Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
AMAG Technology, a pioneer in global access and identity solutions, announces an expanded strategic partnership with SwiftConnect, a provider of the connected access network for places and spaces. As part of this expanded collaboration, SwiftConnect will now power Apple Wallet and Google Wallet mobile credential activation across AMAG’s portfolio. This milestone represents a continued acceleration of AMAG’s strategy to deliver modern, mobile-first identity experiences while aligning with best-in-class partners to move faster and execute at the highest level for customers. Scalable digital wallet capabilities By deepening its partnership with SwiftConnect, AMAG is enhancing its ability to deliver seamless, scalable digital wallet capabilities, ensuring customers benefit from specialised expertise and a superior user experience across the entire lifecycle. “We are incredibly excited to expand our relationship with SwiftConnect,” said David Sullivan, CEO and President at AMAG Technology. “This allows us to accelerate innovation and deliver a truly best-in-class digital wallet experience. It’s about aligning with the right partners to build something exceptional for our customers.” User-centric access solutions SwiftConnect’s expertise in mobile access and wallet technologies will strengthen AMAG’s broader platform, supporting enterprise, critical infrastructure, and commercial customers as they transition to more flexible, secure, and user-centric access solutions. “AMAG is setting the standard for what modern access should feel like, and SwiftConnect is proud to serve as the mobile wallet platform powering its Apple Wallet and Google Wallet experience,” said Matt Kopel, Co-CEO at SwiftConnect. “As the connected access network, we make access feel effortless for every person, across every space — replacing friction with fluidity, without proprietary lock-in.” Partner-driven approach At the core of this announcement is AMAG’s commitment to an open, partner-driven approach to innovation. At AMAG, openness is not just about compatibility; it is about intentional collaboration. The company builds its platform through a curated ecosystem of technology partners, each bringing best-in-class capabilities. True openness is about unlocking possibilities and creating solutions that evolve faster, integrate more deeply, and perform better for customers. Bringing together strategic partners This philosophy reflects a broader shift in how AMAG brings solutions to market, prioritising speed, innovation, and customer outcomes over traditional, closed approaches. “This is bigger than a single product or feature,” added Jennifer Marx, Executive Vice President-Product Management at AMAG Technology. "It reflects our core belief that the best solutions come from intentional collaboration, bringing together strategic partners who are leaders in what they do. That's how we show up in the market: open-minded, forward-looking, and relentlessly focused on delivering best-in-class experiences. That's the future we're building, together."
SwiftConnect, the provider of the connected access network for places and spaces, announced that JLL, a foremost global commercial real estate services firm, has standardised on SwiftConnect's connected access network platform to deliver mobile wallet access across its corporate offices and the assets it manages, enabling employees and building occupiers to use mobile credentials in NFC wallets in place of physical badges. Challenges faced by JLL led to SwiftConnect The successful pilot at its 20 Water Street headquarters in London solved core challenges faced by JLL: managing disparate access control systems across its global corporate footprint and integrating its own access control with base building landlord systems, a common complexity in multi-tenanted buildings. The SwiftConnect platform unified JLL's different access control systems into a single pass stored in employees digital NFC wallet, using HID Signo™ readers and HID Seos® credential technology, so that employees can access both base building entrances and JLL office spaces with one credential on their smartphone or wearable device. As a result, the rollout kicked off a phased expansion at JLL’s new flagship UK headquarters and prompted JLL to use SwiftConnect’s connected access network to automate its global security approach around integrating multiple systems into a single digital access pass. Delivering physical security "JLL Spark recognised early on how fragmented the access control landscape was and how traditional access methods were ill-equipped to meet the growing need for frictionless, and on-demand office access, whether at a single location or a portfolio of buildings,” said Daniel Correa, Growth Principal at JLL Spark. “Our investment in SwiftConnect years ago was driven by this clear gap between how enterprises manage physical identity and access. Fast forward to today, our decision to deploy the company’s platform across JLL offices and managed assets is a natural expression of our confidence in what SwiftConnect delivers." Areas of deployment The SwiftConnect mobile access deployment delivers across three areas: Unified mobile credentials and systems enable a single digital pass in NFC wallets on mobile devices, spanning two access control systems for effortless Street-to-Seat® access. Automated, self-service badge provisioning reduces administrative time and accelerated onboarding for new employees. Centralised access management connects JLL’s global offices, delivering operational efficiencies, cost savings, and a best-in-class experience for tenants and guests. Growing momentum "JLL's decision to deploy our connected access network across their own portfolio is the kind of validation that speaks for itself,” said Chip Kruger, Co-CEO at SwiftConnect. “It reflects the growing momentum SwiftConnect is experiencing across the UK and European market for a truly unified approach to access, irrespective of the existing physical security infrastructure." Mobile access deployments Moving ahead, SwiftConnect is also scaling mobile access deployments for JLL as asset manager for its property owner clients. JLL currently manages a number of other buildings where SwiftConnect has implemented mobile access, including an ongoing deployment to 10,000 users this year.
