Mobile Access Trends

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

Latest Access control news

iDenfy launches advanced AML screening software
iDenfy launches advanced AML screening software

iDenfy, a global pioneering RegTech company specialising in identity verification and fraud prevention, announced the launch of its new Anti-Money Laundering (AML) solution, designed to screen individuals and businesses against various AML databases, such as global sanctions lists. The updated framework defines how iDenfy’s automated AML system prevents, detects, and monitors money laundering risks to provide the best suitable tool to comply with international regulatory standards and recognise fraud with world-class data sources. AML Screening platform The new AML Screening platform introduces a fully documented and updated operational workflow, which is designed to ensure consistent, transparent, and auditable compliance settings across all iDenfy products, including Know Your Customer (KYC) and Know Your Business (KYB) verification systems. It provides organisations with advanced tools to monitor individuals and entities against sanctions, Politically Exposed Persons (PEPs) lists, adverse media, and other risk datasets in real-time. Compared to the old software, iDenfy has improved many areas, especially in areas like retrieved AML results or the manual input that compliance teams use. New labels and risk categories According to Domantas Ciulde, the CEO of iDenfy, there are new labels and risk categories, with all individuals and their portraits added to the dashboard: “You need to enter the person’s name, and that’s basically it, since the system collects, verifies, and cross-matches their personal information, providing you with a full risk profile in seconds.” “This allows companies to forget challenges like manually entering multiple details about the individual to get the system to return AML results, including other standard issues like manually accessing different PEPs or sanctions lists.” AML Screening software The newly presented AML Screening software introduces a new configuration structure that allows iDenfy partners to manage AML match thresholds, PEP risk tiers, and sanction filters within a single platform. It enables both manual and automated AML checks, triggered via dashboard or API, that ensure a greater flexibility for financial institutions, fintechs, and other high-risk, regulated industries that juggle a high volume of corporate clients. In addition, AML checks can now be performed instantly during onboarding processes, as well as seamlessly integrated with other iDenfy’s KYC and KYB systems. Advanced logic for handling high-risk clients The update also introduces advanced logic for handling high-risk clients, such as PEPs. iDenfy’s new classification helps clients evaluate the risk of both foreign and domestic PEPs, their family members, and close associates. Now, the new AML software assigns PEP tier levels based on their influence and exposure. As an example, Tier 1 shows heads of state and senior ministers, and Tier 3, local officials or lower-risk positions. These classifications help organisations to apply enhanced due diligence measures only when necessary, eventually reducing operational friction. iDenfy’s AML dashboard page In addition, iDenfy’s AML dashboard page is able to automatically adjust custom filters and changes based on the partner’s setup. Users can check risk lists and execute search results to get information about a particular person, along with search details and overall AML check status. As a result, instead of “AML suspected” and “AML not suspected” result tags, now there are improved, more accurate results via wording like “Flags found”, “Flags not found”, as well as “True positive” and “False positive” symbols that simplify detailed AML screening’s results. Extracting information iDenfy’s AML platform extracts information from over 45,000 official public sources and databases across more than 210+ jurisdictions, including the United Nations, European Union, OFAC, and other national authorities. Every verification is recorded in full detail, including search parameters, datasets, timestamps, and reviewer comments, to maintain a verifiable audit trail. The system also supports continuous data updates, the PEP database, and refreshes it within 48 hours of any global election or leadership change. By adopting all needed sanctions and PEP data from multiple jurisdictions in a simple dashboard with easy-to-read instructions, iDenfy allows companies to stay up-to-date with changing regulatory requirements, especially in today’s landscape, where geopolitical uncertainty is a major factor. Regulatory watchdogs It’s worth mentioning that the regulatory watchdogs like the Financial Action Task Force (FATF) also continue to emphasise the importance of automated, technical AML tools, urging businesses to implement AI-powered verification, screening and monitoring systems that are capable of detecting complex cross-border threats and reducing false positives while onboarding new users. “In today’s environment, regulators expect more than meeting compliance standards; they expect accountability and precision. Our new AML system is designed to help other companies meet those standards by integrating efficient automation, real-time data intelligence, and clear operational logic,” added Domantas Ciulde, the CEO of iDenfy. “Our partners operate in sectors where reputation and trust are everything. With our new AML Screening solution, every dataset, every recheck, and every action is fully documented and traceable. This clarity not only protects companies from regulatory risks but also strengthens their relationships with customers,” commented Viktor Vostrikov, the CMO of iDenfy.

