range of devices that can connect directly to Arcules without on-site servers or gateways. Physical storage infrastructure Arcules now offers long-term cloud video storage, enabling organisations to archive video data securely in the cloud for extended periods. Archived video remains searchable and accessible, eliminating the need to manage physical storage infrastructure while supporting compliance, investigative, and operational requirements. Additional enhancements include a WebSocket-based PTZ API for most ONVIF-connected cameras, enabling faster real-time pan-tilt-zoom control within automated workflows and third-party integrations, and mobile alert thumbnails for iOS that deliver immediate visual context alongside push notifications for faster event assessment. Together, XProtect 2026 R1 and the latest Arcules updates reflect Milestone's commitment to advancing the capabilities security professionals depend on, whether they operate on-premises, in the cloud, or across hybrid environments.

dormakaba opens new production facility in Mexico
dormakaba opens new production facility in Mexico

dormakaba, a global provider in the access solutions market, opens a new production facility in Nogales, Mexico. With operations in Mexico since 2016, the new facility represents a multimillion-dollar investment designed to support commercial growth in North America. Chief Operations Officer Carsten Franke and dormakaba Americas leadership joined Nogales employees and Mexican dignitaries to celebrate the ribbon-cutting ceremony. Flexible manufacturing network "Today marks an important milestone for dormakaba," Franke said. "The opening of this new plant in Nogales represents much more than a new facility: it is a key step in building a stronger, resilient, and more flexible manufacturing network - and it reinforces our commitment to drive growth in the North America region and serve our customers with quality, reliability, and speed." The new Nogales facility comprises 254,700 square feet, where more than 200 employees produce and ship mechanical and electronic locks to 40 countries worldwide, including the U.S., Canada, India, and Germany. The plant boasts an impressive safety record with more than 300,000 hours without a recordable injury as well as a strong leadership team with more than 20 years of combined experience. The new facility is located at Av. de los Nogales 170, San Carlos Oriente, 84090 Heroica Nogales, Sonora, Mexico.

iDenfy's new KYC tool: SMS verification for ANZ
iDenfy's new KYC tool: SMS verification for ANZ

iDenfy, an international RegTech provider specialising in identity verification and fraud prevention solutions, announced the launch of a phone number-based one-time verification feature for Australia and New Zealand. The new update to iDenfy’s SMS Verification solution adds an important dual, real-time verification layer: users both verify their phone and then continue to capture their ID document’s information, minimising chances of fraud. Since this flow is already familiar, the company claims to reduce manual effort from the end-user’s side, which, for businesses, will result in a lower drop-off rate. Weaknesses of registration systems iDenfy’s newly launched SMS Verification for Australia and New Zealand delivers a one-time passcode directly to a user’s mobile number during the KYC onboarding flow. This new verification layer stops fraudsters in their tracks before they even hit the login screen. By checking phone numbers via an OTP code sent via SMS during signup, companies can finally filter out users in real-time. And there’s a demand for that. In 2025, Australians lost at least $260 million to scams. That’s not just a money problem; it shows how easy it is to notice the current weaknesses of registration systems. Compliance officer intervention According to iDenfy’s CEO, Domantas Ciulde, the SMS verification workflow doesn’t disrupt the verification experience for genuine users. The SMS is sent in seconds, and the users are now able to efficiently continue the verification process on their mobile devices. “You now no longer have to scan QR codes or change devices”, added Domantas Ciulde. The system examines if the phone number is linked to the person who must complete the verification on time and is active and reachable. Companies are able to set up the SMS step as a singular security check or simply link it with iDenfy’s complete Know Your Customer (KYC) and Anti-Money Laundering (AML) suite solutions. iDenfy’s SMS verification capability is built to operate within Australia’s ID and New Zealand’s privacy acts to ensure that businesses and their clients can meet local regulatory expectations without any extra compliance officer intervention. This is vital, as Australia recently enacted the Digital ID Act 2024 and New Zealand’s Privacy Act 2020, in order to clarify expectations on how businesses must handle and verify personal data. Most scalable solution Moreover, fintech and neobanking institutions must comply with the latest AML and Counter-Terrorism Financing (AML/CTF) requirements, where a verified phone number has to serve as both an authentication factor and an audit trail element. Cryptocurrency exchanges that operate under AUSTRAC registration requirements in Australia face significant penalties for inadequate customer due diligence. For this reason, SMS verification adds a light but powerful verification step to existing KYC flows. With support for over 200 countries and territories, an average user onboarding time of 15 seconds, and the potential for 4x costs saved up through automated KYC, iDenfy’s mixed ID verification workflow can be by far the fastest and most scalable solution on the market. Studies from Microsoft data have shown that SMS one-time password (OTP) verification can also reduce account takeover fraud by up to 99.9% when layered with other identity checks. KYC onboarding procedure It’s worth mentioning that iDenfy’s SMS verification for Australia and New Zealand is available now to all current and new clients. The feature integrates directly into iDenfy’s existing API infrastructure, which requires minimal effort to activate. New clients can access SMS Verification as part of iDenfy’s standard KYC onboarding procedure or as an add-on to existing verification workflows. “We see too many platforms treat phone number verification as optional. In markets like Australia and New Zealand, where identity fraud is actively escalating, that approach carries real risk. Our SMS verification gives companies a fast, low-friction way to confirm that the person registering is who they say they are right from the first interaction,” added Domantas Ciulde, the CEO of iDenfy.

