Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
AuditBoard, the AI-powered global platform for connected risk transforming audit, risk, and compliance, announced the launch of Accelerate, a powerful new AI solution that delivers natural-language workflows, continuous auditing and monitoring, document intelligence, and agentic AI. The launch builds on the strong foundation of AuditBoard’s existing AI innovations, further empowering global risk teams with the world’s first AI-driven connected risk platform. AuditBoard’s new AI functionality “AuditBoard’s AI has already been instrumental in our security risk oversight, and we’re just scratching the surface of its potential,” said Olabode Olaoke, Head of Cybersecurity Risk, Block. “It has fundamentally changed how our teams work, generating faster insights and helping us make a meaningful impact on the business. We’re eager to see how AuditBoard’s new AI functionality will revolutionise our workflows and unlock the next level of efficiency for our team.” Transformational GRC-trained AI With Accelerate, risk teams can deliver proactive insights and become a strategic enabler of the business, compliance teams can move faster and elevate their role as enablers of security, trust, and growth, and internal audit teams can shift from executing manual control checks to analysing root causes and delivering strategic insights to the CFO and executive leadership. Accelerate consolidates AuditBoard’s newest AI capabilities into a single experience for these teams, including: Audit Agent: Transform audit fieldwork by reducing weeks of work into hours through accelerated control testing and documentation cycles. Leverage AI to select representative, risk-based samples that improve accuracy, consistency, and audit efficiency. And, rapidly annotate large volumes of receipts and supporting documents to streamline testing. Continuous monitoring and continuous auditing: Eliminate manual evidence collection and reviews, and move away from point-in-time assurance with continuous auditing and control testing. Document Intelligence: Turn raw notes into audit-ready artefacts to glean insights and generate stakeholder reports, consolidating progress and insights from multiple audits into clear status summaries. Automatically transform walkthrough notes into detailed narratives and cross-audit summaries that surface key risks, processes, and trends to enhance coverage and insight. Enterprise-grade capabilities of AI "Accelerate is a huge unlock for how our customers run their teams," said Happy Wang, Chief Product and Technology Officer at AuditBoard, adding "GRC teams can leverage the enterprise-grade capabilities of AI Accelerate to automate fieldwork, generate audit-ready outputs, and surface real-time insights — truly becoming strategic partners for their business." Oversight, compliance, and internal standards AuditBoard’s AI is designed for precision and accountability. Capabilities are domain-trained, secure, and auditable, with actions logged and traceable to support oversight, compliance, and internal standards. Practitioners remain in control, applying human judgement while AI accelerates the work.
Kaseya, the pioneering provider of AI-powered IT management and cybersecurity software for small businesses, announced its fall 2025 innovations. The release includes more than 90 enhancements aimed at transforming customer outcomes and economics through automation, cybersecurity, and end-to-end experience. End-to-end IT and security platform “These new capabilities deliver on the direct feedback we have received from our partners,” said Jim Lippie, Chief Product Officer at Kaseya. “MSPs want to grow faster, expand margins and protect customers from rising cyberthreats, without having to increase labour cost. We are accelerating our pace of innovation to deliver exceptional customer outcomes and lead the market as the only true end-to-end IT and security platform for small business.” Improvements in automation, cybersecurity and customer experience In addition to the game-changing capabilities recently announced at DattoCon, like the Sirus 6 appliance, the acquisition of email security solution INKY, and Datto Backup for Entra ID, Kaseya has made dozens of improvements in automation, cybersecurity and customer experience in its fall 2025 release. “Kaseya is changing the way we work in ways we never thought possible,” said Chris Collins, Owner at CBC Technovations. “Their automations have allowed us to take on more clients without adding any additional headcount. Our technicians are more efficient, our margins are improved, and thanks to Kaseya’s security-first approach, our customers are better protected.” Highlights in the Fall 2025 release AI-driven automation Kaseya’s industry-best AI and data platform delivers powerful automations that enable partners to offer value-expanding services while decreasing operating costs. Smart Ticket Triage in Autotask — Accelerate response times by automatically categorising, prioritising and routing tickets based on content - no manual sorting needed. Backup Reporting in Datto