Mobile Access Trends

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

Latest Access control news

Panasonic TOUGHBOOK: Verizon Frontline verified
Panasonic TOUGHBOOK: Verizon Frontline verified

Panasonic Connect North America, Division of Panasonic Corporation of North America, announced that its portfolio of TOUGHBOOK® laptops and 2-in-1 computers has been designated “Verizon Frontline Verified.” The distinction was granted after rigorous testing to ensure the solutions meet the durability, reliability, and connectivity standards required by first responders and public safety professionals using the Verizon network. To qualify, companies must be part of the Verizon Frontline Innovation Program, in which Verizon brings together technology vendors and industry partners to identify, test, and advance communications solutions across four key areas: Preparation, Response, Recovery, and Mitigation. Enhancing situational awareness “Panasonic Connect designs TOUGHBOOK rugged laptops and 2-in-1s based on the unique challenges first responders face every day,” said Calvin Jackson, Senior Manager for Crisis Response at Verizon Frontline. “We’re proud to strengthen our collaboration with Panasonic Connect as we work together to deliver innovative, critical solutions for those on the front lines.” For nearly 30 years, Panasonic Connect has been innovating its TOUGHBOOK solutions to support the specific needs of public safety organisations. Purpose-built for reliability and durability, TOUGHBOOK laptops and 2-in-1s are engineered to withstand the harsh environments first responders encounter daily - helping them improve efficiency, enhance situational awareness, and coordinate more effectively. Now, the entire TOUGHBOOK lineup, including the TOUGHBOOK 40, TOUGHBOOK 55, TOUGHBOOK 33 and TOUGHBOOK G2, has been recognised for its ability to power Verizon Frontline’s advanced network and provide the connectivity first responders need to operate seamlessly in the field. Public safety community “At Panasonic Connect, we’re proud to support the public safety community,” said Mike Smola, Director, Product Management and System Engineering/QA at Panasonic Connect. “Earning the Verizon Frontline Verified distinction underscores our shared commitment to delivering rugged, reliable solutions that help first responders stay connected when it matters most. Together with Verizon, we’re continuing to push the boundaries of innovation to ensure those on the front lines have the tools they need to serve and protect their communities.”

ZeroEyes AI revolutionises drone threat detection
ZeroEyes AI revolutionises drone threat detection

ZE Government Solutions (ZEGS), a wholly owned subsidiary of AI-based gun detection pioneer ZeroEyes, launched ZeroEyes Aerial Detection Kit (ZAD), a portable, drone-based AI threat detection and intelligent situational awareness solution designed for public safety agencies.  The kit provides operators with a stand-alone drone solution that can be deployed in minutes from agencies' existing drone platforms to detect firearms, people, vehicles, drones, and maritime vessels. Rapid integration with drones Outdoor spaces are among the most challenging environments to protect due to their size and open nature, leaving them vulnerable to unauthorised access and potential gun-related violence. ZeroEyes Aerial Detection addresses this critical need with layered advanced AI analytics that detect threats in real time through a drone's live camera feed. To provide confidence and situational awareness, detections can be viewed instantly by law enforcement or security personnel and dispatched immediately to on-site staff when detections are made. Rapid integration with drones ensures that first responders or federal agencies are quickly informed of on-scene security threats, allowing for appropriate response posture to the current situation. ZeroEyes Aerial Detection Kit The kit enhances drone operations for a variety of scenarios, including drone response, event and perimeter security, armed assailants, suspect and article searches, barricaded gunmen, hostage situations, and domestic disputes. Providing immediate detections and alerting improves law enforcement situational awareness and personnel safety. ZeroEyes Aerial Detection Kit integrates seamlessly with existing drones and drone programs, and comes equipped with a carry-on case and a ZeroEyes laptop to stream video and deliver automated alerts to dispatch or operations centers via LTE, Wi-Fi, or mesh radio. It connects to drone feeds or controllers through HDMI, IP address, RTSP or Headsets, and is compliant with the National Defense Authorisation Act and protected by DHS SAFETY Act designation. New drone solution “Protecting outdoor spaces is one of the greatest challenges in security today,” said Dustin Kisling, Executive Vice President of ZE Government Solutions. “With our new drone solution, we can detect potential threats in real time and provide verified alerts, giving organisations and the public the confidence that help is on the way when it matters most.”