iDenfy's new KYC tool: SMS verification for ANZ
iDenfy's new KYC tool: SMS verification for ANZ

iDenfy, an international RegTech provider specialising in identity verification and fraud prevention solutions, announced the launch of a phone number-based one-time verification feature for Australia and New Zealand. The new update to iDenfy’s SMS Verification solution adds an important dual, real-time verification layer: users both verify their phone and then continue to capture their ID document’s information, minimising chances of fraud. Since this flow is already familiar, the company claims to reduce manual effort from the end-user’s side, which, for businesses, will result in a lower drop-off rate. Weaknesses of registration systems iDenfy’s newly launched SMS Verification for Australia and New Zealand delivers a one-time passcode directly to a user’s mobile number during the KYC onboarding flow. This new verification layer stops fraudsters in their tracks before they even hit the login screen. By checking phone numbers via an OTP code sent via SMS during signup, companies can finally filter out users in real-time. And there’s a demand for that. In 2025, Australians lost at least $260 million to scams. That’s not just a money problem; it shows how easy it is to notice the current weaknesses of registration systems. Compliance officer intervention According to iDenfy’s CEO, Domantas Ciulde, the SMS verification workflow doesn’t disrupt the verification experience for genuine users. The SMS is sent in seconds, and the users are now able to efficiently continue the verification process on their mobile devices. “You now no longer have to scan QR codes or change devices”, added Domantas Ciulde. The system examines if the phone number is linked to the person who must complete the verification on time and is active and reachable. Companies are able to set up the SMS step as a singular security check or simply link it with iDenfy’s complete Know Your Customer (KYC) and Anti-Money Laundering (AML) suite solutions. iDenfy’s SMS verification capability is built to operate within Australia’s ID and New Zealand’s privacy acts to ensure that businesses and their clients can meet local regulatory expectations without any extra compliance officer intervention. This is vital, as Australia recently enacted the Digital ID Act 2024 and New Zealand’s Privacy Act 2020, in order to clarify expectations on how businesses must handle and verify personal data. Most scalable solution Moreover, fintech and neobanking institutions must comply with the latest AML and Counter-Terrorism Financing (AML/CTF) requirements, where a verified phone number has to serve as both an authentication factor and an audit trail element. Cryptocurrency exchanges that operate under AUSTRAC registration requirements in Australia face significant penalties for inadequate customer due diligence. For this reason, SMS verification adds a light but powerful verification step to existing KYC flows. With support for over 200 countries and territories, an average user onboarding time of 15 seconds, and the potential for 4x costs saved up through automated KYC, iDenfy’s mixed ID verification workflow can be by far the fastest and most scalable solution on the market. Studies from Microsoft data have shown that SMS one-time password (OTP) verification can also reduce account takeover fraud by up to 99.9% when layered with other identity checks. KYC onboarding procedure It’s worth mentioning that iDenfy’s SMS verification for Australia and New Zealand is available now to all current and new clients. The feature integrates directly into iDenfy’s existing API infrastructure, which requires minimal effort to activate. New clients can access SMS Verification as part of iDenfy’s standard KYC onboarding procedure or as an add-on to existing verification workflows. “We see too many platforms treat phone number verification as optional. In markets like Australia and New Zealand, where identity fraud is actively escalating, that approach carries real risk. Our SMS verification gives companies a fast, low-friction way to confirm that the person registering is who they say they are right from the first interaction,” added Domantas Ciulde, the CEO of iDenfy.

