Mobile Access Trends

What is the role of ethical hacking in physical security?
What is the role of ethical hacking in physical security?

In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?

What is the next generation of physical security solutions?
What is the next generation of physical security solutions?

Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Latest Access control news

Z-Wave spring summit: Interoperability event 2026
Z-Wave spring summit: Interoperability event 2026

The Z-Wave Alliance, the standards development organisation dedicated to advancing the smart home and Z-Wave® technology, is pleased to announce the schedule of events for the Z-Wave Spring Summit 2026. Taking place May 27-29, 2026, in Vienna, Austria, this event brings together leaders from across the entire Z-Wave ecosystem for three days of collaboration, discussion, planning, testing, networking, and education. The upcoming Z-Wave Spring Summit will feature a comprehensive schedule including a dedicated Unplug Fest, intimate fireside chat sessions, marketing and technical working tracks, interactive panels and a range of social and networking opportunities designed to unify the Z-Wave community. Recently certified devices The Z-Wave Spring Summit kicks off with Unplug Fest, the Alliance’s hands-on interoperability testing ground, refined for 2026 to focus on real-world deployment scenarios and large-scale network performance. This year’s event centres on the simultaneous operation of Z-Wave mesh and Z-Wave Long Range (ZWLR) networks within a live environment, demonstrating how diverse device types and network topologies can seamlessly coexist. Participants will test new and recently certified devices in dynamic conditions, reinforcing Z-Wave’s reliability at scale. Live demonstrations will highlight key capabilities, including: Simultaneous mesh and ZWLR operation on a single network Multiple networks operating in parallel in dense environments SmartStart commissioning for rapid, QR-based device onboarding Dynamic routing and Explorer Frames for automatic optimisation Multicast control for synchronised low-latency device response Low-latency device response While interoperability testing remains exclusive to members, select demonstrations during the Unplug Fest portion of the Spring Summit will be open to installers and non-members, offering a first-hand look at Z-Wave’s performance, scalability, and ease of deployment. Following Unplug Fest, the Summit opens with a full day of joint sessions designed to explore key industry trends and showcase the strength of the Z-Wave ecosystem. This portion of the event is open to Z-Wave Alliance members, as well as installers, developers, and non-members interested in working with Z-Wave. Key market trends The first day of sessions begins with a welcome address from Chairman Avi Rosenthal outlining the Alliance’s direction and key opportunities ahead, followed immediately by a member-driven fireside chat discussing the evolution of Z-Wave and the role of collaboration in driving the ecosystem forward. The day one agenda will also include sessions that address the Cyber Resilience Act (CRA), cover emerging innovations such as the Z-Wave Wake on Event End Node (WOEEN) role type, discuss the intersection between AI and the future of the intelligent home, and reveal key market trends and insights.   Member-exclusive working sessions The Summit concludes with a full day of member-exclusive working sessions across technical and marketing tracks, focused on advancing the Z-Wave ecosystem from both a product and market perspective. Key areas of focus include: User Credential Command Class v3 (UCCCv3), Aliro, and device evolution Z-Wave Certification and compliance Technical roadmap preview with new opportunity discussion Z-Wave Long Range (ZWLR) and market growth Marketing strategy and go-to-market execution Early bird registration Z-Wave Alliance members can take advantage of early bird registration for $399 USD through April 30, 2026. Beginning May 1, standard registration for the Spring Summit and Unplug Fest will be $599 USD. Installers, integrators and non-member companies interested in developing with Z-Wave can register for $99 USD, which includes access to select Unplug Fest demonstrations showcasing Z-Wave in action on May 27th, and the joint sessions on May 28th. Reference the posted agenda to see which sessions are available to non-member attendees. The Z-Wave Alliance thanks the generous sponsors who make the Spring Summit possible. Sponsors of the Spring 2026 event include: MK Logic (Gold) Silicon Labs (Gold) Trident IoT (Gold) Vision (Gold) Zooz (Gold) Aeotec (Unplug Fest Sponsor) BlueConnect Partners (Break Sponsor)