X-ray detector solutions by Detection Technology
X-ray detector solutions by Detection Technology

Detection Technology, a pioneer in X-ray detector solutions, announced the launch of its AVA product family. This off-the-shelf, modular line scan detector series is designed to deliver superior imaging performance, versatility, and cost efficiency across security and industrial X-ray imaging applications. The AVA family offers a comprehensive range of detector solutions optimised from value-level systems to premium line scanners. Applications range from entry-level urban security and high-speed aviation to advanced mining and sorting with high-definition TDI (Time Delay Integration) technology. AVA is available as complete subsystems that include detector boards, data combiner boards, software libraries, and all necessary accessories. Integrates two scintillator layers The performance of the AVA platform is based on a simplified hardware design combined with on-chip algorithms and the DT API (Application Programming Interface). Thanks to the DT API, a cross-platform solution is available for Windows, Linux, and ARM systems. Its dual-energy architecture integrates two scintillator layers with an embedded optimised filter for dual energy discrimination on a single PCB, cutting material use by 40% and improving robustness with fewer interfaces and stronger mechanical and electrical connections. The value-segment detectors in the product family feature optimised scintillator structures and materials, enhancing both image quality and cost efficiency by reducing material requirements while improving signal performance. In contrast, the multi-row TDI option is designed for high-speed applications, ensuring exceptionally sharp, high-contrast penetration images even under demanding scanning conditions, such as logistics and e-commerce applications with high screening capacity requirements. Ease of integration, compact design, and durability The AVA product family has been engineered for ease of integration, compact design, and durability in harsh imaging environments, while reducing energy consumption and minimising carbon footprint. Its modular scalability supports shorter time-to-market and easy adaptation to different system setups. Designed for straightforward installation and maintenance, AVA ensures maximised uptime and lifetime across both basic and advanced applications. “Our detector board platform enables both significant cost efficiency and application-optimised imaging performance,” said Tomi Fält, Director of Product Management at Detection Technology. “By combining simplified hardware design with advanced algorithms and a fully digitalised data path, the AVA product family helps our customers accelerate time-to-market while lowering total system costs. In the value segment, customers can achieve cost savings of up to 50% without compromising imaging performance.” Efficient, scalable, and sustainable inspection systems AVA is available globally and is backed by Detection Technology’s worldwide engineering and service support, ensuring reliable performance and customer care across all markets. With AVA, Detection Technology strengthens its position as a trusted partner in X-ray imaging solutions and supports global demand for efficient, scalable, and sustainable inspection systems.

HID acquires IDmelon for passwordless authentication
HID acquires IDmelon for passwordless authentication

HID, a pioneer in trusted identity solutions, announces it has signed an agreement to acquire IDmelon, a Vancouver-based secure sign-in solution provider that streamlines the adoption of passwordless authentication through its proprietary software platform. IDmelon’s offering allows users to turn existing identifiers, such as a physical credential, smartphone, or biometric, into enterprise-grade FIDO security keys. In addition to its software solution, IDmelon offers hardware that supports the FIDO standard, providing a seamless and secure login experience for its users. Leverage existing identifiers “Users have become acutely aware of the problems with passwords,” said Björn Lidefelt, EVP and Head of HID. “By adding IDmelon to the HID family, we now provide an easier path to passwordless.” The FIDO standard, or passkey, has emerged as a secure and convenient approach to eliminating passwords and replacing them with phishing-resistant MFA. Today, enterprises primarily use hardware security keys, including USB or NFC, whereas IDmelon offers a smart solution to leverage existing identifiers as FIDO security keys. Smooth transition to passwordless access The IDmelon FIDO Management Platform makes it easier for organizations to move to passwordless authentication. It simplifies the user experience and connects physical and digital access into one seamless solution. By using existing cards or mobile devices, administrators can quickly register and manage users, while employees can log in securely with a PIN or biometric. This delivers strong security and a smooth transition to passwordless access—without major changes or disruptions, delivering real-time value. Passwordless authentication solutions The platform provides operational efficiency by centralizing passwordless authentication management. Admins can import users and groups, assign and manage access cards or security keys, enforce policies, and monitor activities—supporting a stronger identity-first security posture. Martin Ladstaetter, SVP and Head of Identity and Access Management Solutions, HID, said, “We are committed to providing seamless, best-in-class passwordless authentication solutions. Now, with IDmelon in our portfolio, we are better equipped to help customers maximize their existing hardware investments by converting existing access cards into converged credentials – secure, multi-use keys that unify physical and logical access across the enterprise.” Stronger identity-first security posture Founded in 2019 and a member of the FIDO Alliance, IDmelon is now part of HID’s Identity and Access Management Solutions (IAMS) Business Area. The IDmelon solution is managed within the IAMS Authentication Business Unit and will benefit from HID’s sales and other global functions. “At IDmelon, our vision is to empower people and organizations to stay focused on their businesses and thrive knowing that their identities are protected,” said Bahram Piri, CEO and Founder of IDmelon. “By joining forces with HID, we are in an even stronger position to help organizations overcome the growing problem of passwords to secure them against phishing and other credential-based attacks.” The acquisition is subject to customary closing conditions and is expected to close in the fourth quarter of 2025.

Access control applications

Salisbury Cathedral: Secure Magna Carta with Dahua
Salisbury Cathedral: Secure Magna Carta with Dahua

As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialised surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution colour footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.

Hikvision facial recognition at Rodwell House
Hikvision facial recognition at Rodwell House

Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specialises in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.

