Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
Dormakaba has signed a binding agreement to acquire Avant-Garde Systems Inc., one of the largest independent solution providers for entrance systems control products in the US. This acquisition represents a core-in-the-core acquisition, strengthening Dormakaba’s North American go-to-market in access automation solutions. Consultation and product selection Founded in 2015 and based in Clarksville, Indiana, USA, Avant-Garde is a solution provider in the entrance systems control business, providing a “one-stop-shop” solution for their customers. Avant-Garde combines in-depth entrance control expertise with full-service capabilities, offering a full lifecycle from consultation and product selection to installation and support. Dormakaba’s core portfolio The entrance systems control offering belongs to Dormakaba’s core portfolio, where Avant-Garde adds key capabilities to target strategic growth verticals such as data centres, airports and nation-wide integrators. By expanding its direct solution approach, Dormakaba is strengthening its entrance systems control offering and unlocking further growth opportunities in North America. Entrance systems control capabilities Till Reuter, CEO Dormakaba, says: “We are delighted to welcome the Avant-Garde team into our Group. This acquisition is an important piece to advance our North American growth plan." "It will strengthen our entrance systems control capabilities, enhancing our high-margin business as well as positioning us for growth in our key verticals airports and data centres.” Financial terms of the transaction Dormakaba expects the transaction to be accretive to Group EPS from day 1. The parties have agreed not to disclose further details and the financial terms of the transaction. Dormakaba expects to close the acquisition of Avant-Garde Systems Inc. in early January 2026.
iDenfy, a global identity verification and fraud prevention company, announced the launch of its new fraud-triggered Shopify ID Verification app, designed to help e-commerce merchants to reduce chargebacks and risks linked to high-risk orders. The new Shopify app integrates directly with Shopify’s built-in fraud analysis system and automatically initiates identity verification for suspicious orders that are marked as “high-risk, enabling merchants to prevent fraud without disrupting legitimate customer purchasing journeys. Recent e-commerce trends According to recent e-commerce trends, digital identity fraud remains one of the fastest-growing threats in the industry. iDenfy’s CEO, Domantas Ciulde, has been in the fraud prevention sector for eight years now, observing the rise of new types of fraud, which are constantly evolving: “We use AI to automate our solutions and create industry-specific integrations that solve real issues, like our Shopify verification app. However, it’s vital to adapt and constantly improve each element; otherwise, fraudsters are going to bypass the system.” Rapid growth in global e-commerce Over the past decade, rapid growth in global e-commerce has been valued at more than $4 trillion dollars. In 2024 alone, losses from online payment fraud were estimated at $44 billion dollars worldwide. Suppliers of various goods continue to lose billions each year, particularly due to payment fraud and identity misuse, with chargeback fraud among the most common attack methods. Stolen credit card data, synthetic identities, and account takeovers are frequently used to place online orders that appear legitimate. AI and machine learning As e-commerce product purchase volumes rise, business owners face pressure to verify buyers effectively to be sure that they can sell their products to the right audience without any special financial loss. By leveraging AI and machine learning to assess risk variables, including address mismatches, wrong CVV codes, numerous card tries, and odd purchase behaviour, Shopify's fraud evaluation system plays a vital part in recognising suspicious transactions with risk classification, such as low, medium, or high, on orders to alert merchants about the potential fraud. New no-code Shopify identity verification It’s important to keep in mind that Shopify does not immediately prohibit or verify these transactions. The seller obtains the final note, which often results in manual assessments, delayed fulfilment, or hefty chargebacks. Ultimately, iDenfy’s new no-code Shopify identity verification app bridges this gap by turning risk signals into automated action. When an order is flagged as medium or high risk, the plugin redirects the buyer into a complete but quick identity verification process through iDenfy’s KYC flow. This eliminates manual follow-ups and reduces operational overhead, while allowing genuine customers to complete verification in less than one minute on average. Risk-based factors “Shopify already does an excellent job identifying risk, but identity verification is the missing layer. With our new Shopify plugin, we help merchants turn fraud signals into real protection, reducing chargebacks while preserving a smooth buying experience,” explained Domantas Ciulde, the CEO of iDenfy. The solution uses risk-based factors such as IP address of the country, identity documents, or special information that is required to fill in, giving merchants full control over when verification is triggered. Businesses can initiate KYC based on order risk level, pending risk status, specific products, collections, or even landing page activity. This flexibility allows e-commerce businesses to customise fraud prevention regulations and additionally support age verification, which is highly beneficial to firms that must comply with local regulations and sell age-restricted products. iDenfy's global identity verification infrastructure The new app has been built on iDenfy's global identity verification infrastructure, which includes more than 3000+ recognised identification documents in more than 200+ countries and territories. Passports, ID cards, driver's licences, and residency permits are all immediately recognised and validated by the system. Significantly lowering the danger of identity impersonation, biometric face recognition, and 99.9% accurate 3D liveness detection helps to verify if the buyer is physically present and matches the given document. “As e-commerce fraud becomes more sophisticated, merchants need smarter ways to verify who is really behind a transaction. iDenfy is here to make this process transparent,” added Domantas Ciulde, the CEO of iDenfy.
The S12 Security Guarding Leadership Group (S12) is delighted to welcome five new members to its core committee. The S12 brings together security pioneers to work as a collective with the Government, Security Industry Authority, and the Security Minister. Their mandate is to address and elevate critical industry issues, promote higher standards and professionalism, enhance public safety, and positively shape the perception of the security guarding sector. Latest round of nominations While the group was initially seeking two new members in its latest round of nominations, the strength and breadth of candidates led to four being invited to join. It is strengthened by the appointments of: Keith Middleton, Managing Director of Bidvest Noonan (UK) Ltd Steven Moore, Managing Director of OCS Kieran Mackie, Managing Director of Amulet Security Simon Alderson, CEO of First Response Group Ltd Representatives from five large companies It was stated that preference would be given to representatives from large and medium companies in this nomination round to help provide a more balanced committee. As nominations were received from two large and two medium firms, all four have been offered a place. These appointments provide complete balance to the S12, which will now be made up of representatives from five large companies, three medium, and five small businesses. New appointments are a major win for the S12 Paul Evans, Chair of the Security Guarding Leadership Group, said: “We thank all those who put themselves forward to give up their time and resources to help drive positive change in the security industry." “The appointments of Keith Middleton, Steven Moore, Kieran Mackie and Simon Alderson are all a major win for us, and between them they have a wide range of skills and experience that will be invaluable in helping the S12 achieve its goals. We welcome them all to the team and look forward to them getting stuck in – there’s a lot to do. These latest appointments also help balance out the committee in terms of the type and size of businesses represented." “Finally, we also warmly welcome Abbey Petkar of Magenta Security Services, who joins the committee following a resignation from the previous nomination round. Abbey was the next runner-up in the small business category in that initial voting round, and I equally look forward to benefiting from his years of experience and expertise in the Security Guarding industry.” Non-ACS representation The S12 has also confirmed plans to introduce two non-ACS board seats in the New Year. This will help ensure even broader inclusivity and representation as the group continues to engage with Government, the Home Office and the Security Industry Authority on critical issues such as Mandatory Business Licencing, Martyn’s Law, labour exploitation and raising professional standards across the sector. About the S12 The S12 meets regularly with the Security Minister, the Home Office and the SIA to drive the highest professional standards across the industry. The core committee lead a number of workstreams across a variety of areas including MR8, Labour Exploitation, Training Malpractice, SIA Business Approval Scheme, Martyn’s Law and Integrated Policing and Private Security. The committee is so far being supported by more than 400 people from across the industry who are helping to represent the interests of the industry with one united voice, while working to raise standards, shape policy and improve public safety.
Milestone Systems, a world pioneer in data-driven video technology, released an advanced vision language model (VLM) specialising in traffic understanding and powered by NVIDIA Cosmos Reason. The VLM powers two new products: a Video Summarisation tool for XProtect® Video Management Software and a VLM as a Service for third-party integrations. Video Summarisation for XProtect allows users to search summaries from visual data and automates reporting. Video Summarisation tool Video systems capture vast amounts of data, and reviewing footage remains time consuming and largely manual. With Milestone Systems’ new Video Summarisation tool – a generative AI-powered plug-in for the XProtect Smart Client – users and operators can now rely on a specialised product that automates operator workflows, saves valuable time, and reduces false alarm fatigue significantly. Early reports show video summarisation could reduce operator false alarm fatigue by up to 30 %. The Video Summarisation tool analyses camera footage and describes what's happening. Users simply send a snippet of video and a prompt describing their request, and the model will generate a text summary in seconds. Key capabilities Convert video segments into structured text summaries inside XProtect Smart Client Search summaries based on video content, rather than timestamps or manual tagging Bookmark and filter summaries to streamline review workflows Integrate seamlessly with existing XProtect event and rule logic to trigger automated summaries based on specific alarms or alerts Focus attention on valid events by filtering out irrelevant motion or noise Access customised, sovereign VLM’s per region, starting with the US and EU. More regions to follow. The Video Summarisation is free to download and takes only a few minutes to install directly in the XProtect Smart Client. And users only pay when prompting the VLM. VLM as a Service for developers: Add production-ready video intelligence With Milestone’s Hafnia VLM as a Service (VLMaaS), developers, integrators and partners get API access to production-ready video intelligence built on NVIDIA’s latest technology and fine-tuned on responsibly sourced data. The VLMaaS helps developers create AI-powered solutions quickly without needing to set up, fine-tune or manage their own AI systems – it enhances any existing solutions with generative AI, regardless of the level of analytics currently in place. This makes it fast and simple to add advanced video intelligence features to applications, whether it’s testing a minimum viable product (MVP) or scaling a platform. With VLMaaS, the development of AI and analytics can be accelerated significantly – up to 70 times less effort than doing the work to fine-tune a VLM model to do the same. Key capabilities Access high accuracy vision language model, fine-tune on traffic optimised data and built on NVIDIA Cosmos Reason Follow prompt-based instructions for traffic-related operations API-first delivery – simple integration via HTTPS Fine-tuned models for US and EU markets, with more regions to follow Designed to build standalone solutions or integrate with the Milestone product portfolio 100% responsibly sourced training data with auditable data lineage, GDPR- and EU AI Act-compliant, used for the fine-tuning of the model Pricing for the VLMaaS is pay-per-use (based on API calls) – no large upfront investments or custom training costs. Vision Language Model as a Service Andrew Burnett, Acting Chief Technology Officer, Milestone Systems, said: “With the Vision Language Model as a Service and Video Summarisation for XProtect, we’re tackling some of the most challenging bottlenecks: video overload and time-consuming manual work. Operators get immediate insight directly within XProtect; builders get API‑first access to production‑ready intelligence without bespoke training or heavy infrastructure." "Because this model is specialised for real-world traffic video and fine-tuned on responsibly sourced data, customers can trust the results, deploy with confidence, and enhance all existing solutions in place. It’s the fastest, most advanced and impactful path to turning video into actionable outcomes.” XProtect customers like the cities of Genoa, Italy, and Dubuque, Iowa, US, are excited to use these new capabilities, leading the way in adopting advanced video intelligence solutions to enhance traffic management. Built on responsible AI, powered by real-world data The two new offerings are powered by Milestone’s Hafnia VLM, which has been fine-tuned on 75,000 hours of responsibly sourced, real-world video data from either Europe or the US, using NVIDIA Cosmos Curator for data preparation and running either on cloud infrastructure or regional data centres. Leveraging NVIDIA Cosmos Reason VLM and Milestone’s data for fine-tuning makes it one of the most advanced video AI platforms in the industry.
Access control applications
As a pioneering energy supplier with a large software development practice, the client was spinning a lot of plates. Looking to streamline its software delivery process, the company targeted tooling as a potential area for improvement. With a huge number of software engineers working across the organisation, tool sprawl had become a major issue. Tool proliferation was creating several challenges that were slowing down the SDLC, including: Increased costs: Each team was paying for tools independently, leading to duplicated expenses and unnecessary costs. Reduced productivity: The disorderly range of tools created a steep and unpredictable learning curve for engineers, adding to their cognitive load and impacting productivity. Limited control: Without standardisation, the company found it difficult to enforce software delivery practices, resulting in a higher cost-of-change and complex implementation. Visibility gaps: Dispersed tools meant limited insight into overall engineering efficiency, software quality, and other key performance indicators. To address these issues, the company sought to roll out a standardised, simplified toolset for all development teams and reached out to RiverSafe for support. The solution RiverSafe worked with the organisation to move them from a decentralised, multi-tool environment to a standardised, enterprise-level toolset. This new, cohesive platform featured accessible repositories, security scanning tools, and testing tools—all of which were made available across every engineering team. Key elements of the solution included: Standardised tooling across teams: By standardising the toolset, the organisation can ensure that all teams are using the same set of approved tools. This also makes tools more accessible and user-friendly, and helps new engineers get up to speed with tools quickly. Better data visibility: These newly centralised tools allow the organisation to gather comprehensive data, allowing business leaders to closely monitor engineering performance metrics. This enhanced visibility means teams can now analyse lead times from code commits to production, identify bottlenecks, and gain insight into the maturity of their DevOps practices. Streamlined processes and governance: With a unified platform, the organisation can introduce uniform standards for processes to improve its products—a new pull request approval process, for example, began improving code quality immediately. Being able to implement these standards at the enterprise level, as opposed to among individual teams, has simplified change management and reduced governance challenges. The results The standardisation effort has already brought significant benefits to the company and its engineering teams, including: Cost savings: By eliminating licenses and reducing the need for multiple tools, the company now saves around £4 million every year. The streamlined toolset has also reduced spending on maintenance and duplication of other costs. Improved engineering performance: With full visibility into engineering processes and clearer performance data, the organisation has been able to identify opportunities for improvement and fine-tune processes. By reducing tool sprawl, engineers can now focus on developing software instead of adapting to or switching between different tools, reducing workload and boosting their productivity. Reduced change costs: By consolidating all pipelines into one tool, the organisation minimised the complexity of future upgrades. With a single pipeline model, changes can now be rolled out at one central point rather than across multiple tools, lowering the cost of engineering efforts. More informed decision-making: Having access to a centralised source of data means the company can make informed decisions about which tools to retain or retire. The standardised approach has also eliminated time-sucking “tool holy wars,” where team members would promote the use of their preferred tools, as the choice is made at the organisational level. Data-driven insights: Achieving full visibility into their practice has empowered the organisation to measure engineering maturity and pinpoint improvement areas. Leadership can now assess metrics like commit lead times and engineer performance so they can make smarter decisions about resource allocation and planning.
ANSecurity, a pioneering specialist in network security and wireless solutions, has successfully delivered one of the UK education sector’s first campus-wide Wi-Fi 7 deployments at Sir William Perkins’s School, providing the Surrey-based independent school with a secure, high-capacity wireless infrastructure designed to support its growing digital learning ambitions. Serving around 580 students and 142 staff, Sir William Perkins’s School has fully embedded 1:1 iPad usage into daily teaching. However, the school’s legacy wireless network struggled to cope with the rising density of devices, particularly when large groups connected simultaneously through Apple Classroom. Technical requirements Ensuring secure authentication, safeguarding compliance, and consistent performance across hundreds of devices became increasingly challenging – and other vendors were unable to meet the school’s strict technical requirements. “We spoke to multiple providers, but none were able to implement the solution we envisioned. ANSecurity not only made it possible – they tested it, validated it, and delivered it flawlessly,” said the school’s IT Manager. A structured, consultative approach Introduced by RUCKUS Networks, ANSecurity began by validating the school’s design requirements and conducting extensive lab testing to confirm compatibility with Jamf School’s certificate-based authentication and the school’s existing network architecture. A collaborative deployment plan followed, with a tight three-month schedule carefully aligned to the school holidays to avoid disruption. ANSecurity then deployed RUCKUS Wi-Fi 7 access points and configured Cloudpath to seamlessly issue certificates to nearly 550 school-managed iPads – a capability other vendors could not match. Wi-Fi 7 provides dramatically higher throughput, lower latency, and improved efficiency thanks to technologies such as wider channels and multi-link operation, enabling fast, reliable connectivity even in dense device environments like classrooms. ANSecurity integrated RADIUS and API-driven workflows To support safeguarding and compliance, ANSecurity integrated RADIUS and API-driven workflows to ensure accurate user-to-IP mapping across both the Palo Alto Networks next-generation firewall and the ContentKeeper filtering service. Additional networks were created for BYOD and guest access, with Opportunistic Wireless Encryption (OWE) used to protect traffic on open networks. ANSecurity also assisted in restructuring parts of the network, implementing new VLANs and applying updated firewall policies to ensure the right users and devices could securely access the right resources. Following deployment, a detailed wireless site survey was carried out to confirm optimal signal strength, signal-to-noise ratio, and throughput across both indoor and key outdoor areas of the campus. “The difference in consultative support compared to other vendors was night and day,” said the IT Manager. A high-performance, future-ready outcome The school now benefits from fast, stable, and secure Wi-Fi coverage across the entire campus. The new network reliably supports nearly 800 devices, with the majority operating seamlessly on 5 GHz, and is fully prepared for future upgrades, including WPA3 and 6 GHz Wi-Fi once supported by Jamf School. Integration with existing security solutions ensures all safeguarding, logging, and compliance requirements are met. Improvements to switching, segmentation, and overall network architecture have further enhanced performance and manageability. Cyber Essentials Plus certification Delivered within the agreed three-month window, the project positions Sir William Perkins’s School at the forefront of digital education. Wi-Fi 7 provides the performance headroom needed to support emerging educational technologies – from AR/VR learning to high-bandwidth cloud applications – ensuring the school remains ahead of future digital demands. With upcoming initiatives including Cyber Essentials Plus certification, expanded security controls, and wired network access control, the relationship between the school and ANSecurity continues to deepen, built on trust, technical expertise, and a shared commitment to innovation.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced now that Ki Charter has expanded its contract following initial success. ZeroEyes’ proactive gun detection and intelligent situational awareness solution will now be deployed across the school’s San Marcos campus. Largest residential treatment centre Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school serves over 6,500 students annually (500% mobility rate) with a dedicated team of educators and staff. The San Marcos campus is located within the 65-acre San Marcos Treatment Centre, the largest residential treatment centre in Texas. The centre houses approximately 200 residents (and community students) who attend Ki Charter, and employs 425 staff members, including 50 from Ki and 375 from the San Marcos Treatment Centre. Level of real-time awareness “At Ki Charter, we serve a unique population of behaviourally challenged students, so our approach to security has to be comprehensive, proactive, and intentional,” said Dr. Jerry Lager, Superintendent of Ki Charter. “Our Safety and Security Committee, campus teams, mental health staff, and local law enforcement all play a role in preventing and de-escalating potential threats, but ZeroEyes added a level of real-time awareness we simply didn’t have before. After seeing how effective the technology was, expanding its use was an easy decision.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Multi-layered safety program “Ki Charter has built a thoughtful, multi-layered safety program, and we’re proud to continue to play a role in strengthening it,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “Their leadership is deeply committed to protecting students and staff, and this expansion proves that they understand that proactive security is essential on a campus of this size and complexity.”
Acoem, a pioneer in advanced physical security solutions, announced that a large North American utility is utilising its ATD Gunshot Detection system to protect critical infrastructure at multiple sites across the country. Over the past few years, utilities across the United States have faced a troubling trend: gunfire directed at electrical substations and other energy assets. Whether the intent is vandalism, sabotage, or reckless target practice, the results are the same. A single rifle round can destroy a million-dollar transformer that could take months to replace. This happens when the cooling fluid drains from the transformer. Once the fluid is lost, the unit quickly overheats and frequently ignites. Physical attacks on critical infrastructure A recent DHS Homeland Threat Assessment concurs, stating, “We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals…” One of the largest electric power and natural gas utilities in North America recognised this risk after a number of gunshot attacks on substations disrupted power to tens of thousands of customers. In one case, power was not restored for days, and a person dependent on life support equipment tragically lost their life. The challenge Before implementing a new solution, the utility needed to reassess how its security technologies worked together. Traditional security cameras were excellent for documenting clearly visible problems, but they could not reliably detect something as small as a bullet hole in a damaged transformer, leaving a critical awareness gap. The company’s challenge was not only detecting a gunshot but doing it fast enough to act before cascading failures occurred. Threats outside the perimeter In many cases, gunfire at substations originates from hundreds of feet outside the fence line. The sound of the muzzle blast may never reach the site, leaving only the supersonic ballistic wave as evidence of incoming rounds. A system limited to triangulating muzzle blasts within a perimeter would miss these long-range threats entirely. Integration with security cameras and VMS Facing these unique requirements, the utility sought a technology that could provide instant notification with video and audio verification. This capability was essential to confirm whether an event was malicious or accidental. Integration with the utilities existing video management system (VMS) was a requirement, while direct control of a pan-tilt-zoom (PTZ) camera would allow operators to focus immediately on the source of the gunfire and determine if an actual threat existed. "We needed immediate, accurate alerts to prevent catastrophic damage,” said the utility’s physical security program manager. “Whether a threat is close-range or from a high-powered rifle fired from hundreds of feet away, we needed a modern, self-contained, highly accurate system to provide a full picture.” The requirement of a closed, secure network Cybersecurity was another defining requirement for this utility. The company prohibits internet connectivity within its operational network, a strict “air-gapped” policy that rules out any cloud-based system. For these secure environments, any new security technology must operate entirely on-premises, integrating directly with existing video and access control platforms. Finding the correct solution To address the complex nature of the threats and meet these stringent demands, the utility required a specialised solution that avoided a full infrastructure overhaul. After extensive testing, the utility selected Acoem’s ATD (Acoustic Threat Detection) system. The company has now deployed numerous detection systems across multiple states and regions, with new installations continuing every week as part of an ongoing modernisation plan. A principal reason behind choosing the Acoem ATD system was based on how the system works compared to legacy solutions. Instead of sending audio data from multiple sensors to a remote server, the Acoem sensor processes detection right on the device. When a gunshot occurs, it detects both the muzzle blast and the ballistic wave, confirming the event and calculating its location instantly. Cybersecurity requirements of restricted internet access Processing analytics on the edge is instant and gives operators the time they need to respond. That might mean rerouting power, isolating a substation, or taking a transformer offline before it fails. Having that situational awareness can make the difference between a quick repair and an extended regional outage. Acoem developed an on-premises version of its Cadence software specifically to meet the utility’s cybersecurity requirements of restricted internet access. The platform displays live maps, sensor health, and provides audio verification clips that allow operators to hear what the sensor heard while viewing the shooter’s position overlaid on the map. Cadence integrates directly with the utility’s Avigilon video management system. “Running software on-premises was non-negotiable,” said the utility’s program manager. “We needed the benefits of automation and analytics without exposing operational systems to the internet.” Situational awareness with eyes on target Detection is only half the story. Integration with a PTZ camera on site provides immediate visual confirmation. When a gunshot is detected, the sensor automatically commands the camera to pivot to the coordinates of the source. Operators can see what happened as it happens, even if the shooter is several hundred yards outside the fence line. In some locations, thermal or infrared cameras may complement the acoustic sensors to detect movement in tree lines or along rights-of-way. This pairing of acoustic and visual intelligence transforms response operations, allowing the utility security team to verify alarms in real time and coordinate with law enforcement or maintenance crews as needed. Hunters or vandals? In one recent example, the utility’s Acoem ATD system detected gunfire at a remote substation. Through the linked PTZ camera, operators quickly confirmed that the shots came from hunters outside the perimeter and that there was no threat to equipment or personnel. The team was able to assess the situation instantly without dispatching crews or contacting law enforcement. Scalability and integration flexibility The utility required open standards and interoperability. They did not want a proprietary system that locked them into a specific platform. The Acoem ATD system met that demand, integrating through APIs with their existing Avigilon infrastructure. Whether a site runs on VMSs such as Avigilon, Milestone, or Genetec, the ATD sensors connect seamlessly within the same ecosystem. Just as important, the solution had to scale. The utility began with a few high-risk sites and has expanded steadily without redesigning its network. This “start small, grow fast” approach aligns with how the organisation evaluates, validates, and then standardises new technologies. CIP-014 compliance and beyond The North American Electric Reliability Corporation’s CIP-014 standard mandates physical security measures for critical transmission substations, including threat detection. The utility wanted to go further. It set a new benchmark for awareness, resilience, and uptime. Acoustic threat detection is now a key component of its operational strategy, providing actionable intelligence that prevents damage rather than documenting it after the fact. A smarter path forward Protecting critical infrastructure today means recognising that not every threat is digital. A single bullet can cause as much disruption as a cyberattack. The key is giving operators the real-time data they need to act quickly and decisively. By combining edge-based AI, on-premises software, and open integration with existing security systems, Acoem’s ATD system has given the utility company the situational awareness it needed to protect its assets and its customers. The system keeps vital equipment online, strengthens compliance, and helps safeguard the communities that rely on uninterrupted service. “Securing the grid now demands both digital and physical vigilance,” said the utility’s program manager. “Gunshot detection has become a critical layer of defense for the infrastructure that powers our daily lives.”
Intersec Dubai 2026 news
RecFaces, a global developer of ready-made facial recognition software solutions, is pleased to announce its participation in Intersec 2026, one of the world’s pioneering security, safety, and f...
Dubai World Trade Centre — Sheikh Saeed Hall 2, Stand C43, January 12–14, 2026. Organisations of every size and type have discovered how connected digital access helps them implement smart...