AMAG partners With SwiftConnect for mobile wallet access
AMAG partners With SwiftConnect for mobile wallet access

AMAG Technology, a pioneer in global access and identity solutions, announces an expanded strategic partnership with SwiftConnect, a provider of the connected access network for places and spaces. As part of this expanded collaboration, SwiftConnect will now power Apple Wallet and Google Wallet mobile credential activation across AMAG’s portfolio. This milestone represents a continued acceleration of AMAG’s strategy to deliver modern, mobile-first identity experiences while aligning with best-in-class partners to move faster and execute at the highest level for customers. Scalable digital wallet capabilities By deepening its partnership with SwiftConnect, AMAG is enhancing its ability to deliver seamless, scalable digital wallet capabilities, ensuring customers benefit from specialised expertise and a superior user experience across the entire lifecycle. “We are incredibly excited to expand our relationship with SwiftConnect,” said David Sullivan, CEO and President at AMAG Technology. “This allows us to accelerate innovation and deliver a truly best-in-class digital wallet experience. It’s about aligning with the right partners to build something exceptional for our customers.” User-centric access solutions SwiftConnect’s expertise in mobile access and wallet technologies will strengthen AMAG’s broader platform, supporting enterprise, critical infrastructure, and commercial customers as they transition to more flexible, secure, and user-centric access solutions. “AMAG is setting the standard for what modern access should feel like, and SwiftConnect is proud to serve as the mobile wallet platform powering its Apple Wallet and Google Wallet experience,” said Matt Kopel, Co-CEO at SwiftConnect. “As the connected access network, we make access feel effortless for every person, across every space — replacing friction with fluidity, without proprietary lock-in.” Partner-driven approach At the core of this announcement is AMAG’s commitment to an open, partner-driven approach to innovation. At AMAG, openness is not just about compatibility; it is about intentional collaboration. The company builds its platform through a curated ecosystem of technology partners, each bringing best-in-class capabilities. True openness is about unlocking possibilities and creating solutions that evolve faster, integrate more deeply, and perform better for customers. Bringing together strategic partners This philosophy reflects a broader shift in how AMAG brings solutions to market, prioritising speed, innovation, and customer outcomes over traditional, closed approaches. “This is bigger than a single product or feature,” added Jennifer Marx, Executive Vice President-Product Management at AMAG Technology. "It reflects our core belief that the best solutions come from intentional collaboration, bringing together strategic partners who are leaders in what they do. That's how we show up in the market: open-minded, forward-looking, and relentlessly focused on delivering best-in-class experiences. That's the future we're building, together."

OpenEye boosts cloud video security in Northern Europe
OpenEye boosts cloud video security in Northern Europe

OpenEye, a provider of cloud-managed video surveillance solutions, continues to expand their global team with recent additions in Northern Europe and the United Kingdom.  With the hiring of Regional Sales Manager Christopher Åkesson, Channel Business Manager Robin Molenaar, Technical Sales Engineer Daniel Barker, and International Marketing Manager Leigh Domingo Hughes, OpenEye adds security experience and support for its cloud video platform across Northern Europe and continued efforts in the UK. Security industry experience Neil Killick, Vice President of International Sales, said, “We’re happy to welcome Christopher Åkesson, Robin Molenaar, Dan Barker, and Leigh Domingo Hughes to the OpenEye business. We believe these appointments demonstrate our serious commitment to further develop and support our key partners within the UK and Northern European regions. Each of these new team members bring great knowledge, success, credibility, and insight into tech savvy, forward-thinking regions. We welcome them to the OpenEye team.” Christopher Åkesson will help support OpenEye sales teams and provide OpenEye products to the Nordic regions. Christopher brings nearly two decades of security industry experience to his role, starting out as a distributor of IP video throughout Europe. During his years working under companies such as Senstar and Milestone, Christopher operated in a variety of different roles, performing both technical support and sales duties. Now, he is stepping into his new role with OpenEye, an exciting venture for the international team. Cloud video solution “I’m looking forward to bringing the OpenEye solution into the Nordic region,” Christopher Åkesson said. “As a solution, I believe the cloud-managed and flexible nature of OWS will be a breath of fresh air for businesses and organizations in the area. I’m very keen on growing this team and am eager to be able to offer this powerful platform to potential customers.” OpenEye is excited to welcome the various team members to the international team and looks forward to delivering a cloud video solution to companies in these regions. If users are interested in seeing what a cloud video solution could do for their business, book a demo today to see how OpenEye can elevate the security and workplace operations.

