Mobile Access Trends
 
                                    Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
 
                                    Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
 
                                    ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
 
                                    Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
 
                                    Milestone Systems announced the latest updates in XProtect 2025 R3 and the Arcules platform, delivering new capabilities that accelerate investigations, strengthen security operations, and simplify system management. The latest releases for XProtect VMS and Arcules VSaaS address the real-world challenges facing security professionals by making surveillance systems more intelligent, accessible, and easier to manage while maintaining the open-platform flexibility that has made Milestone a trusted partner worldwide. XProtect delivers proactive monitoring XProtect Remote Manager introduces new comprehensive monitoring and management capabilities that enable security teams to maintain system health and respond to issues before they impact operations, eliminating time-consuming site visits. Remote management, along with improved monitoring of recording servers, allows administrators to detect and resolve critical issues, such as full databases or server health problems, without local access. Event-based notifications keep teams informed through customised email alerts when cameras, servers, or other components experience status changes, supporting faster response times across cameras, recording servers, hosts, sites, services, devices, and camera components. Video permissions control Video permissions control provides granular management of video feed visibility, allowing site owners to define precisely who can view specific cameras to minimise the risk of unauthorised access risks. Another key feature is the new Role-based Access Control Permissions for access control systems, which allows administrators to restrict the visibility and operation of access control units based on user roles directly within XProtect. By eliminating separate logins for third-party access control systems, this integration creates a unified interface for managing integrated security solutions. Faster investigations and enhanced reliability The Arcules cloud platform receives substantial new enhancements that accelerate investigations, improve detection accuracy, and increase deployment flexibility for cloud-based surveillance operations. New Multi-Camera Forensic Video Search enables security professionals to analyse footage across multiple cameras simultaneously in a unified interface. Teams can quickly trace movements and reconstruct events with complete multi-angle perspectives, proving especially valuable for campus safety, emergency response, and traffic monitoring. Dual-Layer Motion Detection reduces the risk of missed events by combining Arcules video analytics with on-camera motion detection algorithms. This approach ensures critical motion events are captured, with recordings stored in the cloud or on edge gateways. The feature works with ONVIF M and T cameras across both cloud and edge gateway deployments. Extended camera-to-cloud compatibility New Extended Camera-to-Cloud Compatibility expands support to devices with limited internal memory, making cloud video surveillance accessible to even more deployments. Organisations can deploy cost-effective cameras while maintaining full cloud capabilities and deployment flexibility. External Case Sharing enables secure, time-limited sharing of video evidence with law enforcement, legal teams, and third-party investigators. External recipients can access shared Cases through secure links without an Arcules account, with access automatically expiring based on set permissions. Keeping organisations, people, and assets safe These updates across XProtect and Arcules deliver smarter search tools, more reliable detection, enhanced system monitoring, and secure collaboration features that help organisations protect people, assets, and operations more effectively.
 