Access control applications

Milestone Systems Arcules cloud-based VSaaS upgrade for school security
Milestone Systems Arcules cloud-based VSaaS upgrade for school security

A leading K-12 school district in the southeastern United States, recognised for its excellence in education, innovation, and community engagement, faced the growing challenge of keeping students and faculty safe while managing a complex video infrastructure. To maintain its high standards for safety and modernisation, they turned to Arcules cloud-based Video Surveillance as a Service (VSaaS).  The result is a flexible, scalable foundation that enhances visibility, strengthens cybersecurity, and simplifies daily operations. With hundreds of cameras deployed across multiple campuses, the district now manages its video infrastructure more efficiently than ever before.  Challenge: Growing district, growing demands The district’s on-premises video systems were aging, difficult to maintain, and expensive to upgrade. The addition of planned new schools and expanding facilities created greater coverage requirements that their existing technology could not meet. Administrators needed a secure, cost-efficient solution that could scale quickly, reduce maintenance time, and improve access for security staff across multiple campuses. They wanted a platform that could evolve with their needs, provide reliable visibility during emergencies, and ensure consistent performance with limited local IT resources. The system also had to align with cybersecurity and data privacy requirements while supporting the schools’ long-term digital transformation strategy. By modernising through the cloud, administrators saw an opportunity to standardise technology across campuses and free IT staff from constant system upkeep. Solution: Modernising security through the cloud After evaluating several options, the district selected the Arcules cloud-based VSaaS platform to replace its legacy systems. Built on Google Cloud, Arcules provides centralised monitoring, automatic updates, and strong cybersecurity protections. The subscription-based model turned large capital investments into predictable operating costs, allowing the district to expand video coverage as new schools were added, without the expense of physical servers or extensive reconfiguration. The transition also simplified security management, turning what was once a patchwork of local systems into one cohesive, always-up-to-date network, accessible from anywhere. Results: Safer campuses, simplified management The new Arcules VSaaS system gives security teams the ability to monitor all campuses from a single, intuitive interface. Real-time video access improves situational awareness and speeds up investigations. Automated updates reduce IT workload, while the cloud-based structure ensures consistent performance and uptime. With improved accessibility and lower maintenance demands, the district has gained a more reliable and cost-effective solution that supports its goal of creating safer learning environments. This success demonstrates how modern, cloud-connected infrastructure can strengthen campus safety while reducing the IT burden — a vital combination for growing school districts.