Facial recognition at River Spirit Casino
Facial recognition at River Spirit Casino

On the banks of the Arkansas River in Tulsa, Oklahoma, the River Spirit Casino Resort is the second largest of nine casinos owned by Muscogee Nation Gaming Enterprises where, on any given day, an enormous amount of money exchanges hands - requiring a comprehensive security framework to protect those who are playing with, handling, transferring, and protecting such large sums. From a security posture, it is a complex, cross-site operational challenge that needs to follow a simple set of procedures: Deter, detect, notify, and ultimately, defend. As large, wide-open environments with many entry and exit points, casinos create a particularly difficult landscape to comprehensively secure - it is humanly impossible to monitor everything at all times for a multitude of threats. Moreover, Muscogee Nation Gaming Enterprises operates multiple properties, so managing the number of people they have to watch while consolidating all relevant information into a centralised location is challenging. Large resort environment Some of the challenges facing River Spirit Casino included: Thefts - Theft and fraud in casinos are rampant. Increasingly sophisticated mechanisms of theft are challenging casino operations teams to get ahead of crime in order to effectively protect guests, staff, and assets. And the River Spirit Casino team was having difficulty recognising faces of persons of interest (POIs), which included banned patrons, known criminals, and self-excluders amidst the sheer volume of people traversing through the casino’s vast property each day. Reputational Risk - In a large resort environment, casinos have a reputation to uphold so they work hard to identify self-excluders, advantage players, and bad actors as soon as possible and ban them in order to preserve their brand and ensure that their guests feel safe and comfortable. Compliance - Money laundering threats, ever-changing regulations, and compliance with the Anti-Money Laundering Act of 2020 heighten the necessity of maintaining the integrity of operations. Labour shortages - Labour shortages are only adding to the complexity. According to the U.S. Bureau of Labour Statistics, approximately 165,000 openings are projected for security guards and gambling surveillance officers annually, on average, over the next decade. Human limitations - River Spirit has a watchlist of close to 1000 individuals. Having security guards memorise the faces of all the people on a watchlist of that size is impractical given the number of patrons streaming into the various entrances at any given time. Investigations - Casinos require security technology that has the ability to monitor activities both in real-time and retrospectively – software that incorporates analytics to track behavior patterns and alert teams as an event is happening, and after it’s happened. Successful daily operations “That’s why we looked for an AI solution to actually help us control those faces and say this is the person I’m looking for. Tell me if they’re here or they’re not.” –Travis Thompson, Director of Compliance, Muscogee Nation Gaming Enterprises. Muscogee Nation and its systems integrator, Orion Security Solutions, turned to Oosto to take their casino’s enterprise security systems to a new level and solve their existing challenges. OnWatch quickly became an instrumental tool in the successful daily operations of River Spirit Casino. Oosto’s facial recognition technology indexes every face coming in from seven different entrances from several different angles on 25 different cameras for BOLOs (“be on the lookout”), banned patrons, known criminals, and advantage players. The company’s proprietary module, Centralised Intelligence Dashboard, helps run reports and share information easily across the organisation with an easy-to-implement workflow. Facial recognition solutions The human eye alone is imperfect, and most facial recognition solutions underperform in real-world conditions. Casinos are especially challenging environments because: The facial recognition system needs to recognise banned patrons when the cameras are positioned high on the walls and ceilings (creating acute camera angles), People are entering in large groups, Visitors are not looking directly at the camera, and They're often wearing face coverings (e.g., masks, glasses, hats, etc.). Addressing compliance risks The ability to spot bad actors in real-time under these conditions and to do it accurately is a challenging task. That’s why Oosto’s technology is an essential security tool for gaming operations. “The key is being able to identify people of interest accurately and to do it in a way that is proactive and allows the property to respond in an appropriate manner.” – Sean Crain, President, Orion Security Solutions. Oosto OnWatch quickly and accurately recognises persons of interest for casino security teams – from VIPs to banned players – to improve the player experience, address compliance risks, and make casinos safer, more enjoyable destinations. Oosto can identify a person of interest and the people they have come in contact with through both face and attribute recognition in real-time or in historical footage, and get an alert instantly on any device. Historical video footage “Knowing your customer is an extremely difficult task in the casino industry,” says Mr. Thompson. “But this is how we leverage Oosto’s technology to help identify and show that we are doing our due diligence in getting to better know our customers.” If a crime happens on the property and River Spirit Casino’s team needs to look retrospectively at historical video footage for information on activity leading up to, during, and after the crime, OnWatch can ingest video from multiple sources and quickly analyse the footage to inform teams about the full context of a perpetrator’s actions. With Oosto, River Spirit can expedite investigations by searching through hours of offline video footage for persons of interest in a matter of minutes. Facial recognition providers According to Mr. Thompson, “The investigations tool is a critical piece to how we use Oosto - it’s one of the areas I really enjoy the most about it. We can backward search or we can forward search from the point we put in and so we know when people have been on our property and I think that’s extremely helpful to us.” Oosto OnWatch allows for tracking of POIs and criminals who've committed crimes in other properties, and River Spirit Casino staff are thus able to work with law enforcement to more effectively keep them out. OnWatch is also leveraging River Spirit Casino’s existing camera (CCTV) infrastructure and VMS system. Thus, Oosto’s solution did not require the purchase of new cameras or even the repositioning of existing cameras to identify individuals on a watchlist in real-time, which differentiates Oosto from other facial recognition providers. Improving operational efficiency Ultimately, “It ended up being a fantastic solution for us, very effective in the areas we want to be effective,” said Jeff Brooks, Chief Information Officer, Muscogee Nation Gaming Enterprises. “Not overly intrusive to our guests, but also keeping bad actors out of our facilities.” Oosto’s facial technology software has helped the River Spirit Casino shape a stronger security posture in the face of daily threats while improving operational efficiency. With fewer false positives than anyone else in the industry, Oosto’s software is prized for its unparalleled accuracy. That means when OnWatch triggers a detection, River Spirit Casino’s security knows with a high degree of certainty that the person that has been identified is, in fact, the person on the watchlist - leading to far fewer false alarms that allow the security team to take any alerts coming in very seriously. Five positive detections As a result, River Spirit Casino’s security team sees “Anywhere from three to five positive detections per day now that we are actually 100% positive by the process of identifying them and IDing them, “ says Mr. Thompson. “That person is escorted off property or based on their history they could have warrants and our tribal police can arrest them at that time.” Moreover, says Mr. Thompson, “I've had several outside agencies that we’ve worked with that come back in and say, man I wish we had this and you’re talking about at a government level they don’t have this. We’ve got something they don’t have and we use it in a very ethical and responsible way.” Strong client service Oosto’s Vision AI technology is helping gaming organisations like Muscogee Nation Gaming Enterprises stay focused on the fundamentals of strong client service while remaining resilient as the marketplace continues to shift. As forward-thinking casino companies look to stay competitive, grow revenues, solve business challenges, gain greater operational efficiencies and ensure safer, more secure spaces, they look to Oosto - and then never look back.