ASSA ABLOY acquires MPI: Metal doors & frames
ASSA ABLOY acquires MPI: Metal doors & frames

ASSA ABLOY has acquired Metal Products Inc. (“MPI”), a US manufacturer of custom-made hollow metal doors and frames. "I am very pleased to welcome MPI to ASSA ABLOY. This acquisition delivers on our strategy to strengthen our position in mature markets through adding complementary products and solutions to our core business," says Nico Delvaux, President and CEO of ASSA ABLOY. MPI's strong reputation "MPI has built a strong reputation in our industry for trusted, consistent delivery and exceptional customer focus," says Lucas Boselli, Executive Vice President of ASSA ABLOY and Head of the Americas Division. He adds, "Their best-in-class lead times for custom metal doors and frames, combined with their strategic footprint in the US, make them a valuable addition to our division. This acquisition enhances our product offering and strengthens our ability to serve customers with speed, reliability, and regional expertise." MPI's main office and factory MPI was founded in 1980 and has some 170 employees. The main office and factory are located in Corbin, Kentucky, USA. Sales for 2024 amounted to about MUSD 22 (approx. MSEK 230) with a good EBIT margin. The acquisition will be accretive to EPS from the start.

Comelit-PAC boosts Northwest growth with James Pyle
Comelit-PAC boosts Northwest growth with James Pyle

Comelit-PAC has appointed James Pyle as Business Development Manager (BDM) for the Northwest, reinforcing its commitment to providing specialist support for customers across the region. James joins with a strong background in the security and building technologies sector, having worked with installers, consultants and end users on tailored solutions in both residential and commercial markets.  His primary focus at Comelit-PAC will be Door Entry a continued area of core growth, together with crossover opportunities in Access Control and CCTV, helping customers benefit from the wider integrated product portfolio. Italian design with practical security technology James Pyle says: “I’ve admired Comelit-PAC for some time, particularly its capability to combine elegant Italian design with powerful, practical security technology. It’s a business that truly understands what installers and users need from modern systems.” He adds, “What really stood out to me was the open and collaborative culture. There’s a genuine drive to support customers – whether that’s helping them win a project, advising on the most efficient system layout, or just being available when they need technical input. That’s the kind of team I’m proud to be part of, and I’m excited to contribute to Comelit-PAC’s continued growth across the Northwest.” James’ arrival James’ arrival comes at a time when Comelit-PAC continues to invest in regional support, ensuring local installers and specifiers have access to hands-on expertise and a trusted point of contact for every stage of a project. From initial product selection through to system design, installation guidance and ongoing maintenance support, James will work closely with clients to ensure the right solution is delivered. Strong customer relationships Steve Riley, Division Director at Comelit-PAC, added: “James brings with him a proven track record of building strong customer relationships and supporting projects from concept to completion.” He continues, “His appointment reflects our commitment to being a true partner, providing consistent and proactive support across the regions we serve. With Door Entry at the heart of his role, and a strong awareness of how our Access Control and CCTV systems can integrate, he will play an important part in helping customers and end users to “feel secure.”” James is in post and engaging with customers throughout the Northwest. Installers, consultants and specifiers interested in connecting can reach out to arrange an introduction or discuss upcoming projects. 

