Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
HID and Sharry have taken digital wallet-based student IDs into European higher education for the first time, delivering the capability at H-FARM College and enabling students, faculty and staff to access campus spaces using their smartphones or smartwatches. The deployment marks a significant milestone for European higher education, bringing together Sharry's smart access and workplace experience platform and HID's trusted identity solutions to deliver a seamless, digital-first campus experience. Workplace experience platform Located on the edge of the Venice lagoon in northern Italy, H-FARM College is a unique innovation ecosystem where education, startups and technology coexist on one integrated campus. Now, the institution is pushing the boundaries of how technology enhances everyday campus life. With the recent launch of Wallet-based student IDs, undergraduate and postgraduate students, faculty and staff at H-FARM College can access their campus spaces with just a tap of their phone or smartwatch – from their room to common areas and printer stations. “From the very beginning, we envisioned a campus where credentials would always be within reach, directly on a smartphone. With HID and Sharry, this vision has become a reality through a solution that is simple, secure and reliable. Student enthusiasm was evident right away: within just three minutes of receiving the notification, 70% had already activated their virtual badge - a clear sign of how much this innovation was anticipated,” said Alberto Aldrigo, CTO at H-FARM. Advancing campus technology At the core of the campus’ digital experience is the H-FARM app, available on both the App Store and Google Play. The app enables students, professionals, and visitors to explore the campus map, order and pay for food and stay up to date with events and news. The addition of wallet-based student IDs extends that experience by enabling smartphones and smartwatches to function as secure digital credentials, reflecting H-FARM's commitment to advancing campus technology and the student experience. HID’s trusted identity infrastructure provides the credential issuance layer, enabling secure digital IDs to be provisioned and managed at the campus scale. Sharry connects H-FARM’s identity management with HID’s infrastructure, acting as the middleware layer that ties the two together. With a single tap in the H-FARM app, users can add their credentials to their digital wallets. And, thanks to Sharry’s integration with a Genetec access control system, students can move across campus spaces quickly and securely, all without having to open additional apps or carrying physical badges. Higher education deployments “We are proud to join forces with HID to bring the first digital wallet experience to higher education in Europe,” said Matěj Pokorný, Head of Customer Success at Sharry. “Our collaboration with H-FARM has been nothing short of remarkable. What might have taken months was accomplished in just a few weeks, a testament to the shared vision and agility of everyone involved. H-FARM sets a new benchmark for how campuses can modernise access and identity, without compromising security. And we believe it will become a reference point for higher education deployments across Europe.” Digital wallet experience “H-FARM's deployment is a strong example of what a truly digital campus can be: secure, mobile and frictionless by design. By placing student identity at the heart of the digital wallet experience, this implementation demonstrates how modern identity and access can be delivered seamlessly across the entire campus environment,” said Dominic Bruning, Director of Strategic Alliances for Mobile, EMEA, at HID. This deployment marks a significant step toward fully digital campuses in Europe, enabling identity, access and services converge in a single mobile-first experience. It also expands the long-standing collaboration between HID and Sharry, who have previously delivered several industry firsts, including early wallet-based office access projects in the United States, European Union, and most recently Latin America.
Scality, a pioneer in cyber-resilient storage software for the AI era, announces the appointment of Greg DiFraia, former CEO of Inlayer, as Senior Vice President of AI Alliances and Partnerships. In this role, DiFraia will lead Scality’s global AI ecosystem strategy, driving strategic partnerships and go-to-market initiatives to accelerate enterprise AI adoption. DiFraia brings over two decades of experience scaling technology businesses, with deep expertise across data storage, global markets, strategic sales, and alliances. His background as a field CTO and ecosystem leader positions him to drive execution across both the field and executive levels. Object storage platforms Prior to joining Inlayer, DiFraia spent five years at Scality as General Manager and Field CTO, where he played a key role in driving growth and expanding the company’s market presence. He also served as Vice President of Strategic Alliances at Turbonomic and held multiple leadership roles at Dell EMC, including global sales for the ECS software-defined storage platform. During his time at Dell EMC, he was also part of the product launch teams for Atmos and ECS, two foundational object storage platforms in the industry. At Scality, DiFraia will focus on expanding the company’s AI alliances and partner ecosystem, working closely with leading technology providers, system integrators, and cloud platforms to deliver differentiated solutions for enterprise AI workloads. His appointment underscores Scality’s aggressive focus on AI and next-generation data-driven use cases. Machine learning tools “AI is fundamentally changing how organisations think about data infrastructure, and partnerships are critical to delivering real outcomes for customers,” said Greg DiFraia, SVP of AI Alliances and Partnerships at Scality. ”Scality is uniquely positioned with its cyber-resilient storage platform, and I’m excited to build an ecosystem that helps customers scale AI initiatives with confidence.” DiFraia’s appointment builds on Scality’s continued investment in AI innovation, including the advancement of its AI ecosystem certification program, which now includes validations across more than 20 AI and machine learning tools and frameworks. “I am thrilled to have Greg rejoin us after his experience leading a successful new SaaS venture in a chief executive officer capacity. This builds upon his already extensive sales leadership, product strategy, and P&L responsibilities in both large and innovative companies in the storage industry. He is the ideal leader to spearhead Scality’s strategic alliances now and into the future for key initiatives in enterprise AI, cyber-resilience, and sovereign control,” Emilio Roman, Chief Revenue Officer, Scality.
AMAROK, an industry-pioneer perimeter security company, announces it has completed a strategic investment in Evolon Technology, Inc., acquiring a 45% ownership stake in the company. Evolon provides AI-powered video monitoring and virtual guarding solutions for commercial businesses. The partnership brings together proven perimeter defence and AI-powered monitoring to stop threats earlier, reduce losses, and deliver stronger outcomes for customers. This investment reinforces AMAROK’s commitment to providing best-in-class, layered solutions to customers nationwide. As threats to commercial organisations continue to rise in frequency and sophistication, businesses require more advanced deterrents. Electric fencing systems By integrating AMAROK’s proven electric fencing systems with Evolon’s AI-enabled video surveillance and virtual guarding technology, customers gain a state-of-the-art, comprehensive perimeter security solution reinforced by real-time visibility and proactive threat detection. Strengthening the ability to deliver a truly layered, intelligent security solution - unifying The Electric Guard Dog™ Fence, AI-powered camera detection, gate access, and monitoring into one seamless customer experience. The relationship between AMAROK and Evolon began through operational deployment, with AMAROK implementing Evolon’s technology within its own security ecosystem. After extensive technical evaluation and real-world application, AMAROK expanded the relationship through strategic investment, underscoring its confidence in Evolon’s technology and vision. Perimeter security solution “From day one, our focus has been clear: to build the ultimate perimeter security solution in North America,” said Mark Wesley, CEO of AMAROK. “Our investment in Evolon is a natural extension of that commitment. After experiencing the power of its AI-driven virtual guarding technology in our own operations, we recognised the critical role it will play in the future of commercial security. By combining our proven perimeter defense system with Evolon’s intelligent monitoring, we are strengthening our ability to protect customers from the outside in. Just as important, this investment allows us to continue raising the bar for the customer experience by delivering smarter, more proactive protection and greater peace of mind.” Proven perimeter defence “AMAROK shares our conviction about the future of perimeter security: intelligent, highly integrated, and built around the people who rely on it,” said Tom Galvin, CEO of Evolon. “This investment accelerates a roadmap we're deeply excited about — unifying proven perimeter defence with AI-driven monitoring into a single, seamless experience for the security teams who depend on it every day. AMAROK is exactly the partner we hoped to find.” With this investment, AMAROK has appointed two directors to the Evolon Board of Directors: Nathan Leaphart has been appointed to the Board of Directors. He has served as AMAROK’s Chief Financial Officer since 2007, overseeing the company’s financial strategy and execution, compliance, government relations, and legal functions. Leaphart is a Certified Public Accountant and a graduate of the Darla Moore School of Business at the University of South Carolina, as well as Harvard Business School’s Advanced Management Program. Integrated security solutions Hayelom Tadesse has been appointed to the Board of Directors. He serves as AMAROK's Senior Vice President of Strategy and Continuous Improvement, where he leads enterprise strategy, transformation programs, operations, product development, research and development, and mergers and acquisitions. Tadesse is a Lean Six Sigma Black Belt and a Penn State alumnus with deep technology experience, driving operational excellence across complex organisations. AMAROK’s strategic expansion, alongside Evolon’s continued growth, advances both companies’ shared vision to redefine the future of perimeter security in North America. The investment positions AMAROK and Evolon to accelerate innovation, expand their combined market footprint, and deliver more intelligent, integrated security solutions. Together, the partnership strengthens each company’s ability to protect commercial businesses against today’s evolving threat landscape while driving long-term value for customers, partners, and stakeholders.
