Mobile Access Trends

What is the role of ethical hacking in physical security?
What is the role of ethical hacking in physical security?

In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?

What is the next generation of physical security solutions?
What is the next generation of physical security solutions?

Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Latest Access control news

dormakaba revy wins German innovation award 2026
dormakaba revy wins German innovation award 2026

The German Innovation Award recognises products, technologies, and services that break new ground and offer solutions that stand out for their added value to users and the environment. At the 2026 awards ceremony, dormakaba’s revy mechanical locking system was honored with a “Winner” award in the “Excellence in Business to Business – Building & Elements” category. dormakaba’s modern reversible key system, revy, offers a high-quality, patented locking system that makes secure access easy – whether for private homes, residential complexes, or commercial buildings. Important cylinder types Depending on the desired security level, revy is available in three variants: 10, 20, or 30. These can be combined with selected special features for even greater security, convenience, or cylinder protection, such as the self-reversing cylinder (SUZ). This means that the cylinder does not need to be replaced when changing keys. The reversible key system can also be manufactured on-site by authorised local security partners. The cylinder range includes the most important cylinder types. This ranges from a turn knob cylinder on the front door to a conventional double cylinder or half cylinder for switches or gates, to sheet metal mounting cylinders – for example, for installation in mailboxes – or a curtain cylinder for flexible security. Significant customer value Depending on requirements, the front door, garage, or mailbox can be operated with the same revy reversible key or according to access rights in the locking plan. “We are delighted to receive this award from the German Design Council. The German Innovation Award’s clear focus on criteria such as degree of innovation, utility, sustainability, and cost-effectiveness sends a strong signal that dormakaba solutions offer significant customer value and set standards in the market,” says Bernhard Heitz, Head of Strategic Product Design at dormakaba.

Circular reporting detection in security intelligence
Circular reporting detection in security intelligence

Boards are paying for analytical confidence including polished assessments with clear conclusions which signal certainty, but what’s not visible is the process behind that confidence. Businesses rarely see the reasoning chain or the assumptions that would blow an assessment apart if they proved false. Recent geopolitical volatility, such as the US-Iran conflict, has shown the consequences of unverified or weakly interrogated inputs. Misreading political risk According to Adam Irwin Managing Partner of Heligan Strategic Advisory, “Corporate intelligence is only as secure as the safeguards that sit behind it, but analysts will always be biased. No board would accept a set of numbers without an audit trail, yet many accept intelligence that shape approvals and decisions with no method visibility.” “Misidentifying beneficial ownership or misreading political risk in a target market can lead to business choices that have regulatory exposure and reputational risks. Firms must be able to audit their own thinking under pressure to catch those biases before they influence processes.” Irwin argues that the analytical bias can move from being a background risk to directly shaping outputs when the information environment turns hostile. Battle damage assessment “We’ve seen circular reporting dressed up as corroboration: think tanks and briefing notes all echoing the same CENTCOM battle damage assessment on Iranian missile assets as three independent sources when they’re one source. Even synthetic content has entered the intelligence chain like the circulated AI satellite imagery of a destroyed US base in Qatar before its Google Earth origin and SynthID watermark were detected.” “While the distinction between source reliability and credibility is clear, the problem is application. Peer review can help to catch factual slips, but it cannot point out assumptions of analysts reinforcing each other’s conclusions and amplifying uncontested language. The label, groupthink, captures the nature of the error: not bad actors but an architecture that didn’t force disagreement into the room.” Circular reporting detection Irwin points to a structured methodology to solve this: “Firms must build a system that can intercept bias such as a documented register of structural biases by source category, including aligned think tanks, commercial interests, state media, advocacy groups. This isn’t a blacklist but a way to stop treating ‘institutional’ as synonymous with ‘neutral.’” “Circular reporting detection will also be important to trace each cited source back to its data origin,” Irwin said. “If they all terminate in the same place, you don’t have corroboration but amplification. “Complimentary to this will be confidence levels capped by the quality of the source, not the analyst’s comfort level. If the evidence comes from a party with a certain interest, confidence can’t rise above a defined ceiling. This breaks the pattern where familiarity converts tentative reports into assumed fact.” US–Iran information environment Irwin concludes, “The aim isn’t to remove bias but to make it increasingly unlikely that the same bias will pass through every layer unchallenged. The US–Iran information environment is a live stress test that has concentrated every pattern worrying to an intelligence consumer: circular reporting, synthetic content and confidence inflation.” “The firms that build auditable and analytical safeguards will set the benchmark the rest of the market is eventually judged against. That's the standard we should expect and demand from any business within the intelligence sector.”