iDenfy, a global pioneer in RegTech identity verification and fraud prevention solutions, launched an identity verification application for WooCommerce merchants. The new integration gives online store owners a direct way to require identity verification for customers before purchase or in other, higher-risk scenarios, depending on the store’s risk management strategy and unique case. The idea behind the plugin is that it’s easy to use and doesn’t require any complex manual setup or special skills, which traditionally would result in extra hassle and higher costs for the business implementing Know Your Customer (KYC) verification. Identity verification application WooCommerce alone powers tens of millions of active stores globally and now is able to offer advanced identity checks to verify real customer identities, detect duplicate accounts, and address fraud abuse cases in one platform. However, according to iDenfy, most online stores have no reliable systems to verify who their buyers actually are. For those providing age-restricted items or services, proper KYC verification, such as capturing a user’s ID document and cross-referencing personal information with facial biometrics, is vital. Biometric face recognition iDenfy’s CEO, Domantas Ciulde, claims that checking a person’s ID remains the most effective way to combat fraud online: “Age gates and simple manual date of birth logging are easily bypassable, yet there are solutions that are effective and do not cause drop-offs.” The situation gets even more complicated due to extra pressure from regulators, as the majority of companies are simply not able to precisely identify their customers, resulting in a direct effect on their own opportunities for long-term success. To tackle these issues, iDenfy has developed its own software and announced an identity verification plugin dedicated to WooCommerce users. With this service, retailers can now easily implement identity verification into the checkout process. The solution combines biometric face recognition with a broad coverage of identity documents, exceeding 3000+ types from more than 200+ countries and territories. Flexible configuration options iDenfy has made the plugin easily customisable. It provides flexible configuration options for merchants to define when verification is triggered. For instance, verification can be required for all transactions or only when certain conditions are met, such as higher order values or specific product categories. This is important because every business operates under different risk levels. Once a customer completes the verification process, their verified status is stored and recognised in future transactions. It improves the user experience because returning customers no longer have to repeat the process unless the shop owner sets it in the settings. Real-time data synchronisation The system also includes real-time data synchronisation via webhooks, which ensures that verification results are immediately reflected in merchant dashboards. Orders that are associated with unverified or suspicious users are clearly marked for manual review checks in order to let businesses make informed decisions instead of rejecting transactions immediately. In addition, optional features such as name matching between checkout details and identity documents provide additional accuracy to meet strict compliance standards. “Merchants often face a difficult balance between maintaining a smooth customer experience and meeting regulatory requirements. Our new WooCommerce plugin is designed to apply verification only where it is necessary, which helps businesses protect themselves from fraud and still maintain a user-friendly purchasing process,” added Domantas Ciulde, the CEO of iDenfy. Detecting duplicate accounts Verification tools are becoming a necessary part of modern e-commerce infrastructure because they allow businesses to confirm real user identities, detect duplicate accounts, and even verify whether a customer meets age restrictions for specific products. Furthermore, automated verification can also reduce reliance on manual checks, which often lead to human mistakes and slower processing times. iDenfy’s case study shows companies that used its automated identity verification solutions and are now able to reduce fraud-related losses as well as deliver up to 3 times more charter requests. Front-end ID verification It’s worth mentioning the global e-commerce data statistics. Fraud losses already last year reached $48 billion and are projected to hit $107 billion by 2029. This information shows how quickly financial risks can rise in the digital space. In addition, last year, a multi-agency federal task force ordered over 2.1 million unauthorised vaping products that were simply distributed across seven states by merchants whose online checkout systems lacked mandatory front-end ID verification. It was classified as a systemic risk to public safety because many platforms still use simple age checks that can be easily bypassed, showing that there is still a gap in how e-commerce companies evaluate whether a customer is legally allowed to make these purchases or not.