Allient Inc., a global designer and manufacturer of specialty Motion, Controls, and Power products and solutions for targeted industries and applications, has today announced the release of a new whitepaper titled A Selection Guide to Motors for Humanoid Robotics Systems. Humanoid robotics is transitioning from research into commercial and industrial applications, increasing demand for high-performance actuation in dynamic environments. As these systems develop, actuator performance, torque density, and system-level behaviour are becoming more critical to overall stability and performance, reinforcing the importance of motor selection. Compact actuator environments This whitepaper examines how actuators enable locomotion, manipulation, balance, and interaction in humanoid systems. It also outlines key motor technologies including frameless, slotless, geared, and direct-drive designs. Core performance factors such as torque density, inertia, response behaviour, and thermal constraints are covered in compact actuator environments, alongside system-level challenges, joint-level selection considerations, and emerging trends in humanoid actuation. Allient applies decades of expertise in motor and motion technologies to support humanoid robotics systems in dynamic, real-world environments, delivering high torque density, precise control, and compact integration. “Motor selection has a direct impact on humanoid system performance,” said Robert Mastromattei, Chief Commercial Officer & Group President at Allient. “This whitepaper highlights key considerations in humanoid actuation and offers insight into selecting motors across different joint functions.”
Access control applications
ZeroEyes, creators of the AI-powered visual threat intelligence platform, and High Tech High, a San Diego County, CA-based charter school network, release details of their ongoing collaboration to protect students, staff and visitors from gun-related threats. High Tech High began its integration of ZeroEyes’ proactive AI gun detection and intelligent situational awareness software in September 2023 and has since expanded its deployment, based on positive feedback from parents and law enforcement. Project-based learning model High Tech High is a 16-school charter network serving approximately 6,400 students and employing roughly 1,000 staff members. Known for its project-based learning model, in which teachers craft curriculum in consultation with students, the network intentionally operates small schools with transparent, open spaces designed to foster collaboration, visibility, and strong relationships. “We have always believed that strong relationships are the key security measure,” said Isaac Jones, Chief Operations Officer of High Tech High. “Our campuses are intentionally small and transparent, so students and staff can truly know and support one another. What I love about ZeroEyes is that it enables us to enhance security without putting up walls, installing metal detectors, or battening down the campus. We can provide additional protection while fully maintaining our culture.” Intelligent situational awareness ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operations centre staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If the threat is determined to be valid, alerts and actionable intelligence — including visual description, gun type, and last known location — are dispatched to law enforcement and school officials as quickly as 3 to 5 seconds from detection. Technology-driven protection In addition to true gun detections, the situational awareness provided by ZeroEyes can help prevent non-lethal threats from escalating to law enforcement response. For example, ZeroEyes recently alerted school officials to a student wielding a plastic water gun, prohibited on campus grounds. Parent Ian Stone witnessed the incident and later stated, "I saw your response to the fake weapon the other day, and I was so impressed that you have that level of protection for my family and your students. I now know how serious you are about the safety of our kids." “High Tech High’s thoughtful approach shows that safety and culture are not mutually exclusive,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are proud to provide their network with proactive, technology-driven protection that supports, rather than disrupts, student-centered learning environments.”
