Mobile Access Trends

What is the role of ethical hacking in physical security?
What is the role of ethical hacking in physical security?

In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?

What is the next generation of physical security solutions?
What is the next generation of physical security solutions?

Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Latest Access control news

TE Connectivity champions sustainability in security
TE Connectivity champions sustainability in security

TE Connectivity, a world pioneer in connectors and sensors, has been named to the Dow Jones Best-In-Class Index for the 14th consecutive year. Previously known as the Dow Jones Sustainability Indices, the Best-In-Class Indices are designed for investors seeking a global index of companies that prioritise sustainability and good governance. TE's inclusion places it in the top 20% of its industry peers based on long-term economic, environmental and social criteria. Corporate responsibility strategy "TE prioritises sustainability not only because it's what our investors, our customers and our employees want, but also because it's the right thing to do," said CEO Terrence Curtin. "Our purpose and our values guide us on the ongoing sustainability journey led by our 90,000 employees around the world. When our people unite around a common purpose, we can drive meaningful, lasting change." TE's efforts are driven by its One Connected World corporate responsibility strategy. In the past year, the company exceeded several of its goals around renewable energy, hazardous waste reduction and water use. For more information on corporate responsibility at TE and to view the most recent corporate responsibility report.

Security Messe Essen: Defence innovations spotlight
Security Messe Essen: Defence innovations spotlight

The evolving security landscape is increasingly shaping industrial development in Germany. The war in Ukraine, conflicts in the Middle East, and a growing focus on civil protection are having a noticeable impact on markets, business models, and investment decisions. This is precisely where the EURO DEFENCE EXPO comes in. The new international trade fair for the defence industry will make its debut at Messe Essen from 22 to 25 September. Around 250 exhibitors are expected. For Messe Essen CEO Oliver P. Kuhrt, the economic implications of these developments are clear. Profound industrial shift “Germany still tends to discuss defence primarily in political terms – but in reality, we are currently witnessing a profound industrial shift,” says Kuhrt. “Anyone talking about the future of industry today cannot ignore this topic. Behind it lies enormous momentum for innovation, investment, and employment.” The figures underline this trend: the German defence sector employs well over 100,000 people. At the same time, military spending in Germany rose to more than €97 billion in 2025 – an increase of 24 percent compared to the previous year. Traditional defence companies Oliver P. Kuhrt adds: “Demand for security and defence technologies is growing faster than it has for years. This is no longer benefiting only traditional defence companies – SMEs and technology providers are also opening up new markets.” Dual-use technologies are gaining in importance At the same time, a structural transformation is taking place: an increasing number of companies from traditional industries are entering security related business fields. “Automotive suppliers, mechanical engineering firms and technology companies are developing solutions for drone defence, reconnaissance, and the protection of critical infrastructure,” explains Kuhrt. Civilian disaster response “The area of dual-use technologies, in particular, is currently experiencing very dynamic growth.” This development will be clearly visible at the EURO DEFENCE EXPO. Companies such as AIRSENSE Analytics, analyticon instruments and ARX Robotics exemplify technologies that can be used both in civilian disaster response and in military operations. Established industrial companies such as BINDER, Bernd Siegmund and Alexander Binzel Schweisstechnik are also increasingly applying their expertise to security-related applications. At the same time, leading players are using the event as a platform: KNDS Deutschland Tracks, a key European provider of military land systems, will be present, as will Heckler & Koch, one of the most recognised manufacturers in the field of infantry weapons. Civil security solutions Military and civil security together for the first time Kuhrt concludes: “For companies today, the key question is no longer whether they engage with security, but how strategically they do so. The EURO DEFENCE EXPO makes this transformation visible and brings together the key stakeholders.” Representatives from industry, the military, politics, security authorities and research are expected at Messe Essen from 22 to 25 September. A particular highlight: Security Essen – one of the leading trade fairs for civil security – will take place at the same time as the EURO DEFENCE EXPO. “For the first time, Messe Essen will bring together military and civil security solutions in one place, becoming a central meeting point for the security-related industries,” says Kuhrt.

Cellebrite boosts AI with Ramji as technology head
Cellebrite boosts AI with Ramji as technology head