                                    Zero Networks, a major provider of zero trust security solutions, announced enhanced Kubernetes microsegmentation capabilities that give security teams comprehensive visibility and control without relying on DevOps expertise. By leveraging native Kubernetes tools and eBPF technology, the Zero Networks platform delivers a minimal footprint, non-intrusive deployment that enables organisations to scale securely while preventing lateral movement. With 93% of organisations either using, piloting, or evaluating Kubernetes, and 42% of organisations citing security as a top concern with container and Kubernetes strategies, Zero Networks has created a powerful, easy to use security tool for Kubernetes-based environments. Comprehensive visibility Zero’s approach gives the security team comprehensive visibility without requiring them to be Kubernetes savvy, while also aligning with DevOps best practices to ensure security isn’t creating obstacles for developers. “Security shouldn’t inhibit the speed of business, and Zero’s approach to microsegmenting Kubernetes is a robust technological advancement for teams frustrated by historically high friction, intrusive alternatives,” said Yuval Goldberg, VP Product Management at Zero Networks. “With this new enhancement, security practitioners can finally protect Kubernetes environments without disrupting their DevOps colleagues. Customers are consistently surprised by our ease of deployment and how simple we make a very difficult problem – and making that kind of first impression never gets old.” Highly compatible with existing workflows Compared to legacy Kubernetes microsegmentation options that are complicated to deploy and manage, provide only partial coverage, or require complex architectural changes, Zero Networks’ approach is highly compatible with existing workflows. By deploying seamlessly into standard Kubernetes processes, Zero Networks will not disrupt applications running in the cluster. Security teams using Zero Networks with Kubernetes environments gain immediate value: complete, granular visibility into cluster activities and across-cluster network policy insights. Tightening security and demonstrating compliance without any disruption to the business, all from a true single interface. Key features of Zero’s support for Kubernetes microsegmentation include: Automated discovery of all workloads, services, and dependencies within K8s clusters Comprehensive visibility into all traffic — east-west, north-south, and inter-cluster Insight into user-defined network policies for immediate understanding of exposure Centralised management to create and enforce segmentation rules from a single pane of glass Identity-aware microsegmentation Zero Networks delivers microsegmentation that is identity-aware and implemented in days. The company’s deterministic automation engine eliminates the complexity that has historically kept microsegmentation out of reach for many organisations. Notably, Zero Networks supports organisations seeking to follow CISA’s new zero trust microsegmentation guidance. Zero Networks was also recently recognised as the winner of four 2025 Top InfoSec Innovators Awards: Most Advanced in Microsegmentation, Most Innovative in Zero Trust, Groundbreaking Cybersecurity Visionary, and Market Innovator in Identity Protection. Zero trust security offerings These awards represent Zero’s breadth and depth of zero trust security offerings that make it possible for organisations of any size to prevent lateral movement and contain ransomware – including for Kubernetes environments – without adding operational burden. The Zero team is currently hosting a four-week webinar series called Containment Island where contestants can compete to win weekly prizes and a grand prize – a trip to the Four Seasons Bahamas. Security professionals can join the competition at any time to rack up points, get 0.5 CPE credits per session attended, and hear from leaders across all aspects of cyber. Join the competition, which runs until the winner is announced on Nov. 11.
 
                                    Düsseldorf-based cybersecurity company ONEKEY has expanded its platform from a major solution for detecting software vulnerabilities to a fully-fledged environment for vulnerability management. This enables companies to map the entire process of dealing with so-called “Common Vulnerabilities and Exposures” (CVEs) – from detection and assessment to documented decision-making – in a single workflow that can serve as evidence. Background: In 2024, the number of newly reported vulnerabilities peaked at over 40,000 CVEs, a 38 percent increase on the previous year. Such a high volume makes it increasingly difficult for manufacturers of networked devices, machines, and systems to keep track of which of their products are specifically affected by a CVE report. Integration of VEX data To address this issue, ONEKEY has announced the integration of VEX (Vulnerability Exploitability eXchange) data into its device software security testing platform as part of its management platform alignment. Although this step may appear technical at first, it is significant: it reduces team workload, accelerates compliance, and improves transparency across the digital supply chain. New feature The new feature enables companies to prove that not every vulnerability poses a risk. Not only does it document whether a vulnerability is relevant to the product in question, it also justifies this in a standard format, either individually or embedded in a software bill of materials. These documents can easily be integrated into automated workflows and tools. This makes tracking and reporting vulnerabilities faster, easier, and more accurate Automation instead of manual review Until now, security teams had to manually evaluate each reported CVE vulnerability and justify why it might not pose a risk to the product in question. This often resulted in misunderstandings and time-consuming queries from customers, regulators, and partners. The new technology solves this problem by standardising the context of a vulnerability. It provides the crucial information on whether a known vulnerability in a specific product can actually be exploited. Through integration into the ONEKEY platform, these vulnerability decisions can now be automated and made traceable. Competitive advantage The new integration arrives just in time: The EU Cyber Resilience Act (CRA) stipulates that, in future, manufacturers of networked devices, machines, and systems must significantly increase and document the resilience of their products against cyberattacks. Adopted in 2024, the CRA will come into full effect at the end of 2027, at which point all connected products offered on the EU market must meet CRA requirements. Given that product development takes two to three years on average, the current expansion of the ONEKEY platform will be of great benefit to manufacturers. The advantages for companies at a glance: Fewer queries from compliance, customers, and partners: Standardised data provides immediate clarity on the status of vulnerabilities and reduces manual communication processes. Faster certifications and security approvals: Automated and traceable documentation of vulnerabilities allows products to be certified and approved more quickly. Competitive advantage: With this integration, ONEKEY offers customers a solution that meets the growing demand for transparency in the supply chain. “We want to give our customers the opportunity not only to find vulnerabilities, but also to prove that their products are secure,” explained Jan Wendenburg, CEO of ONEKEY. “With the new integration, we are automating the risk assessment process and helping our customers use their time for strategic rather than administrative tasks.” ONEKEY strategy The new integration is part of ONEKEY's corporate strategy to expand the functionality of its security platform beyond simply identifying software vulnerabilities to include additional options for comprehensive CVE management. This includes prioritisation and documentation to demonstrate whether a vulnerability has been resolved or is irrelevant in the given environment. “Structured and automated vulnerability management is one of the most important issues for manufacturers of digital products,” said Jan Wendenburg, based on numerous customer discussions. Growing demand for appropriate functions With more than 100 new CVEs emerging daily, the implications for product ranges remain unclear. Combined with increasingly strict legal compliance requirements, this has led to considerable uncertainty and, in some cases, excessive demands. “That's why this fall we are focusing on meeting the growing demand for appropriate functions, to help manufacturers of digital products address the issue of cybersecurity,” said Jan Wendenburg, explaining the ONEKEY strategy. “This marks the transition from pure vulnerability detection to an environment for complete management.” Product cybersecurity & compliance management ONEKEY is the major European specialist in product cybersecurity & compliance management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life. Critical vulnerabilities and compliance violations Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated Software Bills of Materials (SBOMs) generation. "Digital Cyber Twins" enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle. The patent-pending, integrated ONEKEY Compliance Wizard already covers the EU Cyber Resilience Act (CRA) and requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others. Product Security Incident Response Team The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation. Major international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform (OCP) and ONEKEY Cybersecurity Experts.
 
                                    CAME KMS have partnered with Amazon Logistics UK to integrate Amazon Key access events into SimpleKey Web (SKW) systems running on CAME KMS SK4 installations. This deep integration both enables Amazon Key entry to a building and records Amazon Key activations as unique events for a full, reportable audit trail within SKW. The Amazon Key system is a service provided by Amazon Logistics UK to streamline deliveries to multi-dwelling buildings. With the rise of online shopping and associated product deliveries, many building owners have identified the frustrations residents can have when receiving parcels. Security and privacy considerations Security and privacy considerations around who can access a building and its communal areas or individual apartments can result in parcels not being delivered in a timely or safe fashion. Amazon Logistics UK can liaise with Housing Associations and building owners to develop a programme installing devices that integrate with door entry systems to allow Amazon delivery drivers time-limited access to the building and leave packages in a secure location. This reduces missed deliveries and ensures only registered Amazon drivers have access to the property for a limited time. SimpleKey Web and SK4 Integration In partnership with Amazon Logistics UK, CAME KMS have developed an integration process for the Amazon Key device alongside building a new “event type” into SimpleKey Web in order to differentiate Amazon Key entries from other door entry events. This allows a full audit trail of Amazon Key entrance events to ensure the system is working as expected. Whilst the Amazon device can open the door remotely from the SK4 system, due to the nature of the integration the input(s) can be disabled at any time on request from the client. Building Managers can also apply a time profile on the Amazon Key input to manage access hours, limiting free Amazon driver access between approved times. Integration Process The integration process is straightforward: Amazon Logistics UK liaise with the client direct regarding assets and the identification of suitable sites, guidelines around minimum unit dependencies are applicable from Amazon. Liaise with CAME KMS for integration with SK4 Installations are then carried out by Amazon trained and improved installers. CAME and Amazon have agreed to follow a default installation process for simplicity. Amazon supply the device along with the following: Separate plastic adaptable enclosure; 240v AC to 12vDC power supply; Antenna; SIM Card The installation will require access into the CAME KMS or CAME Entrotec enclosure in order to wire the systems together. Connect the two systems together SimpleKey Web Rollout The Amazon Key product feature will be available to UK SKW customers from November 2025. There is no cost to for the SKW integration, these developments form part of the continued feature set expansion within SimpleKey Web. Amazon Key integration is not turned on by default and SKW users will have to request activation and testing from CAME KMS to open up the tools in SK4. The Amazon Key service provided by Amazon Logistics is available at no cost to qualifying installations.
Access control applications
 
