Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
iDenfy, a RegTech company specialising in ID verification and fraud prevention solutions, announces a new partnership with RATO Bank, a licensed financial institution with nearly 30 years of financial heritage in Lithuania. By integrating iDenfy’s AI-powered identity verification and Anti-Money Laundering (AML) screening into its digital onboarding flow, RATO Bank can now verify new customers faster and more securely, and in full compliance with KYC/AML requirements, through its newly launched mobile banking application. Traditional banking services RATO Bank is an officially specialised bank in Lithuania that provides traditional banking services. Back in 1996, it was founded as one of the country’s longest-running credit unions. Over nearly three decades, it grew into one of the most trusted financial institutions that now offers retail and business clients a full suite of services: deposits, loans, SEPA instant payments, and internet banking via its own dedicated mobile application. As the bank continues to grow its client base, it has grown the demand for onboarding new accounts as well as the need to keep up with the latest regulatory requirements and security for the synthetic fraud scams. Seamless verification process However, the tendency is clear. Financial institutions continue to shift toward fully digital services; therefore, the need for a secure, efficient, but, at the same time, compliant onboarding solution has become critical. The same principle was applied to Rato Bank’s strategy, especially when its team planned to establish the new banking and payments app. Due to the competition and the need of an average user, who now expects a seamless verification process, the account opening needed to happen in real-time. That’s when RATO Bank knew a reliable Know Your Customer (KYC) service provider, preferably with an established name in banking, was needed for the company to scale and remain its top spot in the market. Banking technology ecosystem The decision to partner with iDenfy was initiated by the company’s existing integrations within the Lithuanian banking technology ecosystem, including RATO core banking system suppliers Forbis and Lenders, helping to significantly reduce the time and complexity to verify users and check regulated compliance. Currently, iDenfy’s all-in-one identity verification solution covers its bank’s strictly regulated requirements. The solution supports recognition of users’ documents from over 3,000+ document types across 200+ countries. From passports and ID cards to driving licenses and residence permits. More seamless approach “We recently updated our IDV platform, offering a more seamless approach. Users don’t need to select documents. The IP address is used to detect the user’s country automatically, showing them the correct flow. This has already increased mobile conversion rates by 9% over the past month, and we expect similar results for RATO Bank’s users,” commented Domantas Ciulde, the CEO of iDenfy. The fact that the entire procedure can be finished in a single session is crucial. The new RATO onboarding procedure is substantially quicker, easier to use, and available from any location for end-users. There is no longer a need to visit a physical branch or submit paper documents; customers can use any kind of smart device to complete registration and authenticate their identities in less than one minute. Automatically triggered flow In addition, RATO chose to implement iDenfy’s AML screening solution, which helps ensure sanctions compliance and an effective, pre-screening ability that enables the financial institution to manage both KYC/AML mismatches under the same dashboard. Analysts working with iDenfy’s solution can leave notes and access compliant history logs. If a trigger is found by the system, the customer can be reviewed manually or can go through an additional, automatically triggered flow that is specifically designed for higher-risk scenarios. In baking, this is vital, as risk management is a dynamic process that requires quick reaction. Otherwise, you’re risking losing customers, which directly impacts revenue. Seamless KYC solutions “At RATO Bank, client convenience and the efficiency of our internal processes are top priorities. Today, a new customer can complete their full identity verification and become our client in a few minutes, entirely through our mobile app. That is exactly the kind of modern banking experience we set out to build,” explained Jurgita Bliumin, Deputy CEO at RATO bank. “We are excited to support RATO Bank, as they bring their decades of financial expertise into the digital era. Our expertise in good user experience and seamless KYC solutions will definitely help them scale faster, and we’re excited about their newly launched banking app and its growing customer base,” added Domantas Ciulde, the CEO of iDenfy.