Suprema BioStation 3 max AI biometric terminal
Suprema BioStation 3 max AI biometric terminal

Suprema, a global pioneer in AI-powered access control and security solutions, announces the launch of BioStation 3 Max, the company's new flagship AI biometric terminal. Built around a single conviction—trust engineered into every door—BioStation 3 Max consolidates Suprema's full range of authentication methods: face and fingerprint biometrics at the core, with RFID, mobile, QR, and PIN. It all comes together on one hardened, identity-first platform — sub-second face matching, a premium 7-inch touchscreen, purpose-built for corporate lobbies to mission-critical entrances. Mission-critical entrances As access terminals become networked endpoints, hardening the device is no longer optional — it is the foundation of trust. A hardened Linux OS with Secure Boot ensures only signed firmware ever executes. A CC EAL6+ certified secure element protects credentials and cryptographic keys at the silicon level. Biometric templates are encrypted, device communication is TLS-secured, and an active tamper response triggers immediate alerts on physical compromise. For deployments where user privacy is paramount, BioStation 3 Max supports Template-on-Mobile and Template-on-Card options, which store biometric data on the user's personal device or smart card instead of centralized servers, providing privacy-first options for sensitive environments. Unparalleled AI Performance Busy entrances are unforgiving. A terminal that hesitates creates queues, slows throughput, and compounds into operational cost across every access point. Powered by Suprema's latest AI engine on a dedicated NPU, BioStation 3 Max matches faces in under 0.3 seconds—even for people in motion. Dual 2MP visual and IR cameras deliver liveness detection and anti-spoofing that hold up against printed photos, replay videos, and 3D masks. BioStation 3 Max handles sunglasses, masks, varied angles, and shifting lighting without slowing the line. The terminal scales to 100,000 enrolled users. Clear authentication prompts BioStation 3 Max is where authentication, user feedback, and intercom communication come together. A 7-inch IPS touchscreen delivers clear authentication prompts, face positioning guidance, and custom branded messaging, while a built-in VoIP intercom with SIP integration lets visitors speak directly to reception at attended entrances. IP65 and IK06 ratings protect against dust, water, and impact across demanding indoor and outdoor environments. The terminal supports speed-gate and wall mounting, with PoE+ on select models delivering power and data over one cable. "BioStation 3 Max defines the new standard for identity-first security," said Hanchul Kim, CEO of Suprema Inc. "Biometric authentication, certified hardware security, and superior AI performance, brought together in one flagship terminal. Trust, engineered into every door."

Entrust strengthens security with new CISO appointment
Entrust strengthens security with new CISO appointment

Entrust, a global pioneer in identity-centric security solutions, announces the appointment of Adam Dimopoulos as Chief Information Security Officer (CISO). “Customer trust is at the core of everything we do,” said Anudeep Parhar Chief Operating Officer at Entrust. “Adam’s proven leadership in identity security and risk management will help ensure our customers can rely on Entrust to protect their most critical systems and data, even as their security needs grow more complex.” Global information security Dimopoulos brings more than 20 years of experience global information security, identity, and risk management programs across highly regulated enterprises. In his role, he will be responsible for strengthening the company’s security posture and resilience to help ensure customers can rely on Entrust to protect critical systems and data, while enabling secure innovation and scalable growth. “I’ve had the opportunity to see identity security from both sides—helping build products and platforms, as well as being accountable for the outcomes as a global security leader,” said Adam Dimopoulos, Chief Information Security Officer at Entrust. Real-world environments “That ‘builder-and-buyer’ perspective helps ground security in what actually works at scale. I’m excited to continue advancing the conversation on modern identity and Zero Trust—with outcomes that are measurable, resilient, and practical for real-world environments.” Prior to joining Entrust, Dimopoulos served as Vice President of Information Security at Synchrony, where he led enterprise-wide identity security and Zero Trust transformations, delivering measurable improvements in risk reduction and operational resilience for customers and the business. He has also held leadership and advisory roles at Microsoft and Gartner, where he partnered with organisations to advance security products, strategy, and execution at scale.

