Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
Zimperium, the world pioneer in AI-empowered mobile security, announced the launch of its Mobile SOC Agent, a force multiplier for security analysts confronting the rise of mobile threats aimed at iOS and Android mobile devices. Leveraging Zimperium’s unmatched expertise in mobile security, Mobile SOC Agent is an agentic AI solution that enhances Zimperium’s industry-leading Mobile Threat Defense (MTD), enabling security teams to rapidly identify, prioritise, and remediate mobile threats in real time. Mobile attacks As cybercriminals adopt a mobile-first attack strategy, enterprise security teams are facing a profound rise in mobile attacks fueled by weaponised AI coupled with sophisticated social engineering campaigns. Security teams struggle with the high volumes of alerts across devices, apps, networks, and web activity, requiring analysts to manually verify and investigate mobile attacks that threaten organisations. Mobile SOC Agent Zimperium’s Mobile SOC Agent addresses these challenges for security teams by identifying and prioritising mobile alerts while correlating related threats across the mobile attack surface to confirm a credible malicious attack on the mobile device. Mobile SOC Agent then provides security analysts with a clear attack narrative alongside intelligent, step-by-step remediation guidance, enabling security teams to respond quickly and confidently while reducing investigation time from hours or days to only minutes. Responding to credible mobile threats “Attackers are using AI to scale highly sophisticated mobile attacks to an incredible volume, making speed and clarity essential for security teams,” said Chris Cinnamo, Deputy CTO at Zimperium. “Mobile SOC Agent delivers immediate insight into what matters, what’s real, and what to do next, so teams can reduce risk and respond rapidly to credible mobile threats.” With Mobile SOC Agent, SOC analysts gain clear attack context and guided response actions grounded in deep mobile security expertise, reducing investigation and response time. Key capabilities Incident Discovery: Identifies true incidents with confidence score Event Correlation: Unifies events into a single incident view Attack Context: Delivers plain language attack narratives and timelines Remediation Guidance: Maps threats to MITRE ATT&CK with clear response actions The Zimperium Mobile SOC Agent is available immediately to current and new MTD customers.
Kentec Electronics has been honoured with a King’s Award for Enterprise. Kentec is one of only 185 organisations nationally to be recognised with a prestigious King’s Award for Enterprise in 2026. Announced on Wednesday, 6 May, the Award acknowledges the company’s outstanding achievement in International Trade. Kentec was founded in 1985 and is one of the world’s pioneer life safety solutions, manufacturers of conventional, analogue addressable fire detection and extinguishant control panels. All design, development and end-to-end manufacturing is undertaken from the firm’s headquarters in Dartford, Kent, where it employs around 290 people. Outstanding export growth The King’s Award for Enterprise recognises Kentec’s outstanding export growth over the last three years, in which time overseas sales have risen by 69%, with exports now responsible for over two-thirds (67%) of the firm’s turnover. “As the most prestigious business award in the UK, it's a great honour to win the King's Award for Enterprise, and it's wonderful for everyone at Kentec to have their efforts recognised,” said Kevin Swann, managing director at Kentec. “Kentec now exports to over 90 countries around the world and we hope the recognition that the King's Award for Enterprise brings will help open up even more markets.” Celebrating exceptional UK businesses The King’s Awards for Enterprise - previously known as The Queen’s Awards for Enterprise - were renamed in 2023 to reflect His Majesty The King’s commitment to continuing the legacy of HM Queen Elizabeth II in celebrating exceptional UK businesses. Now in its 60th year, the King’s Awards for Enterprise remain the UK’s most prestigious business accolades. Successful organisations may use the esteemed King’s Awards Emblem for the next five years, signalling excellence to customers, partners, and global markets. Applications for the 2027 round will open on 6 May 2026.