RGO College in Middelharnis has selected an Alcatel-Lucent Enterprise network infrastructure solution to ensure secure connectivity for its students and staff. Located in Goeree-Overflakkee. this comprehensive secondary school offers education at multiple levels, including gymnasium, atheneum, HAVO and MAVO1. With approximately 1,000 students, RGO College focuses on inspiring education, personal development and thorough preparation for higher education in a modern and future-oriented learning environment. Connectivity issues RGO College encountered connectivity issues impacting staff and students due to outdated LAN/WLAN network infrastructure. The school chose to deploy Alcatel-Lucent OmniSwitch® 6360 switches and more than 100 Alcatel-Lucent OmniAccess® Stellar AP1321 and AP1351 Access Points (APs). The Alcatel-Lucent OmniVista® Cirrus network management from the cloud and the implementation of Network Access Control (NAC) enable an additional layer of security. Network Access Control (NAC) In accordance with the IBP (Information Security & Privacy) standards framework in the Netherlands, the network has been configured to be fully secure. Network Access Control (NAC) is used to configure network segmentation, so devices, students and staff are separated from one another on the network and assigned specific profiles, roles and permissions. Digital whiteboards used in classrooms are securely connected to the network using Private Pre-Shared Keys (PPSK). Expert insight "We don’t have to do any more network maintenance because we haven’t encountered any problems since the network was upgraded. That saves us a lot of time." Demi Jansen, System Administrator at RGO College "Thanks to our close collaboration with both RGO College, our partner and our distributor, we were able to deliver a magnificent project that is fully aligned with the IBP Standards Framework. This is of great importance within the Dutch education sector, as it ensures digital security for both staff and students, and we are incredibly proud of that." Esli Coenraad, Data Presales Engineer at Alcatel-Lucent Enterprise Secure and stable network Now, with a secure, stable, cloud-managed network, reduced Total Cost of Ownership (TCO) and little to no maintenance, RGO College is well positioned to deliver a high-quality experience for students and staff that meets the expectations of a future-looking educational institution.
Travelers and residential renters increasingly prefer the convenience of digital access. These solutions also offer commercial benefits to businesses operating in these fast-growing sectors: it becomes faster and more cost-efficient for them to roll-out new sites and to manage access to them remotely without the need for expensive 24/7 front-desk operations. City Pop is one short-let furnished apartment rental provider operating in both these sectors. Their growing portfolio of design-led properties covers European cities such as Zurich, Berlin, Prague and Milan. They previously relied on an RFID access-card solution. However, manual handling of credentials created a major challenge to achieving their ambitions. They needed a scalable alternative which would simplify access management and enable their business to grow cost-effectively across international boundaries. Portfolio of serviced apartments For this reason, they adopted card-less, mobile access across their portfolio of serviced apartments – installing Aperio® wireless locks integrated natively with an Incedo Pro access management system. Doors to City Pop apartments and some common areas are equipped with these contemporary-styled wire-free, battery-powered Aperio escutcheons. “We were looking for a future-proof, reception-less access solution that could scale with our growth across Europe,” explains Pawel Gawor, City Pop’s CEO. Integrating access with the booking system automatically distributes entry permissions to customers without manual staff handling. Guests can arrive at convenient times without any need for a reception check-in and have a choice of secure mobile access via the City Pop app or a PIN code to enter directly on the Aperio escutcheon’s keypad. Manual staff handling Choosing to standardise locks with the Aperio E100 Wireless Keypad Escutcheon gave City Pop the ability to retrofit buildings without wiring or door damage. In addition, because reservations software is also integrated with their Incedo Pro system, City Pop automates centralised, real-time, and remote control over time-limited access at multiple sites dispersed around Germany, Czechia, Switzerland, and Italy. Digitalising access in this way gives them the flexibility to offers apartment stays by the month or, at an expanding number of locations, from one night and up. Their ongoing ASSA ABLOY installation project now totals over 2,500 doors… and is still growing. Smartcard management infrastructure Choosing this ASSA ABLOY solution also contributed towards City Pop’s sustainability goals. With no key or smartcard management infrastructure, they use less plastic. Eliminating the need for a 24/7 reception reduces unnecessary staff travel: they manage access remotely. City Pop have also limited their energy use: wireless Aperio locks are powered by standard batteries and draw much less power than equivalent wired access devices. In addition, ASSA ABLOY Signo Readers, installed at external doors, sliding doors, elevators, and some high-traffic interior doors, have an Intelligent Power Mode (IPM) which saves 41% in energy compared to equivalent readers without IPM. “With Aperio wireless locks and Incedo Pro, we now have a fully digital, mobile-first access experience for our guests with no need for staff on-site,” adds Pawel.