Access control applications

ZeroEyes AI gun detection: School security revolution
ZeroEyes AI gun detection: School security revolution

ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that Amos P. Godby High School in Tallahassee, Florida, is the first in the nation to deploy a three-part integrated solution called RADAR (Real-time Alert, Detection And Response). This solution combines ZeroEyes’ AI-based gun detection and situational awareness solution with Ark Strategic’s 3D Mapping solution and Campus Guardian Angel drones to provide comprehensive, real-time threat detection, alerting, and response in the case of a gun-related incident. Enhancing situational awareness "ZeroEyes Al gun detection and Ark Strategic’s 3D mapping solution, combined with Campus Guardian Angel, represent the cutting edge of school security in the United States," said Jimmy Williams, Chief of Safety, Security, and Emergency Management for Leon County School District. "When leveraging these tools collectively in Project RADAR, we’re continuing to set a national standard for school security with solution-oriented and mission-ready resources.” Ark Strategic’s 3D mapping solution blends cutting-edge aerial and interior mapping technologies to deliver unparalleled operational intelligence for its customers. When integrating the exterior and interior intelligence with ZeroEyes AI threat detection software, the solution empowers first responders to quickly identify critical assets, enhance situational awareness, and respond to threats with greater speed and precision. Situational awareness software layers “At Ark Strategic, our mission is to turn the entire campus into actionable intelligence,” said Chris Yellina, Founder & Chief Product Officer at Ark Strategic. “With inside-and-out coverage, responders have a clearer picture of the environment before they ever make entry.” ZeroEyes' AI threat detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Creating a safer environment When a detection occurs at a location mapped in 3D, each camera alert is automatically tied to its exact position on the map, enabling responders to navigate instantly to the area of concern. The system is entirely cloud-based, requiring no installation for local law enforcement. Annotated maps display camera placement, fields of view, and potential blind spots, while operational layers and interactive measurements empower security teams to assess situations and make informed decisions quickly. In tandem, or if a panic button is pressed, Campus Guardian Angel deploys non-lethal drones within seconds, tracking the assailant and navigating obstacles to provide support and situational awareness. While in operation, the drones actively distract, delay, and disrupt the perpetrator, buying precious time and creating a safer environment for students and staff. Truly comprehensive security solution “Amos P. Godby High School’s deployment of RADAR marks a historic step forward in school safety,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “This integrated and innovative approach further demonstrates how utilising a multilayered technology solution can protect students and staff more effectively, setting a new standard for safety nationwide.” "We are thrilled to partner with the innovative team at ZeroEyes in launching Florida’s first-in-the-nation pilot program, which includes Godby High School, bringing together the best in AI-powered gun detection and elite human-piloted drone response capabilities to create a truly comprehensive security solution that can save lives,” said Justin Marston, CEO and co-founder of Campus Guardian Angel. Enhancing campus safety “Our innovative Active Shooter Suppression System is uniquely designed to deliver non-lethal effects that distract, delay, and disrupt a threat within seconds, buying critical time for law enforcement to protect students and staff. We are proud to be working side-by-side with companies like ZeroEyes to advance cutting-edge technology solutions to enhance campus safety in Florida and across the nation.” ZeroEyes, Ark Strategic, Campus Guardian Angel, and the district are hosting a summit June 17 and 18 at Godby High School, featuring demonstrations and discussion sessions surrounding the technologies, including reflections from school leaders on the district’s successful deployment. The event is open to local schools, law enforcement, and the media.

SmokeGo, EvacGo: Life safety in high‑rise residentials
SmokeGo, EvacGo: Life safety in high‑rise residentials

John Street, Newham, a high‑rise residential development comprising Blocks A and C, has been equipped with a comprehensive life safety solution from Advanced, incorporating SmokeGo smoke control and EvacGo evacuation alert systems to support a stay‑put fire strategy and enhance resident safety. The project, delivered as part of a wider life safety installation by Simple Life Safety Systems Limited, required a robust and compliant approach to smoke control and evacuation alert across two buildings with different heights and risk profiles. Block A is a 14‑storey, high‑rise residential block, while Block C is a smaller, four‑storey building. Each block was equipped with one SmokeGo panel and one EvacGo panel, providing dedicated control tailored to the specific needs of each structure. High‑rise residential block SmokeGo was specified to deliver active smoke control via the fire system, supporting the management of smoke in common escape routes and critical areas. Designed to comply with EN 54 Parts 2 and 4, as well as BS 7346‑8 and ISO 21927‑9, SmokeGo enables automatic and manual control of smoke control fans and dampers from a single, intuitive interface. Its simple matrix‑based configuration allowed the project team to clearly define smoke compartments and cause‑and‑effect relationships, helping ensure smoke is contained and extracted effectively in the event of a fire. EvacGo was installed as a fully independent BS 8629-compliant evacuation alert system, giving the fire and rescue service a reliable and secure means of alerting residents if evacuation beyond the affected flat is required. Each EvacGo panel is housed within a robust, tamper‑proof enclosure and is designed exclusively for use by the fire and rescue service, helping prevent misuse while ensuring clear, decisive control during an incident. Complex residential project John Newton, Director Life Safety at Simple Group, commented: “John Street was a complex residential project that required careful coordination between smoke control and evacuation alert systems. Using SmokeGo and EvacGo allowed us to deliver a fully compliant solution that aligns with the fire strategy while giving the fire and rescue service the tools they need to manage incidents safely and effectively.” The SmokeGo smoke control system and EvacGo evacuation alert system operate as separate dedicated life safety systems, ensuring smoke movement can be actively controlled while evacuation decisions remain firmly in the hands of the fire and rescue service. This layered approach supports resident safety without undermining the stay‑put strategy that underpins the building’s fire design. Implementing smoke control Shaun Scott, Applications Engineer at Advanced, added: “Projects like John Street highlight the importance of implementing smoke control and evacuation alert systems correctly. SmokeGo makes complex smoke control logic far simpler to configure and manage, while EvacGo provides a clear, compliant evacuation alert solution. Together, they deliver confidence for installers, building managers, and emergency responders alike.” With one SmokeGo panel and one EvacGo panel installed in each block, the John Street development now benefits from a coordinated life safety solution that addresses both smoke management and evacuation alerting in line with current best practice and regulatory guidance. The project demonstrates how Advanced’s specialist systems can be combined to meet the evolving safety requirements of modern residential buildings, delivering compliant, practical solutions that prioritise both resident safety and operational simplicity.