Atos, a global pioneer in AI-powered digital transformation, announced the extension and expansion of its long-standing strategic partnership with CNA, one of the largest U.S. commercial property and casualty insurance companies, through a new multi-year infrastructure and cybersecurity services agreement with an expected total value of up to approximately $500 million over the duration of the core agreement, inclusive of potential future extensions and additional services. Agreement details The agreement marks a significant milestone in the relationship between CNA and Atos, reinforcing nearly a decade of collaboration built on trust, service excellence, and a shared commitment to operational resilience and innovation. Under the new agreement, Atos will continue delivering critical infrastructure services across CNA’s enterprise environment, including mainframe services, network and middleware operations, digital workplace support, service desk, identity and access management, major incident management, and cybersecurity services. This renewal reflects CNA’s continued confidence in Atos as a trusted strategic partner supporting mission-critical operations across one of the most complex IT environments in the insurance industry. Driving successful business outcomes “CNA’s decision to extend this partnership reflects the strength of the trusted relationship we have built together over many years,” said Michael Grunberg, head of North America, Atos. “Our teams have worked side by side to deliver measurable service improvements, modernise critical infrastructure, and help support CNA’s long-term business objectives. This agreement underscores the value of strong collaboration, transparency, and shared accountability in driving successful business outcomes.” New terms The new contract includes an initial 67-month base term, alongside potential extension options, and future scope expansions, reflecting the long-term nature of the partnership further demonstrating CNA’s long-term commitment to Atos as a key strategic partner. A key differentiator in the relationship has been Atos’ ability to work collaboratively across CNA’s broader IT partner network to drive outcomes in the best interest of the client, reducing friction, accelerating issue resolution, and improving overall service performance. More than a service provider “Atos has become much more than a service provider to CNA — they are a trusted partner,” said Jane Possell, executive vice president & chief information officer, CNA. “Their commitment to quality delivery, transparency, and partnership has played a critical role in supporting our technology transformation journey and positioning us for the future.” Looking ahead, both organisations are continuing to explore how AI-driven service innovation and infrastructure modernisation can further enhance operational efficiency, resilience, and long-term business value.
Zimperium, the world pioneer in mobile security, outlined its new AI-empowered mobile security vision, including the availability of two new AI-powered agents that provide a force multiplier in the battle to harden the mobile attack surface. Globally, cybercriminals have moved to a mobile-first attack strategy, weaponising AI coupled with highly sophisticated social engineering campaigns. The result is that mobile apps and devices now represent the most vulnerable attack surface in most organisations. Agentic AI strategy “AI is changing the mobile threat landscape by enabling attackers to scale social engineering, malware development, and exploitation techniques at a pace that traditional security approaches struggle to match. With mobile devices and applications taking on greater operational weight, security teams need better visibility into mobile risk and clearer paths from signal to action,” said Katie Norton, Research Manager at IDC. “Approaches that embed AI directly into mobile environments and move toward more autonomous detection and response, such as those Zimperium is pursuing with its agentic AI strategy, aim to reduce exposure and improve operational efficiency.” Functional areas of mobile defense Years ago Zimperium innovated the use of on-device AI for identifying advanced threats, including zero-day malware, and is now pioneering the development of autonomous AI-empowered mobile security that defends against even the most sophisticated AI-driven cyberattacks. This industry-defining strategy is centered upon the development of Agentic AI across three functional areas of mobile defense: Enablement & Usability - Accelerating time to value with advanced onboarding, security policy definition and deployment, & AI support for feature guidance and advanced reporting Digital Security Agents - Day-to-day mobile security management, including always-on monitoring, incident assessment, threat ranking and autonomous response specialised for mobile risk, threats, and attacks. Advanced Research & Threat Hunting Agents - Mobile threat expertise combined with AI-driven agentic analysis of telemetry data from across mobile devices and apps will help security and fraud teams to identify attack patterns that may not be visible through human-only analysis, enabling proactive threat hunting. Deploying AI-on-AI analysis ”Our agentic AI approach empowers our customers with unique, highly specialised mobile-specific expertise that is missing in many security organisations,” said Shridhar Mittal, CEO of Zimperium. “In today’s mobile-first attack environment, organisations must deploy AI-on-AI analysis and defense to combat AI-based attacks.” Two new AI-empowered digital security agents available now As part of Zimperium’s AI portfolio, two new products were announced which shrink the time needed to investigate and respond to mobile threats from days to hours, or even minutes: Available to Zimperium’s Mobile Threat Defense (MTD) clients, Mobile SOC Agent is for enterprise SOC teams investigating mobile threats on employee devices; and Mobile App Response Agent enhances its Mobile App Protection Suite (MAPS) to help SOC and Fraud teams assess and respond to threats to the mobile app. These advanced AI agents complement Zimperium’s AI-powered SMS Text Analysis, which detects fraudulent intent in SMS messages (with or without links) across Android and iOS and was made available earlier this year.
