Mobile Access Trends

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news

Panasonic Connect North America, Division of Panasonic Corporation of North America, announced that its portfolio of TOUGHBOOK® laptops and 2-in-1 computers has been designated “Verizon Frontline Verified.” The distinction was granted after rigorous testing to ensure the solutions meet the durability, reliability, and connectivity standards required by first responders and public safety professionals using the Verizon network. To qualify, companies must be part of the Verizon Frontline Innovation Program, in which Verizon brings together technology vendors and industry partners to identify, test, and advance communications solutions across four key areas: Preparation, Response, Recovery, and Mitigation. Enhancing situational awareness “Panasonic Connect designs TOUGHBOOK rugged laptops and 2-in-1s based on the unique challenges first responders face every day,” said Calvin Jackson, Senior Manager for Crisis Response at Verizon Frontline. “We’re proud to strengthen our collaboration with Panasonic Connect as we work together to deliver innovative, critical solutions for those on the front lines.” For nearly 30 years, Panasonic Connect has been innovating its TOUGHBOOK solutions to support the specific needs of public safety organisations. Purpose-built for reliability and durability, TOUGHBOOK laptops and 2-in-1s are engineered to withstand the harsh environments first responders encounter daily - helping them improve efficiency, enhance situational awareness, and coordinate more effectively. Now, the entire TOUGHBOOK lineup, including the TOUGHBOOK 40, TOUGHBOOK 55, TOUGHBOOK 33 and TOUGHBOOK G2, has been recognised for its ability to power Verizon Frontline’s advanced network and provide the connectivity first responders need to operate seamlessly in the field. Public safety community “At Panasonic Connect, we’re proud to support the public safety community,” said Mike Smola, Director, Product Management and System Engineering/QA at Panasonic Connect. “Earning the Verizon Frontline Verified distinction underscores our shared commitment to delivering rugged, reliable solutions that help first responders stay connected when it matters most. Together with Verizon, we’re continuing to push the boundaries of innovation to ensure those on the front lines have the tools they need to serve and protect their communities.”

ZE Government Solutions (ZEGS), a wholly owned subsidiary of AI-based gun detection pioneer ZeroEyes, launched ZeroEyes Aerial Detection Kit (ZAD), a portable, drone-based AI threat detection and intelligent situational awareness solution designed for public safety agencies. The kit provides operators with a stand-alone drone solution that can be deployed in minutes from agencies' existing drone platforms to detect firearms, people, vehicles, drones, and maritime vessels. Rapid integration with drones Outdoor spaces are among the most challenging environments to protect due to their size and open nature, leaving them vulnerable to unauthorised access and potential gun-related violence. ZeroEyes Aerial Detection addresses this critical need with layered advanced AI analytics that detect threats in real time through a drone's live camera feed. To provide confidence and situational awareness, detections can be viewed instantly by law enforcement or security personnel and dispatched immediately to on-site staff when detections are made. Rapid integration with drones ensures that first responders or federal agencies are quickly informed of on-scene security threats, allowing for appropriate response posture to the current situation. ZeroEyes Aerial Detection Kit The kit enhances drone operations for a variety of scenarios, including drone response, event and perimeter security, armed assailants, suspect and article searches, barricaded gunmen, hostage situations, and domestic disputes. Providing immediate detections and alerting improves law enforcement situational awareness and personnel safety. ZeroEyes Aerial Detection Kit integrates seamlessly with existing drones and drone programs, and comes equipped with a carry-on case and a ZeroEyes laptop to stream video and deliver automated alerts to dispatch or operations centers via LTE, Wi-Fi, or mesh radio. It connects to drone feeds or controllers through HDMI, IP address, RTSP or Headsets, and is compliant with the National Defense Authorisation Act and protected by DHS SAFETY Act designation. New drone solution “Protecting outdoor spaces is one of the greatest challenges in security today,” said Dustin Kisling, Executive Vice President of ZE Government Solutions. “With our new drone solution, we can detect potential threats in real time and provide verified alerts, giving organisations and the public the confidence that help is on the way when it matters most.”