IDScan.net, a provider of identity verification and fraud prevention solutions, announces that it has joined the Southwest Transportation Security Council, the Northeast Cargo Security Council, and the Midwest Cargo Security Council. This strategic move reinforces the company’s commitment to combating identity fraud and enhancing security across the logistics and freight industries. By becoming a member of these regional security councils, IDScan.net will collaborate with industry leaders, law enforcement, and security professionals to address evolving threats in cargo theft, identity fraud, and supply chain vulnerabilities. The councils are recognised for bringing together stakeholders dedicated to improving transportation security through information sharing, education, and best practices. Supply chain vulnerabilities “Joining these councils brings us closer to the front lines of cargo and logistics security,” said Jimmy Roussel, CEO of IDScan.net. “Identity fraud plays a major role in organised cargo theft, and our technology is built to help organisations verify identities quickly and accurately. We’re excited to share our expertise and collaborate with other members to strengthen security across the industry.” The announcement comes amid rapidly rising fraud activity across the supply chain sector. According to IDScan.net’s 2026 Cargo and Logistics ID Fraud Report, identity fraud attempts in cargo and logistics operations increased 213% from 2023 to 2024 and climbed another 30% in 2025. The report also found that Q2 2025 marked the highest quarterly fraud rate ever recorded, with fraudulent ID attempts rising 75% above the historical average. Strong identity verification Cargo theft and related fraud schemes are becoming increasingly sophisticated, often involving high-quality counterfeit IDs, stolen identities, and coordinated criminal networks. Without strong identity verification controls in place, logistics facilities can become vulnerable targets. In many cases, theft attempts begin with a fraudulent ID presented at a security gate. Once cargo leaves the property, recovery can be extremely difficult. By verifying driver identities before shipments are released, logistics companies can reduce the risk of fraudulent pickups and improve accountability throughout the supply chain. IDScan.net’s solutions help organisations mitigate these risks by confirming individuals are who they claim to be and are authorised before access is granted. Improving operational security “Verified IDs are a must if you want to protect yourself against theft and liability,” states the Senior Security Manager of a global logistics provider. Through participation in the Southwest, Northeast, and Midwest Cargo Security Councils, IDScan.net will engage in knowledge-sharing initiatives, support educational programs, and collaborate on strategies to reduce fraud and improve operational security across the supply chain.
ALCEA, an ASSA ABLOY company and global provider of integrated security solutions for critical infrastructure, announces the ABLOY solution previously known as ABLOY BEAT will now operate under a new name: ABLOY CUMULUS. “ABLOY CUMULUS is more than a rebrand. It’s a signal of where the market is going,” said Jeff Slaughter, Head of Business Development at ALCEA. “Critical infrastructure operators are moving beyond standalone devices. They need connected, intelligent systems that deliver visibility, control, and accountability at scale. CUMULUS is built to meet that need.” Bluetooth-enabled padlocks When launched as ABLOY BEAT, the solution introduced a new model for secure access, eliminating traditional keys in favour of mobile-enabled credentials and Bluetooth-enabled padlocks. Designed for harsh environments, the IP68-rated device, hardened steel construction, and intuitive LED status indicators quickly made it a solution across sectors such as transportation, utilities, and energy. “What started as a highly secure keyless padlock has grown into something much more powerful,” Slaughter added. “Our customers are managing thousands of remote access points, such as well pads, substations, cabinets, and network infrastructure. They don’t just need access. They need control, auditability, and integration across their entire operation.” Securing distributed assets ABLOY CUMULUS addresses the growing complexity of securing distributed assets across industries including oil & gas, energy, telecom, and transportation. The platform delivers centralized access control across geographically dispersed sites, with real-time audit trails that provide accountability for every access event. Open REST APIs enable seamless integration with existing systems, while a mobile-first design supports field technicians and contractors in the moment. The architecture scales from initial pilot deployments to enterprise-wide rollouts without re-platforming. Access management platforms “Every access point in critical infrastructure represents both operational necessity and potential risk,” said Slaughter. “CUMULUS gives operators a cost-effective way to secure thousands of locations while maintaining full visibility and control. That’s a game changer for industries where uptime, safety, and compliance are non-negotiable.” ABLOY CUMULUS draws directly from cloud architecture, symbolizing connectivity, scalability, and continuous evolution. It reflects a shift from isolated hardware to a connected, intelligent ecosystem where access, data, and control converge. More importantly, it signals ALCEA’s broader strategy: moving beyond point solutions to deliver integrated access management platforms that provide visibility, accountability, and control across complex, distributed infrastructure environments.
Verkada, a pioneer in AI-powered physical security technology, today announced a broad range of hardware and software updates across its platform, including: new generations of bullet cameras and access control units, expanded AI-powered alerting capabilities, and enhanced visitor management for healthcare. "Every update we make to Verkada's platform is focused on giving security teams the right tools for the right situations," said Brandon Davito, Senior Vice President of Product and Operations at Verkada. "Whether it's identifying operational issues with AI-powered alerts or customising emergency response protocols, we're building a platform that brings all of the functionality required for complex enterprise security operations with the simplicity and ease of a modern, cloud-based platform." Advanced AI capabilities Verkada is adding to its camera lineup with new third-generation bullet camera models, available in both wide-angle and telephoto configurations in 5MP and 4K resolution. The latest generation delivers improved video quality and performance in the field and like previous generations, supports Verkada's most advanced AI capabilities, including: AI-powered unified timeline, AI-powered activity detection, and license plate recognition. Verkada also introduced new optional IR and white light illuminator attachments for its bullet camera series to optimise image capture in low-light and nighttime conditions. Identifying operational issues Verkada continues to expand its AI-powered alerts and detections with a new inactivity detection, which alerts security teams when people or vehicles are absent from a defined area for a set period of time. Unlike traditional motion-based alerts that trigger on activity, inactivity detection helps organisations identify operational issues, whether it's a security guard who appears to no longer be manning a door, or retail employees who seem to have closed a store early. Like all Verkada alerts, these can be configured across specific camera regions, multiple cameras, or an entire site. Verkada also introduced vehicle line-crossing detection, enabling organisations to raise an alarm the moment a vehicle enters a site. In addition, Verkada also now supports line-crossing and loitering triggers on third-party cameras via Command Connector, allowing organisations to extend Verkada's AI-powered detection capabilities across existing hardware investments. Cellular backup connectivity Verkada meaningfully enhanced its emergency response functionality in Command with new door lock and unlock configurations that align with the "I Love U Guys" Foundation's Standard Response Protocol (SRP) scenarios: Hold, Secure, Lockdown, Evacuate, and Shelter. These standards and protocols are used across more than 78,000 schools, law enforcement agencies, and organisations around the world. Verkada introduced its next-generation four-door controller, AC43, with redesigned circuitry for enhanced reliability and built-in support for cellular backup connectivity, giving organisations the ability to maintain connectivity even when primary networks go down. For organisations with elevated compliance requirements, Verkada is also introducing a government-grade version, AC43-G, with FIPS-validated encryption. With the AC43-G, government agencies and contractors now have access to a fully managed, compliant access control solution from Verkada across one-, four-, and sixteen-door controllers. Multi-technology reader Verkada's AF64 Access Station Pro is now generally available, enabling seamless, secure access from a single device that brings together a multi-technology reader, 5MP wide-angle camera, single-door controller, and interactive touchscreen. Verkada continues to invest in building customised features and functionality for healthcare organisations, with new enhancements to Verkada Guest that will enable them to deploy distinct check-in workflows for adults and minors within Verkada Guest, including custom questionnaires, integrated document signing, and automatic screen translation.
Access control applications
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its proactive AI gun detection and intelligent situational awareness software has been deployed by St. Cecilia School in Cincinnati, Ohio, to help protect students, staff, and visitors from gun-related threats. Located in the geographic centre of Cincinnati within Hamilton County, St. Cecilia School serves approximately 250 students in Pre-K through 8th grade and employs 28 faculty and staff members. The school deployed ZeroEyes as part of its continuing commitment to maintaining a safe, welcoming learning environment. Intelligent situational awareness “The safety of our students is always at the forefront of what we do,” said David Lewis, Teacher and Student Resource Officer at St. Cecilia School and a retired police officer with 30 years of service. “I’ve seen ZeroEyes in action, and I believe it will save time and save lives. When I’m teaching, it’s hard to focus on security, so this technology gives me real-time intelligence to respond quickly. It’s a powerful supplement to our existing security measures, and you can’t put a price on student safety.” ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operations centre staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Real-time intelligence If the threat is determined to be valid, alerts and actionable intelligence — including visual description, gun type, and last known location — are dispatched to law enforcement and school officials as quickly as 3 to 5 seconds from detection. “St. Cecilia School has taken a thoughtful and proactive approach to campus safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By building upon existing security measures and empowering staff with real-time intelligence, the school is demonstrating its strong commitment to protecting students and faculty while preserving the close-knit culture that defines its community.”
The Community Builders (TCB) is a nonprofit organisation whose mission is to build and sustain strong communities where all people can thrive. They work with businesses, institutions, and public officials to revitalise neighborhoods in ways where all people can live in healthy homes with equitable access to resources and opportunities to pursue their dreams. Their partnership with Salient Systems exemplifies the use of video technology in vulnerable neighborhoods to help achieve these goals. Challenge TCB operates and manages 150 sites and properties across the country, employing over 600 staff members. These locations range from campus environments to individual buildings, each presenting unique security challenges to ensure overall resident safety. The primary focus for implementing a video management system is not only to ensure safety and security but also prevent property maintenance issues. Under Joe Giggey’s leadership as senior director of Information Technology, TCB established enterprise- level security standards. These standards enabled access to video remotely through smartphones, iPads, and laptops for a central team of sites in 30 cities. Additionally, seamless integration with existing cameras and access control systems was required, considering TCB’s extensive network of 30+ access control systems and about 6,800 different camera models. Affordability was another crucial factor, as is often the case for nonprofit organisations. Having an easy-to-administer VMS, reliable search and video export functionalities, scalability for future property acquisitions, and centralised management in a distributed environment were also significant requirements. Solution Salient’s CompleteView VMS met all the specified criteria, marking the beginning of the partnership between TCB and Salient in 2016. The deployment of CompleteView has grown to 85 site recording servers and over 2,300 camera licenses. Given the widespread nature of TCB’s properties, certified regionalised integrators have been selected to install CompleteView across TCB locations. These integrators have been trained and received certification from Salient Systems professional trainers on installation, executing upgrades, expanding systems, and customising the deployment ensuring effective implementation and ongoing support. In addition, manufacturer support by Salient’s own System Engineering team has been utilised and according to TCB personnel, “has been phenomenal.” Results TCB staff help address complaints, educate residents on lease rules, and avoid evictions. Salient’s CompleteView has assisted in resolving disputes, and investigating incidents. In addition, the ability to verify details of incidents in progress helps pinpoint the location and gives first responders details about the situation they may face on arrival. Video footage provided by Salient’s VMS, CompleteView has proven invaluable in multiple instances and according to Giggey “The VMS paid for itself immediately, highlighting the effectiveness and value of this partnership.” The collaboration between TCB and Salient Systems has become an exemplar of how technology can be harnessed for the greater good, building trust and effecting positive changes in vulnerable neighborhoods. With ongoing support from Salient Systems, TCB is committed to making a lasting impact and ensuring strong communities where all people can thrive.
In alignment with the State of Mississippi’s mission of “Empowering Mississippi citizens to stay connected andengaged with their government,” Salient's CompleteView Video Management System (VMS) is being installedthroughout more than 150 state boards, commissions, and agencies in order to ensure safety for thousands ofconstituents who access state services daily. Challenge Determining the right path to success wasn’t a quick process. The elaborate undertaking of converting all State of Mississippi buildings from its legacy video system, which included analog cameras across a disparate video platform, to match their standard of excellence took a lot of planning. This involved researching and interviewing multiple manufacturers of IP cameras and video management systems. The plan was strategic, as it was important to State officials to find an open architecture solution that could utilise as much existing technology as possible, thereby preserving current taxpayer investment. Solution After a thorough evaluation, the decision came down to three competitive VMSs, all based on total cost-of ownership, scalability requirements, software performance capabilities, along with support assessments. Salient’s CompleteView was ultimately determined the top choice. “In the selection process, three VMS manufacturers were deemed a reasonable fit. The choice of CompleteView over these competitors came down to one critical component, partnership. The culture at Salient embodies an unmatched support you don’t typically see in an industry leader. Their greatest value-add is that open line of communication between the RSM, technical support, and engineering. If I need something, I know I can pick up the phone and get immediate assistance” said Mike Cooper with MS Department of Public Safety. Once CompleteView was selected, another strategic decision was made to have personnel from The Statehandle the design and installation of CompleteView internally rather than engage outside consulting. This hasproved to be an effective option, allowing them to tailor each installation to suit individual property needs. TheState works through the channel for procurement, then handles all programming and administration internally.This offers them the most flexibility while still achieving uniformity across each deployment as well as completecontrol of the process. Result The conversion to CompleteView is underway and will take approximately 3-5 years to complete. The State now benefits from a centralised platform that allows for greater administrative control, as well as a product that meets the State of Mississippi standard for NDAA compliance. According to Cooper, “we now have a platform that is easily managed and visibly organised in an efficient manner. We also appreciate having a system that’s permission based with tighter controls.” Finally, The State’s technical team is committed to keeping the system updated as Salient releases newer versions of its software each quarter. These upgrades ensure they are taking advantage of all security enhancements and feature improvements that CompleteView has to offer. The State has also planned integration of its access control system, Open Options, with CompleteView, tying video directly to specific door openings. This gives State personnel an enhanced view into their security operations, with quick and easy auditing of badge events through a single interface. Further initiatives will explore the addition of AI video analytics to add weapons detection, appearance search, and cross-camera tracking — all to help speed up investigations. Salient’s open platform makes these integrations possible. Staying present on these new releases and innovative integrations ensures an advanced level of protection from potential threats and works to achieve the ultimate end game – keeping community members safe.
Willis Tower, an iconic symbol in Chicago for over 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009. Major renovations took place in 2017, culminating in a complete transformation in 2022. Currnetly, Willis Tower offers a range of amenities from short-term workstations to traditional leases, as well as dining, retail, and entertainment spaces. The Skydeck on the 103rd floor, 1,353 feet above street level, provides breathtaking views of up to 50 miles across four states, attracting millions of visitors annually. Challenge As part of Willis Tower’s transformation, the structural separations between the office and Skydeck areas were eliminated, creating a more open and accessible space for visitors and tenants. Recognising the need for a customised strategic security plan, Director of Security Keith Kambic, CPP, spearheaded efforts to find the right partners to ensure the safety and security of tenants, visitors, and employees. Kambic’s first step was to engage with the national security and technology consulting firm Guidepost Solutions. The next priority was to establish a strong partnership with a Chicago-based integration partner and to identify the best security solutions in the market. Kambic chose 4S Security as the integration partner because of their holistic approach to achieving optimal results. The partnership with 4S Security elevated the security measures at Willis Tower to new heights. “We are different than the average integrator,” said Leor Elfassy, Director of Business Development at 4S. “We have software developers on staff who write integrations, and as a matter of business principle for the last 30 years, we only work with software manufacturers that allow us to do so.” Solution The upgrade to Willis Tower involved retrofitting the access control system to a cloud-based solution and the new Video Management System (VMS), Salient CompleteView, was selected based on its ability to integrate seamlessly with the access control platform. “In the end the client wants a single pane of glass that they can work from and Salient’s CompleteView is well-designed to let integrators bring their vision to life,” continued Elfassy. Salient’s open architecture was an essential factor in the decision, along with product features like Dynamic Resolution Scaling (DRS), a powerful bandwidth management tool, and agnostic integration to analytic platforms for future system enhancements. Specific features like snapshot and CompleteView’s interactive mapping feature were also important selection factors. While all of these product capabilities are important, in the end it came down to the personal attention of Salient team members – from the President to the system engineer – and their efforts to go above and beyond in every way. Salient’s dedication to working cohesively with the Willis Tower and 4S teams created an effective partnership that propelled the project forward. Kambic said, “when we selected Salient, we did so not only for their product, but because we could tell that both of our companies were cut from the same cloth – great service, and great people.” Both Salient and 4S provided learning tools prior to implementation to ensure a seamless transition to the new VMS for the Willis Tower security team. 4S created customised training videos and pamphlets and held onsite training sessions, while Salient educated the security team through its YouTube training videos. Results The result of the partnership between 4S and Salient was a 40% reduction in bandwidth usage across the Willis Tower network. In addition, the integrated system provided immediate awareness of events such as forced-open doors, tailgating, and panic alarms. Ongoing top-notch local support from both Salient and 4S ensures smooth and timely software release updates and exploration of new technological capabilities, advancing video surveillance through CompleteView. Pleased with the results, the Willis Tower team attests to the success of the partnership, efficacy of Salient’s product, andoutstanding level of service from Salient both before and after the sale.