Access control applications
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its proactive AI gun detection and intelligent situational awareness software has been deployed by St. Cecilia School in Cincinnati, Ohio, to help protect students, staff, and visitors from gun-related threats. Located in the geographic centre of Cincinnati within Hamilton County, St. Cecilia School serves approximately 250 students in Pre-K through 8th grade and employs 28 faculty and staff members. The school deployed ZeroEyes as part of its continuing commitment to maintaining a safe, welcoming learning environment. Intelligent situational awareness “The safety of our students is always at the forefront of what we do,” said David Lewis, Teacher and Student Resource Officer at St. Cecilia School and a retired police officer with 30 years of service. “I’ve seen ZeroEyes in action, and I believe it will save time and save lives. When I’m teaching, it’s hard to focus on security, so this technology gives me real-time intelligence to respond quickly. It’s a powerful supplement to our existing security measures, and you can’t put a price on student safety.” ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operations centre staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Real-time intelligence If the threat is determined to be valid, alerts and actionable intelligence — including visual description, gun type, and last known location — are dispatched to law enforcement and school officials as quickly as 3 to 5 seconds from detection. “St. Cecilia School has taken a thoughtful and proactive approach to campus safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By building upon existing security measures and empowering staff with real-time intelligence, the school is demonstrating its strong commitment to protecting students and faculty while preserving the close-knit culture that defines its community.”
The Community Builders (TCB) is a nonprofit organisation whose mission is to build and sustain strong communities where all people can thrive. They work with businesses, institutions, and public officials to revitalise neighborhoods in ways where all people can live in healthy homes with equitable access to resources and opportunities to pursue their dreams. Their partnership with Salient Systems exemplifies the use of video technology in vulnerable neighborhoods to help achieve these goals. Challenge TCB operates and manages 150 sites and properties across the country, employing over 600 staff members. These locations range from campus environments to individual buildings, each presenting unique security challenges to ensure overall resident safety. The primary focus for implementing a video management system is not only to ensure safety and security but also prevent property maintenance issues. Under Joe Giggey’s leadership as senior director of Information Technology, TCB established enterprise- level security standards. These standards enabled access to video remotely through smartphones, iPads, and laptops for a central team of sites in 30 cities. Additionally, seamless integration with existing cameras and access control systems was required, considering TCB’s extensive network of 30+ access control systems and about 6,800 different camera models. Affordability was another crucial factor, as is often the case for nonprofit organisations. Having an easy-to-administer VMS, reliable search and video export functionalities, scalability for future property acquisitions, and centralised management in a distributed environment were also significant requirements. Solution Salient’s CompleteView VMS met all the specified criteria, marking the beginning of the partnership between TCB and Salient in 2016. The deployment of CompleteView has grown to 85 site recording servers and over 2,300 camera licenses. Given the widespread nature of TCB’s properties, certified regionalised integrators have been selected to install CompleteView across TCB locations. These integrators have been trained and received certification from Salient Systems professional trainers on installation, executing upgrades, expanding systems, and customising the deployment ensuring effective implementation and ongoing support. In addition, manufacturer support by Salient’s own System Engineering team has been utilised and according to TCB personnel, “has been phenomenal.” Results TCB staff help address complaints, educate residents on lease rules, and avoid evictions. Salient’s CompleteView has assisted in resolving disputes, and investigating incidents. In addition, the ability to verify details of incidents in progress helps pinpoint the location and gives first responders details about the situation they may face on arrival. Video footage provided by Salient’s VMS, CompleteView has proven invaluable in multiple instances and according to Giggey “The VMS paid for itself immediately, highlighting the effectiveness and value of this partnership.” The collaboration between TCB and Salient Systems has become an exemplar of how technology can be harnessed for the greater good, building trust and effecting positive changes in vulnerable neighborhoods. With ongoing support from Salient Systems, TCB is committed to making a lasting impact and ensuring strong communities where all people can thrive.
