Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
CAME KMS have partnered with Amazon Logistics UK to integrate Amazon Key access events into SimpleKey Web (SKW) systems running on CAME KMS SK4 installations. This deep integration both enables Amazon Key entry to a building and records Amazon Key activations as unique events for a full, reportable audit trail within SKW. The Amazon Key system is a service provided by Amazon Logistics UK to streamline deliveries to multi-dwelling buildings. With the rise of online shopping and associated product deliveries, many building owners have identified the frustrations residents can have when receiving parcels. Security and privacy considerations Security and privacy considerations around who can access a building and its communal areas or individual apartments can result in parcels not being delivered in a timely or safe fashion. Amazon Logistics UK can liaise with Housing Associations and building owners to develop a programme installing devices that integrate with door entry systems to allow Amazon delivery drivers time-limited access to the building and leave packages in a secure location. This reduces missed deliveries and ensures only registered Amazon drivers have access to the property for a limited time. SimpleKey Web and SK4 Integration In partnership with Amazon Logistics UK, CAME KMS have developed an integration process for the Amazon Key device alongside building a new “event type” into SimpleKey Web in order to differentiate Amazon Key entries from other door entry events. This allows a full audit trail of Amazon Key entrance events to ensure the system is working as expected. Whilst the Amazon device can open the door remotely from the SK4 system, due to the nature of the integration the input(s) can be disabled at any time on request from the client. Building Managers can also apply a time profile on the Amazon Key input to manage access hours, limiting free Amazon driver access between approved times. Integration Process The integration process is straightforward: Amazon Logistics UK liaise with the client direct regarding assets and the identification of suitable sites, guidelines around minimum unit dependencies are applicable from Amazon. Liaise with CAME KMS for integration with SK4 Installations are then carried out by Amazon trained and improved installers. CAME and Amazon have agreed to follow a default installation process for simplicity. Amazon supply the device along with the following: Separate plastic adaptable enclosure; 240v AC to 12vDC power supply; Antenna; SIM Card The installation will require access into the CAME KMS or CAME Entrotec enclosure in order to wire the systems together. Connect the two systems together SimpleKey Web Rollout The Amazon Key product feature will be available to UK SKW customers from November 2025. There is no cost to for the SKW integration, these developments form part of the continued feature set expansion within SimpleKey Web. Amazon Key integration is not turned on by default and SKW users will have to request activation and testing from CAME KMS to open up the tools in SK4. The Amazon Key service provided by Amazon Logistics is available at no cost to qualifying installations.
Euralarm will organise a Perimeter Round Table on November 25, during the Section Meetings in Athens. Interested parties can join the round table either online or in person. The security landscape in Europe is evolving rapidly. As technology advances and threats become more complex, perimeter protection has emerged as a critical layer in safeguarding people, property, and infrastructure. Industry experts and decision-makers Recognising the growing importance of this field, Euralarm is organising a Perimeter Round Table to bring together stakeholders from across the security industry. Interested organisations, including manufacturers, integrators, and sales organisations active in perimeter protection technologies, are invited to share their perspectives and help define the priorities and a roadmap. This open, collaborative session will bring together industry experts and decision-makers who share a common goal: to strengthen perimeter protection across Europe through innovation, harmonisation, and advocacy. Join the conversation If the organisation designs, manufactures, sells, or integrates perimeter protection systems — or is otherwise involved in securing critical infrastructure and outdoor environments — this is the opportunity to join and work together on the future of the Perimeter business.