Cellebrite DI Ltd., a global pioneer in AI-powered Digital Investigative and Intelligence solutions, announces the appointment of Shiven Ramji as President of Products and Technology. In this role, Ramji will lead the Company's product and technology organisation, driving innovation and execution of Cellebrite's industry-pioneer Digital Investigative and Intelligence platform. Ramji will start on May 4, 2026 and succeed Ronnen Armon, who will be retiring in a few months after the transition is complete. Mission of protecting communities "We are thrilled to welcome Shiv to Cellebrite. Shiv's impressive track record, experience and expertise will be critical as we continue to accelerate the pace of AI adoption and innovation in our products to support our customers and deliver on our mission of protecting communities, nations and businesses," said Thomas E. Hogan, CEO of Cellebrite. "I would like to thank Ronnen Armon for his leadership and many significant contributions to Cellebrite's success over the last five years, including transforming the Company into an AI-first, market-leading public company. On behalf of the employees of Cellebrite, I want to wish Ronnen all the best as he enters this well-deserved chapter of his life." Significant growth and transition Ramji brings a wealth of experience to Cellebrite and a track record of scaling high-growth technology companies and product and technology organisations through periods of significant growth and transition. He joins from Okta, where he served as President of Auth0, managing a $1 billion ARR business and overseeing its product, data, security and technology strategy and execution. Before Auth0 and Okta, Ramji served as the Senior Vice President of Product at DigitalOcean, and held leadership positions at global brands including Amazon, NBCUniversal, LiveIntent and The Nielsen Company. Fostering entrepreneurship and innovation "I am honoured to join Cellebrite and lead a team that is dedicated to making a real difference in the world," said Shiv Ramji. "Cellebrite's commitment to innovation is fundamental to its inspiring mission. I look forward to working with the team to further enhance and broaden our product offerings, and empower our customers to make the world a safer place." Ramji is an active angel investor and startup advisor, with a deep commitment to fostering entrepreneurship and innovation. He currently serves on the boards of Products That Count and Aiven.io.

Detection Tech X-ray solutions for battery inspection
Detection Tech X-ray solutions for battery inspection

Detection Technology, a pioneer in X-ray detector solutions, has expanded its X-ray flat panel detector portfolio for battery inspection by adding high-speed IGZO (Indium Gallium Zinc Oxide) -based detectors, available in panel sizes 1313, 3030, and 4343, alongside its established a-Si (Amorphous Silicon) solutions. The expanded offering is designed to meet increasing requirements for imaging speed, precision, and throughput in battery manufacturing. The company’s IGZO detectors, optimised for battery inspection, are already being delivered to EV battery manufacturers. The IGZO-offering is complementing Detection Technology’s proven a-Si solutions with enhanced performance for high-volume production environments. Energy storage applications Flat panel detectors are widely used in battery cell and battery pack inspection to generate high-resolution X-ray images that reveal internal defects such as air pockets, cracks, voids, misaligned layers, and foreign objects. These capabilities are critical for ensuring the structural integrity and performance of batteries used in automotive and energy storage applications. Detection Technology’s X-Panel portfolio includes multiple panel sizes. The detectors are engineered for demanding production environments, offering large-area imaging, high resolution, low noise, and excellent pixel uniformity. They are compatible with inline, at-line, and offline inspection systems across a wide range of battery types, including cylindrical, pouch, button, and power winding applications. X-ray imaging solutions “With our IGZO and a-Si detector technologies, we aim to provide manufacturers with application-optimised and scalable solutions for battery inspection,” says Wei Chunlin, Sales Director at Detection Technology. “Our flat panel detectors are trusted for high and reliable imaging performance, imaging speed, and competitive cost, supported by our 24/7 customer service.” “Our solutions enable early detection of even the smallest internal defects while maintaining inspection accuracy at high production speeds. They support non-destructive inspection across key quality control applications, including overhang wrapping alignment, pole piece wrinkling, lithium plating, air bubbles, welding defects, and foreign object detection,” says Tuomas Holma, Product Director at Detection Technology. Detection Technology will showcase its battery inspection solutions at the China International Battery Fair (CIBF), held in Shenzhen, China, on 13–15 May 2026. Visitors can meet Detection Technology at Hall 3, Stand 3T089 to learn more about its latest X-ray imaging solutions for battery manufacturing.

Access control applications

Milestone Systems Arcules cloud-based VSaaS upgrade for school security
Milestone Systems Arcules cloud-based VSaaS upgrade for school security