HID, a pioneer in trusted identity solutions, announces it has signed an agreement to acquire IDmelon, a Vancouver-based secure sign-in solution provider that streamlines the adoption of passwordless authentication through its proprietary software platform. IDmelon’s offering allows users to turn existing identifiers, such as a physical credential, smartphone, or biometric, into enterprise-grade FIDO security keys. In addition to its software solution, IDmelon offers hardware that supports the FIDO standard, providing a seamless and secure login experience for its users. Leverage existing identifiers “Users have become acutely aware of the problems with passwords,” said Björn Lidefelt, EVP and Head of HID. “By adding IDmelon to the HID family, we now provide an easier path to passwordless.” The FIDO standard, or passkey, has emerged as a secure and convenient approach to eliminating passwords and replacing them with phishing-resistant MFA. Today, enterprises primarily use hardware security keys, including USB or NFC, whereas IDmelon offers a smart solution to leverage existing identifiers as FIDO security keys. Smooth transition to passwordless access The IDmelon FIDO Management Platform makes it easier for organizations to move to passwordless authentication. It simplifies the user experience and connects physical and digital access into one seamless solution. By using existing cards or mobile devices, administrators can quickly register and manage users, while employees can log in securely with a PIN or biometric. This delivers strong security and a smooth transition to passwordless access—without major changes or disruptions, delivering real-time value. Passwordless authentication solutions The platform provides operational efficiency by centralizing passwordless authentication management. Admins can import users and groups, assign and manage access cards or security keys, enforce policies, and monitor activities—supporting a stronger identity-first security posture. Martin Ladstaetter, SVP and Head of Identity and Access Management Solutions, HID, said, “We are committed to providing seamless, best-in-class passwordless authentication solutions. Now, with IDmelon in our portfolio, we are better equipped to help customers maximize their existing hardware investments by converting existing access cards into converged credentials – secure, multi-use keys that unify physical and logical access across the enterprise.” Stronger identity-first security posture Founded in 2019 and a member of the FIDO Alliance, IDmelon is now part of HID’s Identity and Access Management Solutions (IAMS) Business Area. The IDmelon solution is managed within the IAMS Authentication Business Unit and will benefit from HID’s sales and other global functions. “At IDmelon, our vision is to empower people and organizations to stay focused on their businesses and thrive knowing that their identities are protected,” said Bahram Piri, CEO and Founder of IDmelon. “By joining forces with HID, we are in an even stronger position to help organizations overcome the growing problem of passwords to secure them against phishing and other credential-based attacks.” The acquisition is subject to customary closing conditions and is expected to close in the fourth quarter of 2025.

System Surveyor, the pioneering digital system design platform for security and technology integrators, announced a strategic partnership with Eagle Eye Networks, the pioneer in cloud video surveillance. This collaboration is designed to equip resellers with intuitive tools that streamline system design, automate a bill of materials, and accelerate the sales cycle. Through this partnership, Eagle Eye Networks resellers gain access to System Surveyor’s mobile, collaborative system design platform, enabling them to simplify system design and accelerate the proposal process. The partnership significantly reduces the complexity of system planning, empowering resellers to deliver faster, more accurate proposals featuring Eagle Eye’s innovative video surveillance technologies. Streamlined design, faster sales cycles With System Surveyor, Eagle Eye Networks reseller partners can: Import Eagle Eye product profiles: Easily drag-and-drop Eagle Eye Networks or partner products on a digital floor plan, automating bills of materials and camera layout with a legend. Collaborate in real time: Design and visualise directly with Eagle Eye Networks sales and engineering teams within System Surveyor, eliminating the inefficiency of emailing PDFs back and forth. Speed time-to-proposal: Take System Surveyor on in-person site surveys and cut system design time by up to 50%, delivering professional proposals in hours or days instead of weeks. Leadership perspectives "Our mission at System Surveyor has always been to simplify the way integrators design and deliver technology systems. This partnership takes our platform’s accuracy and efficiency to the next level by enabling Eagle Eye Networks reseller partners to leverage our platform for real-time collaboration and faster sales cycles. Together, we’re giving resellers the tools to differentiate themselves and win more business," Chris Hugman, Co-Founder and CEO, System Surveyor. "At Eagle Eye Networks, we are committed to equipping our partners with the most effective tools to succeed. Integrating System Surveyor’s intuitive design capabilities streamlines the process of building cloud video surveillance solutions and reduces the time to deliver professional proposals. This collaboration reflects our dedication to empowering our resellers with innovative, practical solutions that drive growth," Tijmen Vos, VP of Product, Eagle Eye Networks In an era where simplicity and efficiency are paramount, this partnership between System Surveyor and Eagle Eye Networks equips resellers to differentiate their services and increase revenue growth with faster proposals and dynamic system designs for long-term customer satisfaction. Get started now To take advantage of this new partnership, Eagle Eye Networks resellers can visit the System Surveyor + Eagle Eye Networks Partner Page to open a complimentary System Surveyor Starter Account and begin designing immediately. Additionally, Eagle Eye Networks resellers receive 10% off monthly or annual System Surveyor subscriptions. Interested in learning more? System Surveyor will be a solutions sponsor at the 2025 Cloud Security Summit in Austin, Texas, hosted by Brivo and Eagle Eye Networks on October 28-30, 2025.
Access control applications

Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specialises in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.

Artificial Intelligence Technology Solutions, Inc., along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced the publication of a new case study detailing the successful deployment of RAD’s RIO 180 units powered by SARA at a mobile home community managed by Champion Real Estate Services. The project, conducted in collaboration with RAD dealer HUB Enterprises, demonstrates how autonomous security solutions can dramatically reduce incidents, restore resident confidence, and redefine community safety. Newly published case study The newly published case study, titled “Transforming Mobile Home Park Security with RAD and HUB Enterprises,” showcases how the partnership between Champion, HUB, and RAD addressed long-standing security challenges at a large mobile home community. The report details how HUB deployed two RIO 180 units powered by RAD’s agentic AI platform, SARA (Speaking Autonomous Responsive Agent), resulting in a near elimination of resident complaints and a sharp decline in trespassing, theft, and disruptive activity. This case joins a growing collection of real-world examples where RAD’s autonomous technologies are redefining safety and operational efficiency across residential, commercial, and critical infrastructure sectors. LED display and talk-down features “HUB brought us a solution from RAD that works,” said Shannon Noble, Managing Broker at Champion Real Estate Services. “The collaboration between Champion, HUB, and RAD has given us a new level of confidence in how we manage security at our communities. The LED display and talk-down features make a powerful impact. Residents see and hear that their community is protected, and it has completely changed the atmosphere.” Technology-driven adoption “This worked where our patrols just couldn’t,” said Jarrett Willoughby of HUB Enterprises. “It’s visible, it’s active, and it gave Champion the confidence to start talking about more deployments right away. What really surprised us was SARA. We thought of it as just a monitoring tool, but the way it responds on its own, the speed of it, that’s what really sold us.” “The results at Champion’s community clearly show how technology-driven adoption can make neighborhoods safer,” said Mark Folmer, CPP, PSP, President of RAD. “RIO powered by SARA provides an immediate and visible deterrent that residents recognise and appreciate. This collaboration with HUB and Champion demonstrates how autonomous security can deliver measurable improvements in safety and peace of mind.” Transforming residential community safety The full case study is now available for download, offering detailed insights into how autonomous security solutions are transforming residential community safety. Property managers, security providers, and industry professionals are encouraged to review the results and explore how AI-powered autonomy can deliver stronger deterrence, faster response, and greater confidence for the communities they serve. ROSA units Sitting atop a standard RIO 180 configuration is a single ROSA units. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-colour, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at mobile home parks, retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. Customised assessment and demonstration The Company encourages property managers, business owners, and municipal leaders seeking to improve security in downtown and high-traffic areas to connect with RAD for a customised assessment and demonstration of its autonomous security solutions. AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. The Company’s operations and internal controls have been validated through successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Led by Steve Reinharz RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry pioneership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Prospective sales pipeline RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.