Kocho, a UK-based provider of identity, cybersecurity and cloud transformation and managed services, has announced the appointment of Steven Jones as Chief Technology Officer, reinforcing the company's identity-led growth strategy as it enters its next phase of development. Role and responsibility Steven joins Kocho's executive leadership team at a pivotal moment, as identity continues to play an increasingly foundational role in how organisations approach security, resilience, and confidence in their digital environments. As CTO, Steven will be responsible for shaping Kocho's technology strategy, providing architectural oversight and driving the continued evolution of its services and propositions. He will play a vital role in ensuring the company's capabilities remain closely aligned to the Microsoft identity and security roadmap, as well as the real-world challenges faced by customers. Deepening identity leadership Identity has been a core focus for Kocho since its inception. As an original identity-first Microsoft partner, the business has grown alongside Microsoft's identity platform and security roadmap. Steven's appointment reflects the increasing importance of dedicated technical leadership as identity continues to evolve across workforce, customer and increasingly non-human environments, including service accounts, workloads and emerging agentic systems. As Kocho moves into FY27, the company is placing greater emphasis on helping organisations progress beyond point solutions and towards sustained identity maturity - supporting customers with structured approaches to governance, visibility, and risk reduction across increasingly complex identity estates. Steven will also play a significant role in guiding the evolution of Kocho's propositions, including innovations such as the Alira Access Portal, ensuring market-leading capabilities are delivered in a consistent and repeatable way. About Steven Jones Steven brings more than a decade of experience working in identity and security. He joins Kocho having spent the past 10 years at Amido, latterly part of Ensono, where he progressed from consultant to Vice President of Digital Consulting - a role he held for two years prior to joining Kocho. In that capacity, he led practices spanning identity, application development and data and AI, serving a blue-chip and enterprise client base across insurance, retail, manufacturing, and financial services. Earlier in his career, Steven worked in product and software development roles, primarily within supply chain and retail. His experience has also seen Steven act as technical lead on large-scale workforce and customer identity platform implementations, with experience spanning joiner, mover and leaver processes, identity governance and administration, and secure authentication platforms. He has delivered identity programmes across a range of sectors, including media, retail, government, and critical national infrastructure. Evolving services and support to the clients Hannah Birch, CEO at Kocho, said: "Steven brings a rare combination of deep identity expertise and practical delivery leadership. As Identity continues to shape how organisations think about security and resilience, his experience will be central to how we evolve our services and support our clients." Building lasting identity maturity Steven Jones, CTO at Kocho, said: "Identity has never been more central to how organisations protect themselves and enable their people. I'm joining Kocho at a moment when that conversation is really accelerating, and I'm looking forward to working with the team to help our customers build lasting identity maturity - not just implementing solutions, but ensuring those foundations are robust, scalable and genuinely fit for the threats they face. Kocho's heritage in this space and its relationship with Microsoft make it the perfect platform to do just that."
Access control applications
In today’s hospitality environment, properties are expected to deliver exceptional guest experiences and airtight operational security. But juggling physical safety, digital privacy, vendor coordination, and staff accountability isn’t easy – especially when legacy systems like pegboards, logbooks, or unmanaged key drawers are still in use. Intelligent key control systems help users modernise their security while unlocking operational insights for better business decisions. Here are eight ways users can improve security and business intelligence at their facilities using key control: 4 hospitality security enhancements Enforce Access Control: A networked key control system secures high-risk areas like storage, housekeeping, and back-of-house offices with real-time visibility and alerts. Reduce Risk of Internal Theft or Misuse: Automated key storage with audit trails deters misuse and helps quickly identify issues, lowering theft and liability exposure. Improve Accountability and Guest Protection: Detailed tracking holds staff accountable, highlights unusual behaviour, and strengthens guest and personnel safety. Reduce Rekey Expenses: A networked key control system prevents lost keys and lets you trace usage instantly, reducing costly rekeying. 4 business intelligence boosters Spot Trends with Key Usage Reports: Automated reports show which areas and tools are used most often, helping users plan staffing, prepare supplies, and detect anomalies. Streamline Vendor and Contractor Access: Grant time-limited, role-based permissions to contractors and deliveries, reducing the need for staff supervision and easing the front desk workload. Maximise Asset Utilisation: Keys unlock more than rooms. They also access golf carts, radios, minibars, tools, and more. Tracking usage helps manage inventory, reduce loss, and improve availability. Update Access Instantly: With centralised software, users can revoke or adjust permissions across the property in seconds – safer and faster than manual updates.
Securitas discovered a highly complex fraudulent cryptocurrency network, orchestrated by several organised crime groups posing as a legitimate financial services entity. The challenge The criminal organisation exploited the client’s branding, contact information and billing details to deceive the public, including their client’s genuine customers. Their scheme involved gathering sensitive personal and financial data, which could be misused for identity theft or unauthorised access to customer accounts, potentially endangering their funds and savings. If customers fell prey to these scams, it could lead to legal liabilities for their client and financial losses for those affected. Furthermore, negative publicity surrounding such incidents could damage their brand reputation and deter potential customers from using their services. Moreover, the sophisticated tactics used by the criminals, such as employing false contact details and shell companies, make it difficult for authorities to track and apprehend them, prolonging the threat and increasing the likelihood of further fraudulent activity targeting both their client and their customers. Failing to address this effectively could lead to financial losses, reputational harm and legal issues for them. Prompt action is crucial to mitigate risks and protect their organisation and customers. The solution Securitas surveilled the fraudulent network and conducted a timely investigation into its activities and the individuals responsible. This involved gathering evidence from various sources including fraudulent websites, communication platforms, financial records and false identities associated with operations worldwide. Upon compiling a comprehensive intelligence report on the fraudulent cryptocurrency network, and delivered key findings to their client and provided ongoing assistance during further investigations with relevant parties. The result Securitas offered their client a comprehensive intelligence assessment of the situation, consolidating detailed insights and analysis into a single actionable product. This empowered their Cyber, Fraud and Legal teams to swiftly take action and mitigate risks to their businesses. The investigation facilitated prompt responses from the relevant authorities, ensuring a coordinated effort to address the issue effectively. Moreover, they provided ongoing support for the investigations, offering industry expert resources to ultimately disrupt and dismantle the criminal operation.
Securitas client, a major player in the global Financial Services industry, faced challenges such as incidents impacting staff and resources and threats disrupting business operations. The challenge The client, a major player in the global Financial Services industry, faced challenges such as incidents impacting staff and resources and threats disrupting business operations. These included cyberattacks on financial data, compliance issues and geopolitical instability affecting worldwide operations. Despite these risks, they lacked a full understanding and found it tough to coordinate with local teams effectively. Their current incident reporting system fell short, lacking detailed analysis and practical insights for decision-makers. Given these risks, it was crucial for them to enhance risk management, improve global team collaboration and implement strong incident reporting. Failing to address these could jeopardize their competitiveness, financial stability and long-term success in Financial Services. The solution Securitas tailored a custom intelligence service, combining the expertise of dedicated analysts and technology to provide: Real-Time Monitoring: Securitas defined their client Critical Intelligence Requirements (CIRs) setting up live monitoring and 24/7 Alerting to incidents in close proximity to their chosen locations. This ensured the safety of their client’s global assets and colleagues. Crisis Support and Early Warnings: Invaluable assistance was provided during crises and incidents, along with early alerts about potential threats directly targeting their client, like protests. Regular Intelligence Updates: They stayed informed with daily, weekly and monthly intelligence summaries. These kept them abreast of the threat landscape and actionable insights, enabling them to gain decision making advantage within their security operations. Executive Protection Screening: Securitas ensured the safety of executives and colleagues facing targeted threats with the enhanced defensive screening solutions. Securitas were there to support their well-being & advise on how to improve the security of their online profiles to help keep them safe. Dedicated Request For Intelligence (RFI) Service: When they needed information on specific threats, Securitas’ dedicated specialists were there to assist promptly and effectively. The result Securitas customized solution empowered their client's intelligence-driven security approach, giving decision-makers from their client a competitive edge and the confidence to make critical business decisions while optimizing their security and resilience investments. By providing comprehensive situational awareness, Securitas not only offered peace of mind but also enhanced value, allowing them to protect their people, properties and assets worldwide. Through monitoring of new and emerging threats to the organization, Securitas helped them mitigate the potential costs of disruption, including protests targeting high-profile events, property damage plans and threats against personnel. With intelligence at the forefront of their security strategy, their client could focus on what mattered most: understanding pertinent intelligence and taking decisive action. This enabled their broader business to carry out global operations and achieve strategic goals efficiently and effectively.
A valued Securitas client expressed concern about threatening and abusive behaviour targeting their organisation and staff members. They turned to Securitas for assistance in investigating and addressing the threat. The challenge A valued Securitas client expressed concern about threatening and abusive behaviour targeting their organisation and staff members. They recognised the significant potential risks involved: without prompt intervention, this behavior could escalate, endangering employees, customers and assets, causing physical harm, property damage and business disruptions. As they approached a peak business period, any security breach could lead to financial losses, reputational damage and missed opportunities. Moreover, the psychological impact on employees facing such threats could harm morale, productivity and company culture. Urgent action and effective security measures were essential to mitigate these risks. They turned to the us for assistance in investigating and addressing the threat. The solution To address the challenge, Securitas implemented a multifaceted approach: POI Investigation: Securitas conducted a thorough investigation into the intent, capability and opportunities of the individuals involved. Defensive Screening: Securitas analysed the digital footprint and vulnerabilities of the company executives to fortify defenses against potential threats & provided one to one feedback to those individuals on how to remain safe both online and in public. Threat Assessment: Securitas also performed a comprehensive assessment of the threat landscape, providing actionable recommendations to mitigate risks. Ongoing Monitoring: Continuous monitoring was established to stay vigilant against evolving threats. Intelligence-led Executive Protection: Intelligence-driven strategies were applied to provide their client specialised protection for their Executives, tailored to their unique needs and circumstances. The result By leveraging cutting-edge intelligence capabilities, Securitas were able to assess the threat landscape of the individual executives within the organisation. Delivering feedback and training the team not only provided them assurance and peace of mind but also assurance to their family members. Securitas ensured they were safe when travelling proactively identified and mitigated potential threats, thereby safeguarding the Executive's interests and preserving operational continuity during a pivotal business period. This comprehensive strategy not only mitigated immediate threats and associated risks but also established a robust framework for ongoing security resilience. In essence, the successful implementation of their solution epitomises the transformative impact of intelligence-led security, fostering a culture of proactive risk management and instilling a sense of confidence in the organisation's ability to navigate challenges effectively.