Access control applications

Enhance business intelligence with key control systems
Enhance business intelligence with key control systems

In today’s hospitality environment, properties are expected to deliver exceptional guest experiences and airtight operational security. But juggling physical safety, digital privacy, vendor coordination, and staff accountability isn’t easy – especially when legacy systems like pegboards, logbooks, or unmanaged key drawers are still in use. Intelligent key control systems help users modernise their security while unlocking operational insights for better business decisions. Here are eight ways users can improve security and business intelligence at their facilities using key control: 4 hospitality security enhancements Enforce Access Control: A networked key control system secures high-risk areas like storage, housekeeping, and back-of-house offices with real-time visibility and alerts. Reduce Risk of Internal Theft or Misuse: Automated key storage with audit trails deters misuse and helps quickly identify issues, lowering theft and liability exposure. Improve Accountability and Guest Protection: Detailed tracking holds staff accountable, highlights unusual behaviour, and strengthens guest and personnel safety. Reduce Rekey Expenses: A networked key control system prevents lost keys and lets you trace usage instantly, reducing costly rekeying. 4 business intelligence boosters Spot Trends with Key Usage Reports: Automated reports show which areas and tools are used most often, helping users plan staffing, prepare supplies, and detect anomalies. Streamline Vendor and Contractor Access: Grant time-limited, role-based permissions to contractors and deliveries, reducing the need for staff supervision and easing the front desk workload. Maximise Asset Utilisation: Keys unlock more than rooms. They also access golf carts, radios, minibars, tools, and more. Tracking usage helps manage inventory, reduce loss, and improve availability. Update Access Instantly: With centralised software, users can revoke or adjust permissions across the property in seconds – safer and faster than manual updates.

Facial recognition in Raphael hospital security
Facial recognition in Raphael hospital security

Israel offers one of the most advanced medical systems in the world where cutting-edge treatments and patient care are provided by some of the best medical professionals using high-tech equipment in modern facilities. As such, medical tourism is growing exponentially in Israel. The country’s Ministry of Health shows that more than 50,000 medical tourists travel to Israel for treatments every year and consistently ranks in the Top Ten in the globe for health tourist destinations. Raphael Hospital is Israel’s newest and most advanced hospital. It is a state-of-the-art private hospital recently opened in Tel Aviv. Advanced medical systems A team of experts, drawing from best practices around the globe, designed Raphael Hospital to be technologically advanced and to provide a premium standard of care and services. It is staffed by senior doctors who are some of the most experienced in their respective specialties. Everything about its construction, for example, was thoughtfully planned for — even the types of tiles used on the hospital flooring: they come with “an integrated antibacterial shield that is 99.9% effective against bacteria, 24 hours a day, in all light conditions.” Special emphasis is placed on a patient’s overall wellbeing, mentally and physically, and thus the physical space is designed to appeal to patients from both an aesthetic sense (to promote an inviting, welcoming feel much like a luxury hotel), and a high-tech approach, in order to maintain maximum patient safety, efficiency, and the finest level of medical care. Physical security risks Hospitals are among the most essential and vulnerable spaces worldwide. In terms of security, hospitals are often considered “soft targets” — along with shopping malls, schools, and sports arenas — because they are high-density locations with large, vulnerable crowds. Soft targets have many access points, increasing certain physical security risks. Security professionals are thus tasked with “hardening” hospitals as part of a holistic security protocol. Raphael Hospital’s operating rooms are some of the most technologically advanced in the world; they are specially equipped with advanced medical technologies for surgeries including the Mako robotic arm-assisted technology for joint surgery and the Da Vinci robotic surgical system. Touch-free environments Such advanced technologies, and the people operating them, require an extra level of security in order to protect the most sensitive areas of the hospital where delicate surgeries are performed. Moreover, even before the pandemic, maintaining sterilisation in operating rooms was challenging. COVID-19 only heightened the need for touch-free environments to help limit the spread of germs. The hospital’s advanced access control and video monitoring technologies were incorporated from the very start of its operations, using the hospital’s existing CCTV cameras. According to Raphael Cohen, Operating Room Manager for Raphael Hospital, “We had a lot of challenges. We wanted to build the most updated hospital.” Facial recognition based technology Raphael Hospital wanted to incorporate facial recognition based technology for a few reasons, including protecting people, patients, and physical assets. Face-based access control plays an essential role in infection control protocols while keeping highly sensitive areas of the hospital, such as operating rooms, restricted to authorised personnel at all times. Hands-free and automated access allows hospital staff to not be required to touch any buttons to open doors while reducing contamination as much as possible and defining exactly which staff could travel within specific areas of the hospital. "Oosto’s OnAccess solution gives the staff, doctors, and nurses a sense of belonging in the hospital…they’re an essential part of the hospital, and when the hospital recognises them, and the doors open - it’s effortless for them to get about," said Raphael Cohen, Operating Room Manager, Raphael Hospital. Facial recognition technology Now, with Oosto’s facial recognition technology, surgeons and support staff can benefit from gaining frictionless access to the most sensitive areas of the hospital without having to touch any surfaces. Contamination is avoided, patients and staff are kept safe from unauthorised access to restricted areas of the hospital, and the frictionless, face-based access control in the hospital contributes to the overall perception of Raphael Hospital as a world-pioneer and cutting-edge healthcare provider.