In an emergency, first responders, School Resource Officers (SROs) and responsible parties need to gain access to campus buildings to assess alerts and potential threats. With Connect ONE®’s new Emergency Response Platform (ERP), included with any service level at no additional charge, first responders and SROs can view cameras, unlock doors and outputs, activate task functions, initiate lockdown and see recent activity. Connect ONE ERP Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins The Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins. Integrators can offer 911 and dispatch centres viewing and access control of schools to assist responders during critical threats. The cloud platform ERP provides a separate agency login with specific designated permissions for first responders, who can only see customer site locations shared by the security dealer. Emergency Response Platform “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to diffuse an emergency quickly and effectively with powerful information to view and control facility security,” said Dan Simon, Technical Director, Connected Technologies. He adds, “It’s a great solution to heighten safety and create safer experiences for the public, while ensuring you keep a customer long-term with a valuable service.” ERP: Use-case in action Nightwatch Security & Telephone LLC has executed the ERP at several of the area’s school districts Nightwatch Security & Telephone LLC, Sedalia, Mo., has implemented the ERP at several of the area’s largest school districts serving more than 5,000 students. Nightwatch Owner, Jeff Kesterson said it’s simple to update proximity key fobs and input agency officer’s access codes to stay current with staffing changes or modifications to permissions. “First responders and SROs maintain access to schools with proximity access control key fobs, but staying current with staffing changes was unwieldy before the ERP,” said Jeff Kesterson. Key fob credentials The Sedalia Police Department, which has access to schools in the city, said the ERP is a huge timesaver for administering key fob credentials. “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” said Commander Joshua Howell, Operation’s Support Bureau, Sedalia Police Department. Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping – a real-time Google mapping feature, which adds the capability of seeing floor plans of the building along with point and click control of doors and cameras. Dispatch can easily respond to officers on-site and unlock doors for quick entry by clicking on GeoView’s map and door icon. Other features of the ERP A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Integrates with leading intrusion, access control, video, fire, temperature, humidity, MNS, environmental and weather systems. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness.

Siemens Smart Infrastructure has partnered with San Juan de Dios Hospital in Seville, Spain, to transform it into a smart and sustainable asset. With buildings accounting for around 40 percent of global carbon emissions, and healthcare facilities increasingly facing financial and sustainability pressures, improving operational efficiency is crucial. At San Juan de Dios Hospital, Siemens has turned this challenge into an opportunity with its AI-based digital building technology. By deploying its innovative solutions, Siemens enabled the hospital to cut operating costs of the analysed assets by 35 percent, setting another benchmark for hospitals across the globe. Siemens’ AI-powered building platform The solution integrates energy and security control, as well as HVAC automation into a single system San Juan de Dios Hospital, which enjoys a history spanning more than 450 years, has undergone an impressive transformation using Siemens’ fully digital, AI-powered building platform Building X and digital services. The solution integrates energy and security management, as well as Heating, Ventilation and Air Conditioning (HVAC) automation into a single system. This leads to significant operational, as well as energy efficiency gains for building managers. Siemens’ technology and services are expected to enable a further reduction of 10 percent in operating costs, thanks to early fault detection and optimised equipment use. Harnessing AI and interoperable platforms “With Siemens’ technology, we have gone beyond simple automation. We now have an intelligent system that coordinates, optimises, and anticipates the functioning of our facilities, improving care quality and the well-being of those around us,” said María Jesús Pareja, Managing Director at San Juan de Dios Hospital. “This project sets another benchmark for hospital digitalisation globally. By harnessing AI and interoperable platforms, healthcare facilities can transform operational complexity into simplicity and resilience – ultimately improving care outcomes while cutting costs,” said Delphine Clément, Global Head of Verticals at Siemens Smart Infrastructure Buildings. Integrates remote digital services Siemens deployed a digital layer that merges remote digital features for fault detection and diagnostics At San Juan de Dios Hospital in Seville, Siemens has deployed a digital layer that integrates remote digital services for fault detection and diagnostics, intrusion detection via Siemens Siveillance Suite, and the Desigo CC building management system. As part of the Building X platform, Operations Manager and Energy Manager provide real-time visibility into building performance and energy consumption, enabling smarter decision-making, improved operational efficiency, and measurable sustainability gains. Digital building platform Building X is a digital building platform that supports customers to digitalise, manage, and optimise their building operations. It is part of Siemens Xcelerator, an open digital business platform that enables customers to accelerate their digital transformation easier, faster and at scale.