In alignment with the State of Mississippi’s mission of “Empowering Mississippi citizens to stay connected andengaged with their government,” Salient's CompleteView Video Management System (VMS) is being installedthroughout more than 150 state boards, commissions, and agencies in order to ensure safety for thousands ofconstituents who access state services daily. Challenge Determining the right path to success wasn’t a quick process. The elaborate undertaking of converting all State of Mississippi buildings from its legacy video system, which included analog cameras across a disparate video platform, to match their standard of excellence took a lot of planning. This involved researching and interviewing multiple manufacturers of IP cameras and video management systems. The plan was strategic, as it was important to State officials to find an open architecture solution that could utilise as much existing technology as possible, thereby preserving current taxpayer investment. Solution After a thorough evaluation, the decision came down to three competitive VMSs, all based on total cost-of ownership, scalability requirements, software performance capabilities, along with support assessments. Salient’s CompleteView was ultimately determined the top choice. “In the selection process, three VMS manufacturers were deemed a reasonable fit. The choice of CompleteView over these competitors came down to one critical component, partnership. The culture at Salient embodies an unmatched support you don’t typically see in an industry leader. Their greatest value-add is that open line of communication between the RSM, technical support, and engineering. If I need something, I know I can pick up the phone and get immediate assistance” said Mike Cooper with MS Department of Public Safety. Once CompleteView was selected, another strategic decision was made to have personnel from The Statehandle the design and installation of CompleteView internally rather than engage outside consulting. This hasproved to be an effective option, allowing them to tailor each installation to suit individual property needs. TheState works through the channel for procurement, then handles all programming and administration internally.This offers them the most flexibility while still achieving uniformity across each deployment as well as completecontrol of the process. Result The conversion to CompleteView is underway and will take approximately 3-5 years to complete. The State now benefits from a centralised platform that allows for greater administrative control, as well as a product that meets the State of Mississippi standard for NDAA compliance. According to Cooper, “we now have a platform that is easily managed and visibly organised in an efficient manner. We also appreciate having a system that’s permission based with tighter controls.” Finally, The State’s technical team is committed to keeping the system updated as Salient releases newer versions of its software each quarter. These upgrades ensure they are taking advantage of all security enhancements and feature improvements that CompleteView has to offer. The State has also planned integration of its access control system, Open Options, with CompleteView, tying video directly to specific door openings. This gives State personnel an enhanced view into their security operations, with quick and easy auditing of badge events through a single interface. Further initiatives will explore the addition of AI video analytics to add weapons detection, appearance search, and cross-camera tracking — all to help speed up investigations. Salient’s open platform makes these integrations possible. Staying present on these new releases and innovative integrations ensures an advanced level of protection from potential threats and works to achieve the ultimate end game – keeping community members safe.
Willis Tower, an iconic symbol in Chicago for over 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009. Major renovations took place in 2017, culminating in a complete transformation in 2022. Currnetly, Willis Tower offers a range of amenities from short-term workstations to traditional leases, as well as dining, retail, and entertainment spaces. The Skydeck on the 103rd floor, 1,353 feet above street level, provides breathtaking views of up to 50 miles across four states, attracting millions of visitors annually. Challenge As part of Willis Tower’s transformation, the structural separations between the office and Skydeck areas were eliminated, creating a more open and accessible space for visitors and tenants. Recognising the need for a customised strategic security plan, Director of Security Keith Kambic, CPP, spearheaded efforts to find the right partners to ensure the safety and security of tenants, visitors, and employees. Kambic’s first step was to engage with the national security and technology consulting firm Guidepost Solutions. The next priority was to establish a strong partnership with a Chicago-based integration partner and to identify the best security solutions in the market. Kambic chose 4S Security as the integration partner because of their holistic approach to achieving optimal results. The partnership with 4S Security elevated the security measures at Willis Tower to new heights. “We are different than the average integrator,” said Leor Elfassy, Director of Business Development at 4S. “We have software developers on staff who write integrations, and as a matter of business principle for the last 30 years, we only work with software manufacturers that allow us to do so.” Solution The upgrade to Willis Tower involved retrofitting the access control system to a cloud-based solution and the new Video Management System (VMS), Salient CompleteView, was selected based on its ability to integrate seamlessly with the access control platform. “In the end the client wants a single pane of glass that they can work from and Salient’s CompleteView is well-designed to let integrators bring their vision to life,” continued Elfassy. Salient’s open architecture was an essential factor in the decision, along with product features like Dynamic Resolution Scaling (DRS), a powerful bandwidth management tool, and agnostic integration to analytic platforms for future system enhancements. Specific features like snapshot and CompleteView’s interactive mapping feature were also important selection factors. While all of these product capabilities are important, in the end it came down to the personal attention of Salient team members – from the President to the system engineer – and their efforts to go above and beyond in every way. Salient’s dedication to working cohesively with the Willis Tower and 4S teams created an effective partnership that propelled the project forward. Kambic said, “when we selected Salient, we did so not only for their product, but because we could tell that both of our companies were cut from the same cloth – great service, and great people.” Both Salient and 4S provided learning tools prior to implementation to ensure a seamless transition to the new VMS for the Willis Tower security team. 4S created customised training videos and pamphlets and held onsite training sessions, while Salient educated the security team through its YouTube training videos. Results The result of the partnership between 4S and Salient was a 40% reduction in bandwidth usage across the Willis Tower network. In addition, the integrated system provided immediate awareness of events such as forced-open doors, tailgating, and panic alarms. Ongoing top-notch local support from both Salient and 4S ensures smooth and timely software release updates and exploration of new technological capabilities, advancing video surveillance through CompleteView. Pleased with the results, the Willis Tower team attests to the success of the partnership, efficacy of Salient’s product, andoutstanding level of service from Salient both before and after the sale.