Endpoint Backup — Automatically generate QBR-friendly, executive backup reports across all assets. OneDeploy Secure Edge VPN for Datto BCDR— Automatically connect end users to Datto Cloud DR resources via Secure Edge SASE, eliminating manual VPN configuration. Cybersecurity Kaseya’s connected security platform combines end-to-end integration to deliver enterprise-caliber protection from an ever-expanding set of threat vectors. Smart Investigate in Datto EDR — Use AI to analyse EDR alerts or email threats to surface clear, actionable investigation guidance, eliminating manual analysis. Safe Password Sharing in IT Glue — Share passwords securely with anyone, even outside IT Glue, using MFA, expiration controls, and audit trails. Customer event-based indicators of compromise (IOCs) in SaaS Alerts – Build precise threat detections with event triggers, filters and rules to reduce noise and enable faster response. Customer experience Kaseya is innovating to make doing business easier for MSPs, ensuring an exceptional end-to-end experience from onboarding to customer billing. Automation Centre for Integrations in KaseyaOne – Easily discover platform automations by accessing a personalised catalogue of integrations, streamlining operations by quickly enabling automated workflows. Umbrella contracts in Autotask – Create and manage all billing agreements for a client in a single contract, improving visibility and simplifying oversight. Pay Now in Autotask and ConnectBooster – Clients can now pay invoices instantly through the Autotask client portal, powered by ConnectBooster, accelerating cash flow while making the process more convenient.
AuditBoard, the pioneering AI-powered global platform for connected risk transforming audit, risk, and compliance, announced it has reached a definitive agreement to acquire FairNow, an end-to-end, purpose-built AI Governance (“AI Gov”) platform. FairNow further enhances AuditBoard’s industry-pioneering capabilities with intelligent, automated, and step-by-step AI compliance guidance. With AI Governance requirements expanding globally, AuditBoard customers are now uniquely positioned to stay compliant and mitigate AI-related risks. New AI solution for GRC teams This acquisition is coupled with the release of Accelerate—AuditBoard's powerful, new AI solution for GRC teams, also announced now. The integration of FairNow’s dedicated AI Governance solution aligns with the strong foundation of AuditBoard’s natural-language workflows, continuous auditing and monitoring, document intelligence, and agentic AI, creating a truly end-to-end AI-powered platform for managing risk. All of which builds on AuditBoard’s existing commitment to both AI innovation — and safety — following the announcement of its first AI governance solution earlier this year. Upcoming AI governance requirements FairNow's platform enables organisations to simplify their end-to-end AI governance with a streamlined AI registry, dynamic risk assessments, and intelligent automated compliance. This unified offering directly addresses the execution gap in AI governance. A key finding in AuditBoard’s Risk Intelligence Report, released just last week, identified that fewer than 30% of pioneers feel prepared for upcoming AI governance requirements, indicating a lack of clear ownership that undermines trust. For many organisations this means seeking compliance with frameworks such as the NIST AI Risk Management Framework, ISO/IEC 42001, and the EU AI Act, which provide structured guidelines for responsible AI development and deployment by addressing areas like fairness, transparency, risk management, and data governance. AuditBoard’s Connected Risk Platform “The speed of AI adoption has made robust, connected AI governance a mission-critical function for enterprises across every industry,” said Raul Villar Jr., CEO of AuditBoard. “Integrating FairNow into AuditBoard’s Connected Risk Platform delivers the most comprehensive and modern solution on the market, directly addressing the enormous risks that come alongside this technology." "Combined with the launch of Accelerate, this acquisition will set AuditBoard apart by leapfrogging nascent competitive offerings and empowering our customers to transform their risk and compliance programs.” AI-powered connected risk Guru Sethupathy, CEO and Founder of FairNow, echoed this excitement. “FairNow believes that governance will be the key enabler in the age of AI - managing risks while building trust and driving adoption,” said Sethupathy. “Our mission to simplify AI governance will be accelerated with AuditBoard, the clear pioneer in AI-powered connected risk. Joining AuditBoard is the logical next step in our journey to scale our impact. We look forward to working with the AuditBoard team to solidify the platform’s position as the global go-to solution for modern risk management - intelligent, automated, and connected.” The acquisition is intended to significantly expand AuditBoard’s platform, creating a unified, AI-first solution for managing all enterprise risk. Morrison & Foerster LLP served as AuditBoard’s legal advisor.