RAD's AI solutions transform mobile home security
RAD's AI solutions transform mobile home security

Artificial Intelligence Technology Solutions, Inc., along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced the publication of a new case study detailing the successful deployment of RAD’s RIO 180 units powered by SARA at a mobile home community managed by Champion Real Estate Services. The project, conducted in collaboration with RAD dealer HUB Enterprises, demonstrates how autonomous security solutions can dramatically reduce incidents, restore resident confidence, and redefine community safety. Newly published case study The newly published case study, titled “Transforming Mobile Home Park Security with RAD and HUB Enterprises,” showcases how the partnership between Champion, HUB, and RAD addressed long-standing security challenges at a large mobile home community. The report details how HUB deployed two RIO 180 units powered by RAD’s agentic AI platform, SARA (Speaking Autonomous Responsive Agent), resulting in a near elimination of resident complaints and a sharp decline in trespassing, theft, and disruptive activity. This case joins a growing collection of real-world examples where RAD’s autonomous technologies are redefining safety and operational efficiency across residential, commercial, and critical infrastructure sectors. LED display and talk-down features “HUB brought us a solution from RAD that works,” said Shannon Noble, Managing Broker at Champion Real Estate Services. “The collaboration between Champion, HUB, and RAD has given us a new level of confidence in how we manage security at our communities. The LED display and talk-down features make a powerful impact. Residents see and hear that their community is protected, and it has completely changed the atmosphere.” Technology-driven adoption “This worked where our patrols just couldn’t,” said Jarrett Willoughby of HUB Enterprises. “It’s visible, it’s active, and it gave Champion the confidence to start talking about more deployments right away. What really surprised us was SARA. We thought of it as just a monitoring tool, but the way it responds on its own, the speed of it, that’s what really sold us.” “The results at Champion’s community clearly show how technology-driven adoption can make neighborhoods safer,” said Mark Folmer, CPP, PSP, President of RAD. “RIO powered by SARA provides an immediate and visible deterrent that residents recognise and appreciate. This collaboration with HUB and Champion demonstrates how autonomous security can deliver measurable improvements in safety and peace of mind.” Transforming residential community safety The full case study is now available for download, offering detailed insights into how autonomous security solutions are transforming residential community safety. Property managers, security providers, and industry professionals are encouraged to review the results and explore how AI-powered autonomy can deliver stronger deterrence, faster response, and greater confidence for the communities they serve. ROSA units Sitting atop a standard RIO 180 configuration is a single ROSA units. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-colour, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at mobile home parks, retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. Customised assessment and demonstration The Company encourages property managers, business owners, and municipal leaders seeking to improve security in downtown and high-traffic areas to connect with RAD for a customised assessment and demonstration of its autonomous security solutions. AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. The Company’s operations and internal controls have been validated through successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Led by Steve Reinharz RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry pioneership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Prospective sales pipeline RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.

Connect ONE's ERP: Boosting school emergency response
Connect ONE's ERP: Boosting school emergency response

In an emergency, first responders, School Resource Officers (SROs) and responsible parties need to gain access to campus buildings to assess alerts and potential threats. With Connect ONE®’s new Emergency Response Platform (ERP), included with any service level at no additional charge, first responders and SROs can view cameras, unlock doors and outputs, activate task functions, initiate lockdown and see recent activity. Connect ONE ERP Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins The Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins. Integrators can offer 911 and dispatch centres viewing and access control of schools to assist responders during critical threats. The cloud platform ERP provides a separate agency login with specific designated permissions for first responders, who can only see customer site locations shared by the security dealer. Emergency Response Platform “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to diffuse an emergency quickly and effectively with powerful information to view and control facility security,” said Dan Simon, Technical Director, Connected Technologies.  He adds, “It’s a great solution to heighten safety and create safer experiences for the public, while ensuring you keep a customer long-term with a valuable service.” ERP: Use-case in action Nightwatch Security & Telephone LLC has executed the ERP at several of the area’s school districts Nightwatch Security & Telephone LLC, Sedalia, Mo., has implemented the ERP at several of the area’s largest school districts serving more than 5,000 students. Nightwatch Owner, Jeff Kesterson said it’s simple to update proximity key fobs and input agency officer’s access codes to stay current with staffing changes or modifications to permissions. “First responders and SROs maintain access to schools with proximity access control key fobs, but staying current with staffing changes was unwieldy before the ERP,” said Jeff Kesterson. Key fob credentials The Sedalia Police Department, which has access to schools in the city, said the ERP is a huge timesaver for administering key fob credentials. “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” said Commander Joshua Howell, Operation’s Support Bureau, Sedalia Police Department. Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping – a real-time Google mapping feature, which adds the capability of seeing floor plans of the building along with point and click control of doors and cameras. Dispatch can easily respond to officers on-site and unlock doors for quick entry by clicking on GeoView’s map and door icon. Other features of the ERP A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Integrates with leading intrusion, access control, video, fire, temperature, humidity, MNS, environmental and weather systems. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness.