Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneer in professional security and public safety solutions, now shared its predictions for the security industry in 2026. The year ahead will continue to be defined by rapid advances in AI performance at the edge, growing demand for continuous education across the channel, and a persistent focus on cybersecurity as the basis for every security workflow. While AI, cloud, and cybersecurity remain central themes, 2025 marked the point where these technologies increasingly shifted from conceptual discussions to practical deployments. End users now expect tangible improvements that simplify daily work, cut unnecessary costs, and help them make decisions faster. Manufacturers, integrators, and end users “AI is no longer a theoretical discussion between manufacturers, integrators, and end users. While many AI-powered cameras have been sold, in 2025, we saw meaningful gains in accuracy and usability as more users explored the capabilities of what the technology could achieve for their unique requirements." "The next phase is about ensuring the technology is deployed responsibly, efficiently, and with the right training behind it,” said Gerard Figols, Chief Operating Officer at i-PRO. Generative AI arrives at the edge A key prediction for 2026 is the emergence of generative AI running directly on the edge. Improvements in processing hardware now allow models to learn and refine themselves directly on-device instead of relying solely on server or cloud infrastructure. This model significantly reduces bandwidth demands and avoids the steep cost associated with cloud-only analysis, which can reach hundreds of dollars per camera per month when done at scale. Real-time analysis and self-learning By keeping real-time analysis and self-learning at the edge while using the cloud only where it adds value, organisations can improve performance without overspending. This shift also aligns with how operators now use video systems. The traditional timeline-centric, reactive approach to forensic analysis is fading. Alerts, automated detection, and metadata-driven search using natural language are becoming the primary tools for proactive analysis. Raw video becomes a reference point rather than the cornerstone of every inquiry, while metadata increasingly becomes the operational source of truth. Education becomes a core industry requirement The pace of change in AI, IT convergence, and cybersecurity is exceeding the industry’s available expertise and capacity. 2026 will be the year integrators treat education as a strategic investment, not an optional extra. “Anyone can mount an AI camera. That does not mean it will perform. The market needs deeper understanding and repeatable best practices. Education is how we improve outcomes and build long-term trust,” said Figols. New recurring revenue opportunities for integrators With AI models evolving continuously and cybersecurity requiring continued vigilance, integrators will see new service-based revenue opportunities. i-PRO expects recurring maintenance contracts to become a major revenue growth driver, covering tasks such as ongoing system updates, security hardening, and AI-algorithm refinement and evolution. “Technology does not stand still. Integrators who support continuous updates and lifecycle management will strengthen their customer relationships and generate new value,” said Figols. Cybersecurity remains the industry’s most urgent priority i-PRO believes that cybersecurity will remain one of the physical security industry’s most pressing challenges in 2026. Cybersecurity underpins every part of the physical security ecosystems. It is the baseline requirement that allows organisations to adopt new technologies, from AI to cloud-based services, with confidence. This focus aligns with i-PRO’s commitment to ethical, transparent AI governance and its achievement of the ISO/IEC 42001 certification, the first global standard for AI management systems. “Cybersecurity underpins the entire technology stack. Trust and data integrity are the prerequisites for deploying AI and cloud capabilities with confidence and piece of mind,” said Figols. 2025 review and outlook The industry saw strong global growth in 2025 with i-PRO maintaining double-digit performance across all markets. The pace of innovation also remained high, and the company expects 2026 to build on this momentum with practical AI deployments, greater interest in open platforms, and expanded use of edge-driven intelligence. “The installations that succeed in 2026 will be open, collaborative, cybersecure, and supported by the right training. The industry is evolving quickly, and staying current will be essential,” concluded Figols.
Matrix Comsec, a pioneer in Security and Telecommunication solutions, was honoured with the CII Industrial Innovation Award 2025, recognising Matrix as one of the Top 50 Most Innovative Companies in India. The award was presented at the CII Industrial Innovation Awards ceremony held in New Delhi on 16th December 2025. Instituted by CII in 2014, the CII Industrial Innovation Awards celebrate visionary enterprises across various industry segments. These prestigious awards aim to recognise and honour the brightest innovators in the Indian industry, showcasing organisations that lead through innovation and excellence. Innovation management practices The selection process for the top awards and the list of the most innovative companies involved a rigorous evaluation, including detailed presentations and interactions with a Grand Jury. This unbiased assessment evaluated multiple aspects, such as the organization's innovation culture, innovation management practices, inputs to innovation, and the tangible results achieved through innovation. Matrix's innovation and design capabilities Sharing his perspective on this recognition, Ganesh Jivani, CEO, Managing Director, Matrix, said, “It is indeed an honour to win this prestigious award, and I extend my gratitude to CII for this recognition. Innovation really has been the DNA of Matrix right from its inception." "I thank our technology and product management teams for their dedication to building innovative and world-class quality solutions. Matrix offers cutting-edge physical Security and Telecom solutions in more than 50 countries, including many first-world technologically advanced nations." "With 250+ R&D engineers and world-class processes and infrastructure, Matrix is committed to innovating and designing cutting-edge, high-performance products. This accreditation is a validation of Matrix's innovation and design capabilities and will go a long way in motivating us towards building world-class solutions.”
AMAG Technology™ is excited to announce that it has achieved the most rigorous National Protective Security Authority (NPSA) accreditation for its Symmetry Enterprise Access Control software, including the M2150 OSDP panels and cabinets. With more than 50 years of developing security solutions in the UK, AMAG’s achievement of full NPSA accreditation is a natural progression. Moving beyond AACS assurance to the complete NPSA framework, including Cyber Assurance of Physical Security Systems (CAPSS) and AACS, these certifications validate that Symmetry Enterprise with the M2150 OSDP meets the UK government’s most advanced requirements for cyber resilience, physical protection, and operational assurance. M2150 OSDP panels and cabinets NPSA accreditation assures critical infrastructure customers that they are choosing a company and solution aligned with the UK’s most stringent security requirements. AMAG recognises these demands and is proud to have earned NPSA accreditation quickly. AMAG is committed to delivering a sustainable solution, and the accreditation will come standard with Symmetry Enterprise Access Control with M2150 OSDP panels and cabinets. The organisation looks forward to partnering with its industry integrators and partners to bring the solution to the market. AMAG’s commitment “Earning NPSA accreditation demonstrates AMAG’s commitment to delivering trusted, future-ready security solutions that meet advanced national standards,” said AMAG Technology Vice President, Technical Services, Ryan Howarth. “Our customers, particularly those in critical infrastructure, government, and enterprise sectors, can operate with confidence knowing that cyber assurance and physical protection are built into the DNA of every Symmetry Enterprise system we deliver.” External and internal access points The NPSA’s CAPSS standard ensures that cyber defense is deeply integrated into every stage of product development and build processes, safeguarding against evolving digital threats. The most stringent level of AACS goes beyond basic perimeter protection, providing advanced assurance that both external and internal access points are secure against insider threats and sophisticated attacks. Highest security benchmarks “For our customers across EMEA and APAC, this accreditation means fewer barriers to deployment and assurance that their Symmetry Enterprise system meets the highest security benchmarks,” said AMAG Technology Director of Sales EMEA & APAC, James Clark. “It’s another example of how AMAG continues to lead by combining innovation with accountability. This is who we are and what we do.” AMAG Technology will offer an NPSA training program for qualified customers.
In recent years, the development and adoption of AI technology has accelerated at an unprecedented pace, impacting various industries. Of course, the spark of innovation provided by AI is already a feature of the video surveillance sector. However, Hanwha Vision predicts that 2026 will be a pivotal turning point for AI. They foresee AI moving beyond simple adoption to becoming the essential foundation of the entire industry - the emergence of so-called ‘Autonomous AI Agents’ will reshape the structure and operations of video surveillance systems. To meet this wave of change, Hanwha Vision has identified five key trends that the industry must focus on. These trends signal a future where AI serves as the core engine, elevating video surveillance further from monitoring to providing central pillars of operational efficiency and sustainability. Trustworthy AI: Data quality and responsible use As AI analysis becomes ubiquitous, the principle of “Garbage In, Garbage Out” will be critical in video surveillance. Visual noise and distortion caused by challenging environments - such as low light, backlighting, or fog - are primary causes of AI-derived false alarms. In 2026, establishing a ‘Trusted Data Environment’ to solve these issues will become the industry’s top priority. With the performance of AI analysis engines levelling up across the board, the focus of investment is shifting toward securing high-quality video data that AI can interpret without error. AI-based high-performance ISP An example of this is minimising noise and distortion in extreme environments through AI-based high-performance ISP (Image Signal Processing) technology and the use of larger sensors. AI-based ISP employs deep learning to differentiate between objects and noise, effectively eliminating noise while optimising object details to provide real-time data most conducive to AI analysis. Larger image sensors capture more light, which fundamentally suppresses video noise generation, starting from low-light conditions. In parallel, as the ethical use of AI becomes a major concern, the mandatory adoption of AI governance systems is approaching. The EU’s AI uses a risk-based classification of AI systems deployed in public spaces and imposes a legal obligation on manufacturers to ensure transparency in AI from the design phase, and this can only accelerate the industry’s push to build genuinely trustworthy AI. The AI agent partnership-from tool to teammate As AI evolves from straightforward detection to an agent capable of analysing complex scenes and proposing initial responses, the role of the operator will change fundamentally. Humans will delegate repetitive surveillance tasks to AI Agents, freeing themselves for more critical, high-level activity. While previous AI systems in video surveillance merely reduced the operator’s workload by automating repetitive tasks like object search, tracking and alarm generation, the AI Agent will be able to take this a step further. It will autonomously conduct complex situational analysis, automatically execute an initial response, and recommend the most effective follow-up actions to the monitoring operator. Role of AI governance manager For example, an AI Agent can independently assess an intrusion, initiate preliminary steps such as sounding an alarm, and then propose the final decision options (for example, whether to call the police) to the operator. Simultaneously, it can automatically generate a comprehensive report detailing real-time video of the intrusion area, access records, a log of the AI’s initial actions, and suggested optimal response strategies. Operators will become more like Commanders, making final decisions that require nuanced judgement, complex analysis and consideration of legal and contextual implications. They will also take on the role of AI governance manager, transparently tracking and supervising all autonomous actions and reasoning processes executed by the AI Agent. This essential function, which prevents system misuse, demands a significant elevation of the monitoring operator’s skill set. Driving sustainable security The explosive growth of generative AI is driving demand for energy. According to the International Energy Agency (IEA), power consumption by data centres will more than double by 2030 under its base case scenario - due to demand for AI. The video surveillance industry can no longer prioritise performance without limit, as it faces the dual challenge of surging high-resolution video data and the computational burden of AI at the edge. As such, ‘sustainable security’, which prioritises operational longevity and minimising environmental impact, is set to become a core competency for achieving TCO (Total Cost of Ownership) reductions and meeting ESG goals. To realise sustainable security, the industry is moving towards developing low-power AI chipsets that drastically reduce power consumption - while preserving high-quality imaging and AI processing power. It is also prioritising technologies that ensure data efficiency directly on the edge device (camera). Smart spaces powered by video intelligence As AI is integrated into cameras and advances are made in cloud technology for large-scale data processing, the concept of a ‘Sentient Space’ - a space that can sense and understand - is becoming a reality. This sees video surveillance expanding beyond simple monitoring to become a core data source for ‘Digital Twin’ technology, which reflects the physical environment in real-time. A Digital Twin is a virtual replica of a real-world physical asset, created in a computer-based virtual environment. Currently, the AI information (metadata) extracted by AI cameras is already used as business intelligence to optimise operations in sectors such as smart cities, retail and advanced manufacturing. Moving forward, this metadata will be fused with diverse information from access control devices, IoT sensors and environmental sensors to complete a unified, intelligent Digital Twin environment. Digital Twin environment This Digital Twin environment will revolutionise the monitoring experience. Instead of complex, fragmented screens, operators will gain a holistic view of event relationships on a map-based interface that integrates the VMS (Video Management System) and access control systems. Within this perfectly mirrored digital space, the video system will eventually evolve into an Autonomous Intelligent Space that deeply understands situations and manages and resolves issues independently. Adding the latest AI technology could provide security managers or operators with greater control over system operations. For example, AI can instantly comprehend natural language questions like, “Find a person who entered the server room after 10 PM last night,” and automatically analyse access and video records to report the results. This signifies true situational awareness that can move far beyond basic complex search parameters. Hybrid architecture: The distributed power The rising cost of transmitting high-definition video data, coupled with data sovereignty and regulatory concerns, poses challenges for purely cloud-based systems. As such, ‘Hybrid Architecture’, which preserves the benefits of the cloud while mitigating operational strain, is rapidly establishing itself as the optimal solution for the video surveillance sector. Hybrid architecture grants users ultimate control and flexibility over system operations. Because it allows system functions to be deployed to the most efficient location based on an organisation’s business needs, budget, and legal/regulatory environment, it will become a key strategy for maximising TCO. Real-time monitoring functions and critical functions From a video surveillance standpoint, hybrid architecture maximises efficiency by flexibly distributing functions between the on-premises and cloud environments. On-premise environments can host real-time monitoring functions and critical functions that must comply with regulations for short-term video storage and retention. Functions involving the local processing and control of highly sensitive data are also placed on-premise to bolster data security control and ensure immediate response capabilities at the site. Meanwhile, the cloud environment is leveraged for functions such as remote centralised management, large-scale data analysis, deep learning for AI models, and long-term archiving. Using the cloud this way ensures system scalability and operational ease. Beyond simple infrastructure separation, this architecture also supports the optimal distributed computing structure necessary for the successful operation of AI-analysis-based video surveillance systems. New standard for security infrastructure In this structure, edge (camera/NVR) devices handle the first layer of computation, performing real-time detection and only transmitting necessary data to the cloud. This reduces network bandwidth strain, maximises speed and storage efficiency. Following this, the cloud (central server) environment conducts the second layer of deep analysis and large-scale machine learning based on the filtered data from the edge, significantly enhancing the accuracy and sophistication of AI functions. In 2026, I believe AI will be firmly established as a new standard for security infrastructure. To meet this, Hanwha Vision will deliver trustworthy data and sustainable security value to users by providing solutions based on a hybrid architecture optimised for AI analysis and processing. It looks set to be an exciting year!
Access control applications
ANSecurity, a pioneering specialist in network security and wireless solutions, has successfully delivered one of the UK education sector’s first campus-wide Wi-Fi 7 deployments at Sir William Perkins’s School, providing the Surrey-based independent school with a secure, high-capacity wireless infrastructure designed to support its growing digital learning ambitions. Serving around 580 students and 142 staff, Sir William Perkins’s School has fully embedded 1:1 iPad usage into daily teaching. However, the school’s legacy wireless network struggled to cope with the rising density of devices, particularly when large groups connected simultaneously through Apple Classroom. Technical requirements Ensuring secure authentication, safeguarding compliance, and consistent performance across hundreds of devices became increasingly challenging – and other vendors were unable to meet the school’s strict technical requirements. “We spoke to multiple providers, but none were able to implement the solution we envisioned. ANSecurity not only made it possible – they tested it, validated it, and delivered it flawlessly,” said the school’s IT Manager. A structured, consultative approach Introduced by RUCKUS Networks, ANSecurity began by validating the school’s design requirements and conducting extensive lab testing to confirm compatibility with Jamf School’s certificate-based authentication and the school’s existing network architecture. A collaborative deployment plan followed, with a tight three-month schedule carefully aligned to the school holidays to avoid disruption. ANSecurity then deployed RUCKUS Wi-Fi 7 access points and configured Cloudpath to seamlessly issue certificates to nearly 550 school-managed iPads – a capability other vendors could not match. Wi-Fi 7 provides dramatically higher throughput, lower latency, and improved efficiency thanks to technologies such as wider channels and multi-link operation, enabling fast, reliable connectivity even in dense device environments like classrooms. ANSecurity integrated RADIUS and API-driven workflows To support safeguarding and compliance, ANSecurity integrated RADIUS and API-driven workflows to ensure accurate user-to-IP mapping across both the Palo Alto Networks next-generation firewall and the ContentKeeper filtering service. Additional networks were created for BYOD and guest access, with Opportunistic Wireless Encryption (OWE) used to protect traffic on open networks. ANSecurity also assisted in restructuring parts of the network, implementing new VLANs and applying updated firewall policies to ensure the right users and devices could securely access the right resources. Following deployment, a detailed wireless site survey was carried out to confirm optimal signal strength, signal-to-noise ratio, and throughput across both indoor and key outdoor areas of the campus. “The difference in consultative support compared to other vendors was night and day,” said the IT Manager. A high-performance, future-ready outcome The school now benefits from fast, stable, and secure Wi-Fi coverage across the entire campus. The new network reliably supports nearly 800 devices, with the majority operating seamlessly on 5 GHz, and is fully prepared for future upgrades, including WPA3 and 6 GHz Wi-Fi once supported by Jamf School. Integration with existing security solutions ensures all safeguarding, logging, and compliance requirements are met. Improvements to switching, segmentation, and overall network architecture have further enhanced performance and manageability. Cyber Essentials Plus certification Delivered within the agreed three-month window, the project positions Sir William Perkins’s School at the forefront of digital education. Wi-Fi 7 provides the performance headroom needed to support emerging educational technologies – from AR/VR learning to high-bandwidth cloud applications – ensuring the school remains ahead of future digital demands. With upcoming initiatives including Cyber Essentials Plus certification, expanded security controls, and wired network access control, the relationship between the school and ANSecurity continues to deepen, built on trust, technical expertise, and a shared commitment to innovation.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced now that Ki Charter has expanded its contract following initial success. ZeroEyes’ proactive gun detection and intelligent situational awareness solution will now be deployed across the school’s San Marcos campus. Largest residential treatment centre Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school serves over 6,500 students annually (500% mobility rate) with a dedicated team of educators and staff. The San Marcos campus is located within the 65-acre San Marcos Treatment Centre, the largest residential treatment centre in Texas. The centre houses approximately 200 residents (and community students) who attend Ki Charter, and employs 425 staff members, including 50 from Ki and 375 from the San Marcos Treatment Centre. Level of real-time awareness “At Ki Charter, we serve a unique population of behaviourally challenged students, so our approach to security has to be comprehensive, proactive, and intentional,” said Dr. Jerry Lager, Superintendent of Ki Charter. “Our Safety and Security Committee, campus teams, mental health staff, and local law enforcement all play a role in preventing and de-escalating potential threats, but ZeroEyes added a level of real-time awareness we simply didn’t have before. After seeing how effective the technology was, expanding its use was an easy decision.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Multi-layered safety program “Ki Charter has built a thoughtful, multi-layered safety program, and we’re proud to continue to play a role in strengthening it,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “Their leadership is deeply committed to protecting students and staff, and this expansion proves that they understand that proactive security is essential on a campus of this size and complexity.”
Acoem, a pioneer in advanced physical security solutions, announced that a large North American utility is utilising its ATD Gunshot Detection system to protect critical infrastructure at multiple sites across the country. Over the past few years, utilities across the United States have faced a troubling trend: gunfire directed at electrical substations and other energy assets. Whether the intent is vandalism, sabotage, or reckless target practice, the results are the same. A single rifle round can destroy a million-dollar transformer that could take months to replace. This happens when the cooling fluid drains from the transformer. Once the fluid is lost, the unit quickly overheats and frequently ignites. Physical attacks on critical infrastructure A recent DHS Homeland Threat Assessment concurs, stating, “We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals…” One of the largest electric power and natural gas utilities in North America recognised this risk after a number of gunshot attacks on substations disrupted power to tens of thousands of customers. In one case, power was not restored for days, and a person dependent on life support equipment tragically lost their life. The challenge Before implementing a new solution, the utility needed to reassess how its security technologies worked together. Traditional security cameras were excellent for documenting clearly visible problems, but they could not reliably detect something as small as a bullet hole in a damaged transformer, leaving a critical awareness gap. The company’s challenge was not only detecting a gunshot but doing it fast enough to act before cascading failures occurred. Threats outside the perimeter In many cases, gunfire at substations originates from hundreds of feet outside the fence line. The sound of the muzzle blast may never reach the site, leaving only the supersonic ballistic wave as evidence of incoming rounds. A system limited to triangulating muzzle blasts within a perimeter would miss these long-range threats entirely. Integration with security cameras and VMS Facing these unique requirements, the utility sought a technology that could provide instant notification with video and audio verification. This capability was essential to confirm whether an event was malicious or accidental. Integration with the utilities existing video management system (VMS) was a requirement, while direct control of a pan-tilt-zoom (PTZ) camera would allow operators to focus immediately on the source of the gunfire and determine if an actual threat existed. "We needed immediate, accurate alerts to prevent catastrophic damage,” said the utility’s physical security program manager. “Whether a threat is close-range or from a high-powered rifle fired from hundreds of feet away, we needed a modern, self-contained, highly accurate system to provide a full picture.” The requirement of a closed, secure network Cybersecurity was another defining requirement for this utility. The company prohibits internet connectivity within its operational network, a strict “air-gapped” policy that rules out any cloud-based system. For these secure environments, any new security technology must operate entirely on-premises, integrating directly with existing video and access control platforms. Finding the correct solution To address the complex nature of the threats and meet these stringent demands, the utility required a specialised solution that avoided a full infrastructure overhaul. After extensive testing, the utility selected Acoem’s ATD (Acoustic Threat Detection) system. The company has now deployed numerous detection systems across multiple states and regions, with new installations continuing every week as part of an ongoing modernisation plan. A principal reason behind choosing the Acoem ATD system was based on how the system works compared to legacy solutions. Instead of sending audio data from multiple sensors to a remote server, the Acoem sensor processes detection right on the device. When a gunshot occurs, it detects both the muzzle blast and the ballistic wave, confirming the event and calculating its location instantly. Cybersecurity requirements of restricted internet access Processing analytics on the edge is instant and gives operators the time they need to respond. That might mean rerouting power, isolating a substation, or taking a transformer offline before it fails. Having that situational awareness can make the difference between a quick repair and an extended regional outage. Acoem developed an on-premises version of its Cadence software specifically to meet the utility’s cybersecurity requirements of restricted internet access. The platform displays live maps, sensor health, and provides audio verification clips that allow operators to hear what the sensor heard while viewing the shooter’s position overlaid on the map. Cadence integrates directly with the utility’s Avigilon video management system. “Running software on-premises was non-negotiable,” said the utility’s program manager. “We needed the benefits of automation and analytics without exposing operational systems to the internet.” Situational awareness with eyes on target Detection is only half the story. Integration with a PTZ camera on site provides immediate visual confirmation. When a gunshot is detected, the sensor automatically commands the camera to pivot to the coordinates of the source. Operators can see what happened as it happens, even if the shooter is several hundred yards outside the fence line. In some locations, thermal or infrared cameras may complement the acoustic sensors to detect movement in tree lines or along rights-of-way. This pairing of acoustic and visual intelligence transforms response operations, allowing the utility security team to verify alarms in real time and coordinate with law enforcement or maintenance crews as needed. Hunters or vandals? In one recent example, the utility’s Acoem ATD system detected gunfire at a remote substation. Through the linked PTZ camera, operators quickly confirmed that the shots came from hunters outside the perimeter and that there was no threat to equipment or personnel. The team was able to assess the situation instantly without dispatching crews or contacting law enforcement. Scalability and integration flexibility The utility required open standards and interoperability. They did not want a proprietary system that locked them into a specific platform. The Acoem ATD system met that demand, integrating through APIs with their existing Avigilon infrastructure. Whether a site runs on VMSs such as Avigilon, Milestone, or Genetec, the ATD sensors connect seamlessly within the same ecosystem. Just as important, the solution had to scale. The utility began with a few high-risk sites and has expanded steadily without redesigning its network. This “start small, grow fast” approach aligns with how the organisation evaluates, validates, and then standardises new technologies. CIP-014 compliance and beyond The North American Electric Reliability Corporation’s CIP-014 standard mandates physical security measures for critical transmission substations, including threat detection. The utility wanted to go further. It set a new benchmark for awareness, resilience, and uptime. Acoustic threat detection is now a key component of its operational strategy, providing actionable intelligence that prevents damage rather than documenting it after the fact. A smarter path forward Protecting critical infrastructure today means recognising that not every threat is digital. A single bullet can cause as much disruption as a cyberattack. The key is giving operators the real-time data they need to act quickly and decisively. By combining edge-based AI, on-premises software, and open integration with existing security systems, Acoem’s ATD system has given the utility company the situational awareness it needed to protect its assets and its customers. The system keeps vital equipment online, strengthens compliance, and helps safeguard the communities that rely on uninterrupted service. “Securing the grid now demands both digital and physical vigilance,” said the utility’s program manager. “Gunshot detection has become a critical layer of defense for the infrastructure that powers our daily lives.”