Wavestore, a global provider of video management systems (VMS), announced the release of WaveView v6.44, the latest version of its platform designed to cut incident response times and streamline daily security operations. The update introduces core enhancements, including Interactive Maps, a redesigned device navigation system, and improved search and review workflows, aimed at helping operators, integrators, and end-users work faster and more effectively. Importance of time “Security teams tell us that minutes lost during an incident can make the difference between containment and escalation,” said Sam Shalaby, CEO of Wavestore. “With v6.44, we’ve focused on the fundamentals - ensuring operators can locate cameras in seconds, investigators can review video without impacting live operations, and integrators can deploy systems more efficiently.” Refined platform “These improvements address the real-world pressures faced by operators and integrators every day,” added Mark Claxton, Managing Director of Wavestore. “We’ve deliberately refined the platform so that anyone using it - from control room staff to forensic analysts - can do their jobs more effectively, with less training and fewer distractions.” Interactive Maps: Place and control cameras directly on floor plans, improving situational awareness. Expand All Navigation: One-click expansion of full device trees for faster access in large deployments. Offline Review-Station Support: Review exported video drives without affecting live monitoring. Bulk List Management: Upload licence plates, object IDs, and identifiers via CSV for quicker setup. Enhanced Filtering and Search: Smarter navigation through complex system hierarchies. The company said the release reflects a “foundation-first” approach, strengthening the underlying interface and workflow tools on which advanced analytics, integrations and automation features can be built. The v6.44 update is available immediately.
Access control applications
Ericeira, a seaside town on the western coast of Portugal, is a popular tourist destination and is known as one of the top surfing destinations in Europe. It has a population of just over 10,000 citizens with this increasing during the busy summer season. The Municipal Council of Mafra, the local government body overseeing the region, recognised that the increase in traffic during the summer months needed greater monitoring and control to reduce congestion and the risk of accidents. Improving traffic and pedestrian flow A national road, 247, is the main through route for the town and, therefore, is priority for an intelligent traffic management system. At marked crossings where traffic will stop for pedestrians, congestion was particularly acute. The council wanted a solution that would prevent static, inefficient traffic and could adapt to dynamic changes in vehicle and pedestrian flow. Local installer Soltrafego undertook a detailed technical study that identified the need for intelligent video surveillance and traffic analysis. Hanwha Vision was chosen due to its effective and robust cameras. Monitoring congestion Cameras were installed at signal-controlled intersections, with four QNO-C8083R AI cameras installed per intersection. Two were positioned to monitor traffic in both directions, and the other two covered pedestrian areas. Entry and exit zones were set up to monitor vehicle flow, counting the number of vehicles and sending this volume data to traffic light controllers. Traffic light red and green intervals would be automatically adjusted according to detected traffic density. Two virtual zones on each side of the pedestrian crossings were set up on the other two cameras to monitor the number of people waiting in those areas. When the number of people reaches a pre-defined threshold, the pedestrian green light is triggered, and traffic is stopped to prevent overcrowding at the waiting area and ensure a safe crossing for pedestrians. A boosted traffic and pedestrian experience Thanks to the implemented intelligent traffic solution, vehicle and pedestrian movements in Ericeira have improved, especially during the summer months. Optimised traffic light timing based on real-time, dynamic data from the QNO-C8083R cameras avoids unnecessary delays and lowers the risk of accidents at the crossing points where the cameras are installed. Automating traffic light and pedestrian crossing controls improves operator efficiency and meets actual demand without manual input. The cameras were installed within existing infrastructure, requiring no extensive construction or physical alterations. The data collected by the cameras can be used to inform future town improvements, and the installation has become a pilot model for other towns in the area that are facing similar challenges.
Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In the report, Cybersecurity Analyst Stan Wisseman recognised Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organisations run behind on patching an average of 56 days. Although organisations set their own patching schedules, this is well beyond the accepted 30-day standard set by organisations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index. With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognised Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customisation: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organisation’s business priorities. Workflow Integrations: GigaOm emphasised Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).
As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialised surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution colour footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.
Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specialises in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.