ZeroEyes enhances school safety with AI detection
ZeroEyes enhances school safety with AI detection

The Adrian Public Schools Board of Education approved the renewal of its ZeroEyes AI-based gun detection and intelligent situational awareness platform during its April 13 meeting, continuing the use of artificial intelligence technology designed to enhance school safety by monitoring existing security camera systems for potential firearms. The deployment has been in place since 2023. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Security safety enhancements If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and district officials as quickly as 3 to 5 seconds from detection. ZeroEyes is just one component of the multi-layered security safety enhancements that have taken place over the past few years.  The District has implemented multiple safety enhancements including a full overhaul of its security camera systems, the addition of weapon detection K-9 support across school facilities, and the installation of bullet-resistant and shatter-resistant glass in key areas of school buildings. Proactive safety planning Superintendent Nate Parker stated that the District remains committed to proactive safety planning. “The safety of our students and staff remains our highest priority,” Parker said. “We continue to take intentional, layered steps to strengthen our security systems and ensure our schools are prepared and protected. The renewal of ZeroEyes reflects that ongoing commitment.” Officer Joshua Perry of the Adrian Police Department, who serves as a School Resource Officer and participates in District safety planning, said collaboration has been central to the District’s approach. “These improvements demonstrate a strong partnership between schools and law enforcement,” Perry said. “The combination of training, communication, and technology significantly strengthens our ability to keep students and staff safe.” Partnerships with innovative technology As these collaborative safety efforts continue to evolve, partnerships with innovative technology providers like ZeroEyes remain a key component of the district’s strategy. “Adrian Public Schools’ continued investment in layered, proactive security demonstrates a clear commitment to protecting students and staff,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By renewing their partnership with ZeroEyes, the district is strengthening its ability to identify and respond to potential threats in real time, giving first responders critical information when every second counts. We’re proud to support Adrian in creating a safer learning environment for its community."

Multicare's integrated security system benefits healthcare
Multicare's integrated security system benefits healthcare

The healthcare organisation based in Washington state has begun a journey of unifying its video surveillance and access control under one platform, yielding better situational awareness, streamlining investigations, and providing an additional level of safety and security to staff and patients alike. Multicare Health System in Washington State employs more than 20,000 team members across 11 hospitals and more than 300 medical clinics, laboratories, medical imaging, pharmacies and specialty services locations. Physical security assets As a large healthcare organisation, Multicare has many levels of security to attend to, including slips and falls, patient care, guest management, parking and perimeter security, staff and security officer safety and much more. “We had multiple video management system (VMS) solutions and multiple systems were outdated and past their end of life. We needed to consolidate into a single, unified solution with a global interface,” Davis explains. When Joshua Davis, technology system support coordinator, joined MultiCare in 2018, he oversaw the upkeep, implementation and eventual retirement of the organisation’s physical security assets, including its outdated NVR solution, legacy analogue surveillance cameras, as well as access control and video management solutions. Access control solutions Like many robust and expanding organisations, MultiCare has added new sites and facilities over the years, finding itself with disparate security, video surveillance and access control solutions. Prior to upgrading that technology, operators were pulling video footage via a flash drive transfer at legacy sites when incidents occurred. The organisation was experiencing challenges of using older equipment too, and the access control solution didn’t have two-way integration with the VMS, making analytics cumbersome and difficult to manage. Centralised security operations With a focus on efficiency, as well as saving time and money, Multicare wanted a consolidated, easy-to-navigate platform for security staff to be able to view, respond to incidents and pull security video footage as needed. With one centralised security operations centre running 365/24/7, along with about 100 other workstations running video at any given time throughout the organisation’s locations, Davis also needed a way to streamline the number of permissions, access and remote troubleshooting and capabilities across the entire organisation. So, a few years ago, Multicare partnered with integrator Entrance Controls and technology partners, Salient Systems and AMAG Technology, to begin the process of integrating its video surveillance, while upgrading its cameras, VMS, surveillance capabilities and access control operations. IP video capabilities “This was a team effort to pull off a project of this size. We needed to make sure that calculations, server type, and correct camera counts/types were accounted for. We all worked together to make sure that everyone was kept in the loop,” explains Blake Albertsen, regional sales manager for Salient Systems in the Pacific Northwest and Western Canada. The healthcare organisation has nearly completed its security upgrades: upgrading the VMS to a unified platform from Salient Systems; installing roughly 90 servers to allow the organisation to experience full IP video capabilities; upgrading its 3,000-plus analog cameras to IP as they age out, as well as using Salient’s GEN II Capture card technology to get extra life and optimised capabilities out of other existing analogue cameras without having to invest in encoders. Better situational awareness In addition, two-way integration with AMAG’s Symmetry Access Control system and Salient Systems’ CompleteView VMS allows Davis and his team to pull up, search and see motion-related video clips associated with access control events whenever necessary, yielding better situational awareness and streamlining investigations. “We spent over 18 months developing the plan and design of each server before we ever placed one server into the Multicare platform. There were so many different moving pieces we needed to make sure were in place for a successful upgrade,” Albertsen says. Single VMS solution The upgrades have allowed Multicare to not only boost security, safety and efficiency, but it has also saved Davis and his staff significant time already. “Before we had a centralised, single VMS solution, we didn’t have capabilities of customising camera views at every location. Some locations have more cameras than others and once our staff had a view that had been created for them, they couldn’t change the view,” Davis says. Now, the VMS allows staff and operators the ability to easily customise their surveillance views and change those views depending on the locations, cameras and angles they need to see. This has come in handy in many ways, especially when hospital staff need to see a specific room for a day or a period of time depending on what’s happening, but don’t need to watch that view all the time. “The interface has improved our usability dramatically because it’s so customisable,” Davis adds. Indoor and outdoor cameras Another unexpected benefit of the security upgrades thus far has been the peace of mind a unified security platform has given to Multicare employees. Because both indoor and outdoor cameras are all on one centralised platform, hospital employees can be escorted by security to access perimeter cameras in parking garages or outdoor locations when leaving at night so they can virtually scan the area before exiting the building. “That has given many team members a feeling of additional safety, which has been great for staff,” Davis says. Over the next several years, Multicare will continue to upgrade its legacy cameras and servers across sites it hasn’t reached yet, with the ultimate goal of having all its video surveillance under one, customisable platform. Benefits of centralised security In addition, according to Davis, as the healthcare system has begun to experience the benefits of centralised security, they would like to expand the number of cameras and views at many facilities, while also expanding uses and capabilities of the system. “We are taking baby steps as it’s an expensive endeavour, but we are growing exponentially and we see an opportunity to expand our capabilities and use into continuing to provide excellent patient treatment and overall security at our locations,” Davis says.