Oosto's biometrics boosts security at racecourses
Oosto's biometrics boosts security at racecourses

Large entertainment venues offer opportunities for memorable experiences enjoyed by many attendees. With such breadth and scope of operations comes great operational complexity in managing a massive amount of foot traffic which exponentially increases risks for the safety and security of patrons. Increasingly, entertainment operators are looking to technology to help solve some of the most pressing challenges in managing these environments in real-time. Facial recognition technologies Facial recognition technologies among sports venues, casinos, and corporate buildings are increasing because of their ability to quickly and accurately recognise people — whether they are bad actors (e.g., felons, hooligans) or authorised personnel. This capability is increasingly being leveraged across a broad range of use cases from watchlist alerting, access control, and forensic investigations. It’s not surprising that the market is facing explosive growth and is expected to quadruple by 2026, according to Global Market Insights. Challenges for the racecourse included issues with identifying and managing evictions of bad actors across multiple entries and exits throughout the massive property. Theft and fraud are rampant in such large crowds, and it is humanly impossible to monitor everyone at all times. Security personnel needed to identify bad actors who had caused trouble on one property and to be able to recognise them again at another time, and in another one of the ATC racecourses. Maintaining data protection Coupled with a challenging and evolving risk landscape, more than 500 staff, including up to 300 security officers (and over 2000 casual staff) needed to be accounted for and kept safe on 120 major race days. Moreover, with an ever-changing set of regulatory requirements, ATC needs to comply with a strict set of regulations in order to maintain the integrity of operations while maintaining data protection. Finally, ATC needed security technology that would enable real-time monitoring as well as the ability to analyse video footage retrospectively for post-event investigations to track behaviors - especially during high-traffic times. Essential security tool And the final requirement? A solution that needed to be user-friendly as the head of security knew all too well that if a system were too complicated, it wouldn’t get used and would be money not well spent. The human eye alone is imperfect, and most facial recognition solutions underperform in real-world conditions (i.e. when there are crowds, facemasks, and POIs looking directly at the camera). This is even more challenging when the cameras are positioned on ceilings or high on walls, which makes facial recognition even more challenging (especially if the lighting is less than ideal). That’s why facial recognition technology is an essential security tool for entertainment venues and gaming operations. Video analytics software The Australian Turf Club and its systems integrator, Quorum Systems, turned to Oosto to take their venue’s enterprise security systems to a new level and solve their existing challenges. “Positioned at key entry points, our passive cameras were turned into smart cameras with Oosto’s video analytics software nearly instantly,” said Gary Colston, Head of Security and Access at Australian Turf Club. “We didn’t have to invest in a bunch of brand new cameras or a massive amount of servers and things like that. It was easy for us to implement it on our system.” Moreover, said Mr. Colston, “We needed something that was user-friendly. If it’s too complicated, [security teams] won’t use it and it becomes a waste of money.” Biometrics-based technology Once The Australian Turf Club implemented Oosto OnWatch real-time watchlist alerting to recognise potential security threats, the solution delivered vast efficiencies in operations by ensuring that evicted and banned patrons were immediately refused entry, while security teams were able to better track persons of interest throughout the venue without disruption. Since OnWatch can identify a person of interest through both face and attribute recognition in real-time or in historical footage, security personnel can receive alerts instantly on any device, without having to rely solely on memory or manual comparison of images between systems. With the world’s pioneer-edge biometrics-based technology in use, ATC was empowered to identify individuals a lot quicker than traditional methods allowed and manage their operations more efficiently and safely. Addressing compliance risks Oosto OnWatch quickly and accurately recognised persons of interest for security teams – from VIPs to banned players – to help improve the player experience, address compliance risks, and make ATC ultimately a safer, more enjoyable destination for patrons and a safer place to work for employees. "Positioned at key entry points, our passive cameras were turned into smart cameras with Oosto’s video analytics software nearly instantly. We didn’t have to invest in a bunch of brand new cameras or a massive amount of servers and things like that. It was easy for us to implement it on our system. We needed something that was user-friendly. If it’s too complicated, [security teams] won’t use it and it becomes a waste of money," said Gary Colston, Head of Security and Access at Australian Turf Club. Context of a security incident Since working closely with the ATC and Quorum to implement Oosto’s OnWatch solution, ATC has significantly improved in the rate of detection, finding individuals, and being more proactive than reactive with potential threats. The ability to search backward in video footage at a rapid speed to find POIs’ locations historically has been a welcome tool and a key point of differentiation for ATC; Oosto’s technology has dramatically improved ATC’s ability to perform forensic investigations and understand the full context of a security incident or crime scene. Forward-thinking venues Oosto’s cutting-edge technology is also in use at the Club to help protect guarded points of entry for authorised employees. According to Mr. Colston, this proved especially beneficial recently: “One of our staff members was assaulted and we were able to obtain a photo of the person we thought had done it and run them through the facial rec system here and we were able to locate him at the event at the time and have that person banned.” Oosto’s Vision AI technology is helping entertainment destinations like the Australian Turf Club stay focused on the fundamentals of strong client service while remaining resilient as the marketplace continues to shift. As forward-thinking venues look to stay competitive, grow revenues, solve business challenges, gain greater operational efficiencies and ensure safer, more secure spaces, they look to Oosto - and then never look back.