A leading K-12 school district in the southeastern United States, recognised for its excellence in education, innovation, and community engagement, faced the growing challenge of keeping students and faculty safe while managing a complex video infrastructure. To maintain its high standards for safety and modernisation, they turned to Arcules cloud-based Video Surveillance as a Service (VSaaS).  The result is a flexible, scalable foundation that enhances visibility, strengthens cybersecurity, and simplifies daily operations. With hundreds of cameras deployed across multiple campuses, the district now manages its video infrastructure more efficiently than ever before.  Challenge: Growing district, growing demands The district’s on-premises video systems were aging, difficult to maintain, and expensive to upgrade. The addition of planned new schools and expanding facilities created greater coverage requirements that their existing technology could not meet. Administrators needed a secure, cost-efficient solution that could scale quickly, reduce maintenance time, and improve access for security staff across multiple campuses. They wanted a platform that could evolve with their needs, provide reliable visibility during emergencies, and ensure consistent performance with limited local IT resources. The system also had to align with cybersecurity and data privacy requirements while supporting the schools’ long-term digital transformation strategy. By modernising through the cloud, administrators saw an opportunity to standardise technology across campuses and free IT staff from constant system upkeep. Solution: Modernising security through the cloud After evaluating several options, the district selected the Arcules cloud-based VSaaS platform to replace its legacy systems. Built on Google Cloud, Arcules provides centralised monitoring, automatic updates, and strong cybersecurity protections. The subscription-based model turned large capital investments into predictable operating costs, allowing the district to expand video coverage as new schools were added, without the expense of physical servers or extensive reconfiguration. The transition also simplified security management, turning what was once a patchwork of local systems into one cohesive, always-up-to-date network, accessible from anywhere. Results: Safer campuses, simplified management The new Arcules VSaaS system gives security teams the ability to monitor all campuses from a single, intuitive interface. Real-time video access improves situational awareness and speeds up investigations. Automated updates reduce IT workload, while the cloud-based structure ensures consistent performance and uptime. With improved accessibility and lower maintenance demands, the district has gained a more reliable and cost-effective solution that supports its goal of creating safer learning environments. This success demonstrates how modern, cloud-connected infrastructure can strengthen campus safety while reducing the IT burden — a vital combination for growing school districts.

ZeroEyes enhances school safety with AI detection
ZeroEyes enhances school safety with AI detection

The Adrian Public Schools Board of Education approved the renewal of its ZeroEyes AI-based gun detection and intelligent situational awareness platform during its April 13 meeting, continuing the use of artificial intelligence technology designed to enhance school safety by monitoring existing security camera systems for potential firearms. The deployment has been in place since 2023. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Security safety enhancements If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and district officials as quickly as 3 to 5 seconds from detection. ZeroEyes is just one component of the multi-layered security safety enhancements that have taken place over the past few years.  The District has implemented multiple safety enhancements including a full overhaul of its security camera systems, the addition of weapon detection K-9 support across school facilities, and the installation of bullet-resistant and shatter-resistant glass in key areas of school buildings. Proactive safety planning Superintendent Nate Parker stated that the District remains committed to proactive safety planning. “The safety of our students and staff remains our highest priority,” Parker said. “We continue to take intentional, layered steps to strengthen our security systems and ensure our schools are prepared and protected. The renewal of ZeroEyes reflects that ongoing commitment.” Officer Joshua Perry of the Adrian Police Department, who serves as a School Resource Officer and participates in District safety planning, said collaboration has been central to the District’s approach. “These improvements demonstrate a strong partnership between schools and law enforcement,” Perry said. “The combination of training, communication, and technology significantly strengthens our ability to keep students and staff safe.” Partnerships with innovative technology As these collaborative safety efforts continue to evolve, partnerships with innovative technology providers like ZeroEyes remain a key component of the district’s strategy. “Adrian Public Schools’ continued investment in layered, proactive security demonstrates a clear commitment to protecting students and staff,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By renewing their partnership with ZeroEyes, the district is strengthening its ability to identify and respond to potential threats in real time, giving first responders critical information when every second counts. We’re proud to support Adrian in creating a safer learning environment for its community."

Multicare's integrated security system benefits healthcare
Multicare's integrated security system benefits healthcare