Enhance business intelligence with key control systems
Enhance business intelligence with key control systems

In today’s hospitality environment, properties are expected to deliver exceptional guest experiences and airtight operational security. But juggling physical safety, digital privacy, vendor coordination, and staff accountability isn’t easy – especially when legacy systems like pegboards, logbooks, or unmanaged key drawers are still in use. Intelligent key control systems help users modernise their security while unlocking operational insights for better business decisions. Here are eight ways users can improve security and business intelligence at their facilities using key control: 4 hospitality security enhancements Enforce Access Control: A networked key control system secures high-risk areas like storage, housekeeping, and back-of-house offices with real-time visibility and alerts. Reduce Risk of Internal Theft or Misuse: Automated key storage with audit trails deters misuse and helps quickly identify issues, lowering theft and liability exposure. Improve Accountability and Guest Protection: Detailed tracking holds staff accountable, highlights unusual behaviour, and strengthens guest and personnel safety. Reduce Rekey Expenses: A networked key control system prevents lost keys and lets you trace usage instantly, reducing costly rekeying. 4 business intelligence boosters Spot Trends with Key Usage Reports: Automated reports show which areas and tools are used most often, helping users plan staffing, prepare supplies, and detect anomalies. Streamline Vendor and Contractor Access: Grant time-limited, role-based permissions to contractors and deliveries, reducing the need for staff supervision and easing the front desk workload. Maximise Asset Utilisation: Keys unlock more than rooms. They also access golf carts, radios, minibars, tools, and more. Tracking usage helps manage inventory, reduce loss, and improve availability. Update Access Instantly: With centralised software, users can revoke or adjust permissions across the property in seconds – safer and faster than manual updates.