Securitas exposed Bitcoin fraud: Disrupting criminal networks
Securitas exposed Bitcoin fraud: Disrupting criminal networks

Securitas discovered a highly complex fraudulent cryptocurrency network, orchestrated by several organised crime groups posing as a legitimate financial services entity. The challenge The criminal organisation exploited the client’s branding, contact information and billing details to deceive the public, including their client’s genuine customers. Their scheme involved gathering sensitive personal and financial data, which could be misused for identity theft or unauthorised access to customer accounts, potentially endangering their funds and savings. If customers fell prey to these scams, it could lead to legal liabilities for their client and financial losses for those affected. Furthermore, negative publicity surrounding such incidents could damage their brand reputation and deter potential customers from using their services.  Moreover, the sophisticated tactics used by the criminals, such as employing false contact details and shell companies, make it difficult for authorities to track and apprehend them, prolonging the threat and increasing the likelihood of further fraudulent activity targeting both their client and their customers.  Failing to address this effectively could lead to financial losses, reputational harm and legal issues for them. Prompt action is crucial to mitigate risks and protect their organisation and customers. The solution Securitas surveilled the fraudulent network and conducted a timely investigation into its activities and the individuals responsible. This involved gathering evidence from various sources including fraudulent websites, communication platforms, financial records and false identities associated with operations worldwide. Upon compiling a comprehensive intelligence report on the fraudulent cryptocurrency network, and delivered key findings to their client and provided ongoing assistance during further investigations with relevant parties. The result Securitas offered their client a comprehensive intelligence assessment of the situation, consolidating detailed insights and analysis into a single actionable product. This empowered their Cyber, Fraud and Legal teams to swiftly take action and mitigate risks to their businesses. The investigation facilitated prompt responses from the relevant authorities, ensuring a coordinated effort to address the issue effectively. Moreover, they provided ongoing support for the investigations, offering industry expert resources to ultimately disrupt and dismantle the criminal operation.