Having an emergency response plan is essential for businesses of all sizes, across every industry. But in energy facilities, particularly those dealing with hazardous or explosive materials, it becomes a crucial, and often strictly regulated life safety requirement. In an emergency, not only is it critical to identify where all employees are located, but also that any visitors, contractors, or vendor partners are all accounted for and safely evacuated. When an alarm sounds, duty of care requirements and regulatory requirements dictate that companies have protocols in place to effectively respond to an emergency and know precisely who is on-site and that everyone can exit as quickly and safely as possible. Equally important is making sure that everyone at the facility is aware of and follows emergency guidelines. Challenge According to data compiled in the 2021 Guide to the Business of Chemistry from the American Chemistry Council, “Facilities in Texas and Louisiana produce 80 percent of the nation’s primary petrochemical supply, and Texas chemical production tops the nation by far, with chemical shipments valued at $117.5 billion, representing a major portion of the region’s economy, but also the potential for significant security risks and challenges.” Some petrochemical plants use a traditional, paper-based mustering solution for emergency response scenarios. These manual methods of notifying, mustering, and accounting for personnel can result in costly, potentially dangerous inefficiencies during an emergency. Site access control and visitor management processes are also typically stand-alone and do not communicate with each other, which forces manual processes to log and reconcile individuals when mustering during an emergency response evacuation or a required emergency drill. To do this, chemical plant security staff typically prints the logs from on-site access control and visitor management systems, then crosses off the names of individuals from the lists when they are accounted for manually. Each list is reconciled on its own and by hand. This outdated process can take hours to complete and holds a potentially high risk of error. Solution Everon is working with various Houston area petrochemical plants to update their emergency notification systems with innovative, cost-effective solutions. According to these customers, Everon provides comprehensive solutions to fit their needs, and maintains a level of professionalism and dedication to service excellence that other companies too often fail to meet. One solution Everon has proposed to combat this problem across chemical plant facilities consists of three integrated technologies that include: Cloud-Based Access Control: An access control system that is cloud-based may be easier to implement and have a lower cost of entry. This system provides a log of all badged personnel on site to the mustering system for accounting of personnel during an emergency. Visitor Management System: This system allows visitors to pre-register and be managed electronically when they come to the plant while providing visibility in case of an emergency. Mustering Software and Card Readers: These provide seamless management of emergency events, including electronic mustering, unit accountability, and ERT readiness. Access control logs from the cloud-based system With this solution, access control logs from the cloud-based system and visitor management logs can automatically tell plant operations how many people are on-site through the mustering software. A number of portable mustering units were commissioned with card readers, which allow for quick and easy confirmation of badge reads from fixed muster locations. In addition, warning lights and speakers were also added at plant entrances to alert personnel to emergency events. The mustering system’s mustering software takes the information directly from the access control and visitor management logs and communicates directly with the plant operators. This allows them to manage the entire emergency using the software, starting with an accurate count of who is in the plant and then quickly and easily managing individuals as they safely exit. Emergency response events can be initiated with the click of a button and significantly improve the amount of time needed to accurately count the number of people evacuating the plant. Installations are consistently performed with personal safety in mind. Everon believes that no work is worth doing if it’s not done safely and in full compliance with governing regulations and standards. No recordable injuries or lost-time events were recorded during any of the projects completed by Everon at any Houston area petrochemical plants. Results According to one client, "Our previous method of pen and paper was very inefficient and antiquated. Everon's solution with our emergency response protocol gives us the cutting edge in technology. Not only does it allow us to become well-organised and systematic, but safer." Emergency response drills at each petrochemical plant are now completed in minutes, not hours, and emergency responders receive visual confirmation when everyone is confirmed as safe. The plants consider having digital reports of employees that are on- and off-site at the plant a major bonus, along with the ability to deploy mass notifications between the plant and local communities. Said another client, "We are extremely satisfied with our choice of Everon as our life safety partner and are currently working with them to update analog cameras in our plant, as well as advance our infrastructure to bring other innovative security, health and operational monitoring technology solutions to our facility."
Intersec Dubai 2026 news
Dubai World Trade Centre — Sheikh Saeed Hall 2, Stand C43, January 12–14, 2026. Organisations of every size and type have discovered how connected digital access helps them implement smart...