Milestone Systems announced the latest updates in XProtect 2025 R3 and the Arcules platform, delivering new capabilities that accelerate investigations, strengthen security operations, and simplify system management. The latest releases for XProtect VMS and Arcules VSaaS address the real-world challenges facing security professionals by making surveillance systems more intelligent, accessible, and easier to manage while maintaining the open-platform flexibility that has made Milestone a trusted partner worldwide. XProtect delivers proactive monitoring XProtect Remote Manager introduces new comprehensive monitoring and management capabilities that enable security teams to maintain system health and respond to issues before they impact operations, eliminating time-consuming site visits. Remote management, along with improved monitoring of recording servers, allows administrators to detect and resolve critical issues, such as full databases or server health problems, without local access. Event-based notifications keep teams informed through customised email alerts when cameras, servers, or other components experience status changes, supporting faster response times across cameras, recording servers, hosts, sites, services, devices, and camera components. Risk of unauthorised access risks Video permissions control provides granular management of video feed visibility, allowing site owners to define precisely who can view specific cameras to minimise the risk of unauthorised access risks. Another key feature is the new Role-based Access Control Permissions for access control systems, which allows administrators to restrict the visibility and operation of access control units based on user roles directly within XProtect. By eliminating separate logins for third-party access control systems, this integration creates a unified interface for managing integrated security solutions. Arcules platform delivers faster studies and enhanced reliability The Arcules cloud platform receives substantial new enhancements that accelerate investigations, improve detection accuracy, and increase deployment flexibility for cloud-based surveillance operations. New Multi-Camera Forensic Video Search enables security professionals to analyse footage across multiple cameras simultaneously in a unified interface. Teams can quickly trace movements and reconstruct events with complete multi-angle perspectives, proving especially valuable for campus safety, emergency response, and traffic monitoring. Dual-Layer Motion Detection reduces the risk of missed events by combining Arcules video analytics with on-camera motion detection algorithms. This approach ensures critical motion events are captured, with recordings stored in the cloud or on edge gateways. The feature works with ONVIF M and T cameras across both cloud and edge gateway deployments. Sharing of video evidence with law enforcement New Extended Camera-to-Cloud Compatibility expands support to devices with limited internal memory, making cloud video surveillance accessible to even more deployments. Organisations can deploy cost-effective cameras while maintaining full cloud capabilities and deployment flexibility. External Case Sharing enables secure, time-limited sharing of video evidence with law enforcement, legal teams, and third-party investigators. External recipients can access shared Cases through secure links without an Arcules account, with access automatically expiring based on set permissions. Keeping organisations, people, and assets safe These updates across XProtect and Arcules deliver smarter search tools, more reliable detection, enhanced system monitoring, and secure collaboration features that help organisations protect people, assets, and operations more effectively.
DigiCert, a pioneering provider of digital trust, released its first RADAR Threat Intelligence Brief, a quarterly publication delivering data-driven insights on emerging cyber threats. Drawing from trillions of network events across DigiCert’s global security platform, including UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR provides one of the most comprehensive views of the evolving threat landscape. Fundamental shift in cyber warfare The Q3 2025 RADAR brief highlights an unprecedented surge in distributed denial-of-service (DDoS) attacks that reached “internet tsunami” scale, with two events peaking at 2.4 terabits per second (Tbps) and 3.7 Tbps, respectively. These attacks underscore a fundamental shift in cyber warfare where the internet itself becomes both the weapon and the battlefield. Top findings from the Q3 2025 DigiCert RADAR DDoS Attacks Reach Record Scale: DigiCert’s UltraDDoS Protect network absorbed multiple multi-terabit attacks—the largest seen to date—while preventing an estimated 3,000 hours of potential website downtime for customers. Geopolitical Realignment Fuels Cyber Risk: Attack traffic increasingly originates from regions where digital infrastructure is outpacing regulation, with Vietnam, Russia, Colombia, and China ranking among the top five sources. Higher Education Targeted: September saw a significant rise in DDoS attacks on universities and academic networks, ranking higher than financial services and IT/Software services, timed with peak enrolment periods and open campus infrastructures. Automation Drives Modern Threats: Malicious web activity rose from 51% in July to 73% in September, with 32 million bot violations recorded in September alone, confirming that automation now powers most large-scale attacks. FormErr Spike Highlights DNS Interdependence: DNS errors caused by misconfigurations jumped 22,000% mid-quarter, reflecting how quickly issues can ripple across the internet. Targeted precision attacks “Attackers are not just choosing between precision and scale anymore, they’re mastering both,” said Michael Smith, AppSec CTO at DigiCert. “Our data shows that targeted precision attacks dominated two of the three months, while large-scale carpet-bombing campaigns surged in August, accounting for 65% of all incidents. As threats grow more complex, organisations need visibility that spans infrastructure, applications and identity to stay resilient.” Critical infrastructure and geopolitically significant regions Smith added, “We also saw that the United States bore the brunt of these attacks, accounting for 58% of global DDoS activity, with the United Kingdom (11%) and Saudi Arabia (11%) also heavily targeted." "Adversaries are focusing their firepower on critical infrastructure and geopolitically significant regions, those where disruption has the greatest ripple effect.”