The healthcare organisation based in Washington state has begun a journey of unifying its video surveillance and access control under one platform, yielding better situational awareness, streamlining investigations, and providing an additional level of safety and security to staff and patients alike. Multicare Health System in Washington State employs more than 20,000 team members across 11 hospitals and more than 300 medical clinics, laboratories, medical imaging, pharmacies and specialty services locations. Physical security assets As a large healthcare organisation, Multicare has many levels of security to attend to, including slips and falls, patient care, guest management, parking and perimeter security, staff and security officer safety and much more. “We had multiple video management system (VMS) solutions and multiple systems were outdated and past their end of life. We needed to consolidate into a single, unified solution with a global interface,” Davis explains. When Joshua Davis, technology system support coordinator, joined MultiCare in 2018, he oversaw the upkeep, implementation and eventual retirement of the organisation’s physical security assets, including its outdated NVR solution, legacy analogue surveillance cameras, as well as access control and video management solutions. Access control solutions Like many robust and expanding organisations, MultiCare has added new sites and facilities over the years, finding itself with disparate security, video surveillance and access control solutions. Prior to upgrading that technology, operators were pulling video footage via a flash drive transfer at legacy sites when incidents occurred. The organisation was experiencing challenges of using older equipment too, and the access control solution didn’t have two-way integration with the VMS, making analytics cumbersome and difficult to manage. Centralised security operations With a focus on efficiency, as well as saving time and money, Multicare wanted a consolidated, easy-to-navigate platform for security staff to be able to view, respond to incidents and pull security video footage as needed. With one centralised security operations centre running 365/24/7, along with about 100 other workstations running video at any given time throughout the organisation’s locations, Davis also needed a way to streamline the number of permissions, access and remote troubleshooting and capabilities across the entire organisation. So, a few years ago, Multicare partnered with integrator Entrance Controls and technology partners, Salient Systems and AMAG Technology, to begin the process of integrating its video surveillance, while upgrading its cameras, VMS, surveillance capabilities and access control operations. IP video capabilities “This was a team effort to pull off a project of this size. We needed to make sure that calculations, server type, and correct camera counts/types were accounted for. We all worked together to make sure that everyone was kept in the loop,” explains Blake Albertsen, regional sales manager for Salient Systems in the Pacific Northwest and Western Canada. The healthcare organisation has nearly completed its security upgrades: upgrading the VMS to a unified platform from Salient Systems; installing roughly 90 servers to allow the organisation to experience full IP video capabilities; upgrading its 3,000-plus analog cameras to IP as they age out, as well as using Salient’s GEN II Capture card technology to get extra life and optimised capabilities out of other existing analogue cameras without having to invest in encoders. Better situational awareness In addition, two-way integration with AMAG’s Symmetry Access Control system and Salient Systems’ CompleteView VMS allows Davis and his team to pull up, search and see motion-related video clips associated with access control events whenever necessary, yielding better situational awareness and streamlining investigations. “We spent over 18 months developing the plan and design of each server before we ever placed one server into the Multicare platform. There were so many different moving pieces we needed to make sure were in place for a successful upgrade,” Albertsen says. Single VMS solution The upgrades have allowed Multicare to not only boost security, safety and efficiency, but it has also saved Davis and his staff significant time already. “Before we had a centralised, single VMS solution, we didn’t have capabilities of customising camera views at every location. Some locations have more cameras than others and once our staff had a view that had been created for them, they couldn’t change the view,” Davis says. Now, the VMS allows staff and operators the ability to easily customise their surveillance views and change those views depending on the locations, cameras and angles they need to see. This has come in handy in many ways, especially when hospital staff need to see a specific room for a day or a period of time depending on what’s happening, but don’t need to watch that view all the time. “The interface has improved our usability dramatically because it’s so customisable,” Davis adds. Indoor and outdoor cameras Another unexpected benefit of the security upgrades thus far has been the peace of mind a unified security platform has given to Multicare employees. Because both indoor and outdoor cameras are all on one centralised platform, hospital employees can be escorted by security to access perimeter cameras in parking garages or outdoor locations when leaving at night so they can virtually scan the area before exiting the building. “That has given many team members a feeling of additional safety, which has been great for staff,” Davis says. Over the next several years, Multicare will continue to upgrade its legacy cameras and servers across sites it hasn’t reached yet, with the ultimate goal of having all its video surveillance under one, customisable platform. Benefits of centralised security In addition, according to Davis, as the healthcare system has begun to experience the benefits of centralised security, they would like to expand the number of cameras and views at many facilities, while also expanding uses and capabilities of the system. “We are taking baby steps as it’s an expensive endeavour, but we are growing exponentially and we see an opportunity to expand our capabilities and use into continuing to provide excellent patient treatment and overall security at our locations,” Davis says.

Enhance business intelligence with key control systems
Enhance business intelligence with key control systems

In today’s hospitality environment, properties are expected to deliver exceptional guest experiences and airtight operational security. But juggling physical safety, digital privacy, vendor coordination, and staff accountability isn’t easy – especially when legacy systems like pegboards, logbooks, or unmanaged key drawers are still in use. Intelligent key control systems help users modernise their security while unlocking operational insights for better business decisions. Here are eight ways users can improve security and business intelligence at their facilities using key control: 4 hospitality security enhancements Enforce Access Control: A networked key control system secures high-risk areas like storage, housekeeping, and back-of-house offices with real-time visibility and alerts. Reduce Risk of Internal Theft or Misuse: Automated key storage with audit trails deters misuse and helps quickly identify issues, lowering theft and liability exposure. Improve Accountability and Guest Protection: Detailed tracking holds staff accountable, highlights unusual behaviour, and strengthens guest and personnel safety. Reduce Rekey Expenses: A networked key control system prevents lost keys and lets you trace usage instantly, reducing costly rekeying. 4 business intelligence boosters Spot Trends with Key Usage Reports: Automated reports show which areas and tools are used most often, helping users plan staffing, prepare supplies, and detect anomalies. Streamline Vendor and Contractor Access: Grant time-limited, role-based permissions to contractors and deliveries, reducing the need for staff supervision and easing the front desk workload. Maximise Asset Utilisation: Keys unlock more than rooms. They also access golf carts, radios, minibars, tools, and more. Tracking usage helps manage inventory, reduce loss, and improve availability. Update Access Instantly: With centralised software, users can revoke or adjust permissions across the property in seconds – safer and faster than manual updates.