Keycafe MS5: Revolutionising dealership key management
Keycafe MS5: Revolutionising dealership key management

Keycafe, a global pioneer in cloud connected key management, continues to expand the success of its MS5 SmartBox, an advanced solution already trusted by automotive businesses worldwide. Built for teams managing anywhere from a few to hundreds of vehicles, the MS5 has become a new benchmark for key management, control, and traceability. “Every lost or misplaced key can disrupt workflow and damage customer confidence,” said Jason Crabb, CMO and Co-founder of Keycafe. “The MS5 SmartBox gives dealerships an easy, secure way to manage key access, track usage, and build a more reliable, professional experience for both staff and customers.” Security and accountability at the core Constructed with a steel-reinforced enclosure and advanced electronic locking system, the MS5 SmartBox provides controlled, tamper-resistant storage for every vehicle key. Only authorised users can access keys using a PIN code, QR scan, or the Keycafe mobile app, and all activity is recorded instantly in the cloud for complete traceability. The MS5 SmartBox includes a 7-inch touchscreen, 5MP camera, and optical motion sensor that enhance both usability and access control. Each interaction can generate a visual record, adding an extra layer of verification and supporting accurate audit trails. Through the Keycafe cloud platform, managers can monitor and manage access in real time. Even during connectivity interruptions, the MS5 remains operational with offline mode, a fail-safe release, and battery backup, ensuring continuous access and workflow reliability. Designed for dealership operations The MS5 system was purpose built for the fast paced demands of automotive retail and service operations. The system can scale modularly to manage from 9 to 429 keys per MS5 base station. The Keycafe key management system allows for multiple locations within a single dealership for keys to flow between different departments easily. Keycafe designed the MS5 to give dealerships precise control and greater efficiency through smart, automated features: Role-based permissions allow sales, service, and detailing teams to access only the vehicles relevant to their work. User access limits keep vehicles available by preventing staff from holding more keys than needed. Automatic return reminders alert users when a key is overdue, removing the need for manual follow-ups. Field swaps let staff transfer key custody directly through the app without returning to the SmartBox. Zapier integration connects the system to hundreds of business tools for automated workflows, alerts, and data synchronisation. This combination of controlled hardware, cloud oversight, and automation gives dealerships an effective balance of access control and agility, improving both security and daily performance. Proven results across the automotive industry Dealerships around the world have already adopted Keycafe’s technology to modernise their processes and strengthen internal security. At Somerville Auto Group, a multi-location fleet operator in Canada, the company eliminated key loss entirely after implementing the system. “The responsibility and savings that come with not losing your keys and knowing where they are at all times is fantastic,” said Dean Earle, Director of National Fleet Operations. “We couldn’t be happier”. Growing challenge In Japan, Nicole Competizione, the country’s largest Ferrari facility, faced a growing challenge managing new smart key fobs that couldn’t be hung on traditional hooks. The dealership adopted Keycafe’s SmartBox to store and track keys individually with secure credential-based access. “Operational efficiency has improved dramatically with Keycafe,” said Akinori Sasaki, who oversaw the implementation. “Each key is stored in its own compartment and available only to authorised personnel, giving us complete peace of mind”. Meanwhile, Autohouse Kingston, a family-owned dealership in Canada, reduced lost keys and improved handoff speed between departments. “Since installing Keycafe, my key issues have disappeared,” said Tyler Burley, Digital Asset Manager. “It’s a simple way to keep everything secure and monitored, the best customer service of any third party I’ve dealt with at a dealership”. These real world results show that smart key management has become an essential part of dealership security and daily operations. Advancing access control for dealerships Traditional pegboards, key hooks, and manual logs have long been a weak link in dealership management. Lost or misplaced keys not only increase replacement costs but also expose businesses to risk and reduce customer confidence. Keycafe’s MS5 SmartBox delivers a clear upgrade by providing real-time digital tracking to give dealerships full visibility and control over their key inventory. As automotive retail continues its shift toward connected and data-driven practices, the MS5 SmartBox stands out as a practical and scalable access control solution. It enables dealerships to protect assets, maintain accountability, and keep operations on track at all hours within a single, unified platform.