Access control applications
Cognitec Systems Pty Ltd is working with Home Affairs Australia to deliver 250 camera devices for facial image capture, image quality check, and traveller identity verification at all major international airports in Australia. With approximately 41 million international travellers entering and leaving Australia each year, the Department uses facial biometrics to collect and electronically verify the identity of eligible international travellers. Cognitec hardware and software systems Cognitec’s capture device, FaceVACS-Entry, detects the person’s height, automatically adjusts the camera position to capture a frontal pose photo, and uses automated face recognition to verify person identity. Cognitec is also providing integration software, mounting hardware, device installation services, as well as ongoing support and maintenance services for all Cognitec hardware and software systems. Relationship with the Department of Home Affairs “Cognitec is proud to continue a successful relationship with the Department of Home Affairs, and to deliver our technology for quick collection of biometric photos and for accurate traveller verification at the Australian border primary lines,” says Terry Hartmann, Cognitec’s Vice President Asia Pacific, adding “This project contributes to the security and ongoing digitisation of the Australian border, ensuring trusted traveller identities.” FaceVACS-Entry is used by governments worldwide for applications that require the acquisition of standards-compliant photos, and the verification of a live image against reference images, such as access control, border control, and entry/exit programs.
Ericeira, a seaside town on the western coast of Portugal, is a popular tourist destination and is known as one of the top surfing destinations in Europe. It has a population of just over 10,000 citizens with this increasing during the busy summer season. The Municipal Council of Mafra, the local government body overseeing the region, recognised that the increase in traffic during the summer months needed greater monitoring and control to reduce congestion and the risk of accidents. Improving traffic and pedestrian flow A national road, 247, is the main through route for the town and, therefore, is priority for an intelligent traffic management system. At marked crossings where traffic will stop for pedestrians, congestion was particularly acute. The council wanted a solution that would prevent static, inefficient traffic and could adapt to dynamic changes in vehicle and pedestrian flow. Local installer Soltrafego undertook a detailed technical study that identified the need for intelligent video surveillance and traffic analysis. Hanwha Vision was chosen due to its effective and robust cameras. Monitoring congestion Cameras were installed at signal-controlled intersections, with four QNO-C8083R AI cameras installed per intersection. Two were positioned to monitor traffic in both directions, and the other two covered pedestrian areas. Entry and exit zones were set up to monitor vehicle flow, counting the number of vehicles and sending this volume data to traffic light controllers. Traffic light red and green intervals would be automatically adjusted according to detected traffic density. Two virtual zones on each side of the pedestrian crossings were set up on the other two cameras to monitor the number of people waiting in those areas. When the number of people reaches a pre-defined threshold, the pedestrian green light is triggered, and traffic is stopped to prevent overcrowding at the waiting area and ensure a safe crossing for pedestrians. A boosted traffic and pedestrian experience Thanks to the implemented intelligent traffic solution, vehicle and pedestrian movements in Ericeira have improved, especially during the summer months. Optimised traffic light timing based on real-time, dynamic data from the QNO-C8083R cameras avoids unnecessary delays and lowers the risk of accidents at the crossing points where the cameras are installed. Automating traffic light and pedestrian crossing controls improves operator efficiency and meets actual demand without manual input. The cameras were installed within existing infrastructure, requiring no extensive construction or physical alterations. The data collected by the cameras can be used to inform future town improvements, and the installation has become a pilot model for other towns in the area that are facing similar challenges.
Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In the report, Cybersecurity Analyst Stan Wisseman recognised Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organisations run behind on patching an average of 56 days. Although organisations set their own patching schedules, this is well beyond the accepted 30-day standard set by organisations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index. With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognised Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customisation: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organisation’s business priorities. Workflow Integrations: GigaOm emphasised Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).
As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialised surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution colour footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.