Comelit-PAC enhances genting casino fire alarm system
Comelit-PAC enhances genting casino fire alarm system

Genting Casino at Westfield Stratford City has completed a major fire alarm system upgrade with Comelit-PAC technology, delivered in partnership with installation specialist VTF&S. As the UK’s largest casino floor, including the biggest poker room in the country, Genting Stratford operates around the clock, welcoming visitors day and night. Any upgrade to critical infrastructure needed to be carried out without interrupting the flow of customers and staff, while maintaining strict safety standards throughout. Slowing response times The casino’s previous fire alarm system operated on a closed protocol, which had become increasingly restrictive. Even minor adjustments required specialist call-outs, increasing costs and slowing response times. By contrast, Comelit-PAC’s four-loop fire system offers a more flexible, open protocol approach, enabling easier maintenance and reducing long-term operational expense. The upgrade also ensures improved system reliability and faster fault identification, better suited to the demands of a busy, high-traffic venue. Careful planning and coordination Beyond the technical and visual improvements, the inclusion of Comelit-PAC’s free cloud connection allows the system to be monitored and supported remotely. Secure cloud access enables engineers to diagnose and often resolve issues without waiting for a site visit. The installation was carried out by VTF&S while the casino remained fully operational. Working in a live environment required careful planning and coordination, supported by Comelit-PAC’s technical team. This collaborative approach enabled the upgrade to be delivered with minimal disruption, while also setting the foundation for faster, more cost-effective ongoing support through remote connectivity. Implementing safety and efficiency The project’s success relied on close collaboration between Genting Casino, VTF&S and Comelit-PAC. Clear communication and meticulous planning ensured the system could be upgraded safely and efficiently while the venue continued to operate as normal. Says Ben Howley of Comelit-PAC: “This project demonstrates with the right teamwork and planning, even complex upgrades can be delivered seamlessly in a live venue. Genting Casino now has a system that was implemented safely and efficiently and simple to maintain even remotely, thanks to the strong partnership between all parties involved.”

ZeroEyes AI gun detection at St. Cecilia school
ZeroEyes AI gun detection at St. Cecilia school

ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its proactive AI gun detection and intelligent situational awareness software has been deployed by St. Cecilia School in Cincinnati, Ohio, to help protect students, staff, and visitors from gun-related threats. Located in the geographic centre of Cincinnati within Hamilton County, St. Cecilia School serves approximately 250 students in Pre-K through 8th grade and employs 28 faculty and staff members. The school deployed ZeroEyes as part of its continuing commitment to maintaining a safe, welcoming learning environment. Intelligent situational awareness “The safety of our students is always at the forefront of what we do,” said David Lewis, Teacher and Student Resource Officer at St. Cecilia School and a retired police officer with 30 years of service. “I’ve seen ZeroEyes in action, and I believe it will save time and save lives. When I’m teaching, it’s hard to focus on security, so this technology gives me real-time intelligence to respond quickly. It’s a powerful supplement to our existing security measures, and you can’t put a price on student safety.” ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operations centre staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Real-time intelligence If the threat is determined to be valid, alerts and actionable intelligence — including visual description, gun type, and last known location — are dispatched to law enforcement and school officials as quickly as 3 to 5 seconds from detection. “St. Cecilia School has taken a thoughtful and proactive approach to campus safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By building upon existing security measures and empowering staff with real-time intelligence, the school is demonstrating its strong commitment to protecting students and faculty while preserving the close-knit culture that defines its community.”