Access control applications

Cognitec's facial biometrics at Australian Airports
Cognitec's facial biometrics at Australian Airports

Cognitec Systems Pty Ltd is working with Home Affairs Australia to deliver 250 camera devices for facial image capture, image quality check, and traveller identity verification at all major international airports in Australia. With approximately 41 million international travellers entering and leaving Australia each year, the Department uses facial biometrics to collect and electronically verify the identity of eligible international travellers. Cognitec hardware and software systems Cognitec’s capture device, FaceVACS-Entry, detects the person’s height, automatically adjusts the camera position to capture a frontal pose photo, and uses automated face recognition to verify person identity. Cognitec is also providing integration software, mounting hardware, device installation services, as well as ongoing support and maintenance services for all Cognitec hardware and software systems. Relationship with the Department of Home Affairs “Cognitec is proud to continue a successful relationship with the Department of Home Affairs, and to deliver our technology for quick collection of biometric photos and for accurate traveller verification at the Australian border primary lines,” says Terry Hartmann, Cognitec’s Vice President Asia Pacific, adding “This project contributes to the security and ongoing digitisation of the Australian border, ensuring trusted traveller identities.” FaceVACS-Entry is used by governments worldwide for applications that require the acquisition of standards-compliant photos, and the verification of a live image against reference images, such as access control, border control, and entry/exit programs.

Hanwha Vision enhances Ericeira's traffic flow
Hanwha Vision enhances Ericeira's traffic flow

Ericeira, a seaside town on the western coast of Portugal, is a popular tourist destination and is known as one of the top surfing destinations in Europe. It has a population of just over 10,000 citizens with this increasing during the busy summer season.  The Municipal Council of Mafra, the local government body overseeing the region, recognised that the increase in traffic during the summer months needed greater monitoring and control to reduce congestion and the risk of accidents. Improving traffic and pedestrian flow A national road, 247, is the main through route for the town and, therefore, is priority for an intelligent traffic management system. At marked crossings where traffic will stop for pedestrians, congestion was particularly acute. The council wanted a solution that would prevent static, inefficient traffic and could adapt to dynamic changes in vehicle and pedestrian flow. Local installer Soltrafego undertook a detailed technical study that identified the need for intelligent video surveillance and traffic analysis. Hanwha Vision was chosen due to its effective and robust cameras. Monitoring congestion Cameras were installed at signal-controlled intersections, with four QNO-C8083R AI cameras installed per intersection. Two were positioned to monitor traffic in both directions, and the other two covered pedestrian areas. Entry and exit zones were set up to monitor vehicle flow, counting the number of vehicles and sending this volume data to traffic light controllers. Traffic light red and green intervals would be automatically adjusted according to detected traffic density. Two virtual zones on each side of the pedestrian crossings were set up on the other two cameras to monitor the number of people waiting in those areas. When the number of people reaches a pre-defined threshold, the pedestrian green light is triggered, and traffic is stopped to prevent overcrowding at the waiting area and ensure a safe crossing for pedestrians. A boosted traffic and pedestrian experience Thanks to the implemented intelligent traffic solution, vehicle and pedestrian movements in Ericeira have improved, especially during the summer months. Optimised traffic light timing based on real-time, dynamic data from the QNO-C8083R cameras avoids unnecessary delays and lowers the risk of accidents at the crossing points where the cameras are installed. Automating traffic light and pedestrian crossing controls improves operator efficiency and meets actual demand without manual input. The cameras were installed within existing infrastructure, requiring no extensive construction or physical alterations. The data collected by the cameras can be used to inform future town improvements, and the installation has become a pilot model for other towns in the area that are facing similar challenges.

Absolute Security leads in patch management solutions
Absolute Security leads in patch management solutions

Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions.  In the report, Cybersecurity Analyst Stan Wisseman recognised Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organisations run behind on patching an average of 56 days. Although organisations set their own patching schedules, this is well beyond the accepted 30-day standard set by organisations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index.  With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognised Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customisation: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organisation’s business priorities. Workflow Integrations: GigaOm emphasised Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).

Salisbury Cathedral: Secure Magna Carta with Dahua
Salisbury Cathedral: Secure Magna Carta with Dahua

As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialised surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution colour footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.