Genetec Inc., the global pioneer in enterprise physical security software, announces that Lincoln County Schools (LCS) in North Carolina has modernised its district-wide security infrastructure using Genetec™ Security Center, unifying video surveillance, access control, and intrusion systems across its schools and support facilities. Lincoln County Schools serves over 11,000 students across 23 schools, including 13 elementary schools, four middle schools, four high schools, a technology school, and an alternative school. Four additional buildings support district-wide services such as school nutrition, transportation, and maintenance. As its existing security technology began showing its age, the district set out to modernise its systems. Human resources database “Genetec™ Security Center offered us a great option,” said Steven Hoyle, Chief Technology Officer for Lincoln County Schools. “We have the features we need in one solution that’s easy to use and fits our budget.” At the top of LCS’s requirements was an open, unified security platform. The district wanted the flexibility to reuse existing video and access control hardware while upgrading devices as needed. It also sought to manage video, access control, and intrusion systems within a single solution and to connect other school systems, including the human resources database, to improve process automation. Access control systems LCS began upgrading its high schools’ video surveillance and access control systems, now unified as one in Genetec Security Center. They also added Radionix intrusion detection. When complete, hundreds of cameras, doors, and intrusion sensors across district buildings will be connected to the Genetec open architecture platform. This has also allowed the district to retain much of its existing hardware and to migrate to newer devices at its own pace. “Genetec™ Security Center supports a wide range of third-party technologies, and that’s been a huge bonus for us,” explained Hoyle. “We have the freedom to keep some existing hardware, upgrade to newer devices, and integrate other business systems. This helps us find the right balance between enhancing security and managing costs. And we can do it at our own pace, taking our time to re-evaluate needs and make decisions from there.” Reducing false alarms LCS has also digitised processes by connecting Microsoft Active Directory and its Radionix intrusion detection system within Security Center. With Active Directory integration, cardholder privileges are automatically assigned based on job role and location. When employees join or leave the district, door and system access is activated or deactivated automatically. Synchronising cardholders with the intrusion detection system has reduced false alarms. “In the past, intrusion alarms would sometimes be activated when someone was still in the building, resulting in many false alarms,” said Hoyle. “Now, staff can badge in during set hours, and the intrusion system is automatically armed or disarmed. We’re seeing far fewer false alarms and fewer calls to law enforcement and our administrators.” As upgrades continue, Lincoln County Schools is working with Genetec to expand capabilities and connect additional systems to support faster, more coordinated communication across the district.
The Security Event 2026 news
Award-winning global security manufacturer, Gallagher Security is preparing for a strong return to The Security Event (TSE) 2026 in Birmingham later this month, bringing a wave of new solutions, an ex...
Hot on the heels of last month’s exciting news release announcing the Gallagher Command Centre integration, and now further expanding their unrivalled integration partner portfolio, barox is del...
Flir will showcase its latest advancements in AI‑enabled perimeter protection at The Security Event (TSE) in Birmingham from April 28–30, highlighting the company’s innovative capabilities...
Hirsch UK and TDSi by Hirsch announced that they are exhibiting at The Security Event 2026, taking place at the NEC Birmingham from 28th–30th April. Exhibiting on Stand 5/G60, Hirsch will showc...
Genetec Inc, the pioneer in enterprise physical security software, announces its plans for The Security Event, taking place from 28-30 April 2026 at the NEC in Birmingham. Alongside strategic partners...
Comelit-PAC returns to The Security Event 2026 to present the full breadth of its integrated security and fire safety portfolio, alongside an F1 simulator experience. On stand 5/F60, Comelit-PAC will...
Skills for Security is at The Security Event to highlight the importance of structured training and apprenticeships, supporting skills and competence across the fire and security sectors. With a foot...