                                    Cognitec Systems Pty Ltd is working with Home Affairs Australia to deliver 250 camera devices for facial image capture, image quality check, and traveller identity verification at all major international airports in Australia. With approximately 41 million international travellers entering and leaving Australia each year, the Department uses facial biometrics to collect and electronically verify the identity of eligible international travellers. Cognitec hardware and software systems Cognitec’s capture device, FaceVACS-Entry, detects the person’s height, automatically adjusts the camera position to capture a frontal pose photo, and uses automated face recognition to verify person identity. Cognitec is also providing integration software, mounting hardware, device installation services, as well as ongoing support and maintenance services for all Cognitec hardware and software systems. Relationship with the Department of Home Affairs “Cognitec is proud to continue a successful relationship with the Department of Home Affairs, and to deliver our technology for quick collection of biometric photos and for accurate traveller verification at the Australian border primary lines,” says Terry Hartmann, Cognitec’s Vice President Asia Pacific, adding “This project contributes to the security and ongoing digitisation of the Australian border, ensuring trusted traveller identities.” FaceVACS-Entry is used by governments worldwide for applications that require the acquisition of standards-compliant photos, and the verification of a live image against reference images, such as access control, border control, and entry/exit programs.
 
                                    Ericeira, a seaside town on the western coast of Portugal, is a popular tourist destination and is known as one of the top surfing destinations in Europe. It has a population of just over 10,000 citizens with this increasing during the busy summer season. The Municipal Council of Mafra, the local government body overseeing the region, recognised that the increase in traffic during the summer months needed greater monitoring and control to reduce congestion and the risk of accidents. Improving traffic and pedestrian flow A national road, 247, is the main through route for the town and, therefore, is priority for an intelligent traffic management system. At marked crossings where traffic will stop for pedestrians, congestion was particularly acute. The council wanted a solution that would prevent static, inefficient traffic and could adapt to dynamic changes in vehicle and pedestrian flow. Local installer Soltrafego undertook a detailed technical study that identified the need for intelligent video surveillance and traffic analysis. Hanwha Vision was chosen due to its effective and robust cameras. Monitoring congestion Cameras were installed at signal-controlled intersections, with four QNO-C8083R AI cameras installed per intersection. Two were positioned to monitor traffic in both directions, and the other two covered pedestrian areas. Entry and exit zones were set up to monitor vehicle flow, counting the number of vehicles and sending this volume data to traffic light controllers. Traffic light red and green intervals would be automatically adjusted according to detected traffic density. Two virtual zones on each side of the pedestrian crossings were set up on the other two cameras to monitor the number of people waiting in those areas. When the number of people reaches a pre-defined threshold, the pedestrian green light is triggered, and traffic is stopped to prevent overcrowding at the waiting area and ensure a safe crossing for pedestrians. A boosted traffic and pedestrian experience Thanks to the implemented intelligent traffic solution, vehicle and pedestrian movements in Ericeira have improved, especially during the summer months. Optimised traffic light timing based on real-time, dynamic data from the QNO-C8083R cameras avoids unnecessary delays and lowers the risk of accidents at the crossing points where the cameras are installed. Automating traffic light and pedestrian crossing controls improves operator efficiency and meets actual demand without manual input. The cameras were installed within existing infrastructure, requiring no extensive construction or physical alterations. The data collected by the cameras can be used to inform future town improvements, and the installation has become a pilot model for other towns in the area that are facing similar challenges.
 
                                    Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In the report, Cybersecurity Analyst Stan Wisseman recognised Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organisations run behind on patching an average of 56 days. Although organisations set their own patching schedules, this is well beyond the accepted 30-day standard set by organisations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index. With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognised Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customisation: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organisation’s business priorities. Workflow Integrations: GigaOm emphasised Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).
 
                                    As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialised surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution colour footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.
 
                                     
                                     
                                     
                                    