Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
Deep Sentinel, the pioneer in AI-powered proactive video surveillance with real-time human intervention, now announced the launch of its Mobile Monitoring Trailer — a fully mobile, solar-powered security platform that delivers instant access to Deep Sentinel’s remote live guard monitoring anywhere, including places where power and permanent infrastructure are unavailable. Purpose-built for high-value outdoor environments, such as auto and parking lots, construction sites, industrial sites, and other remote locations, the Mobile Monitoring Trailer extends Deep Sentinel’s industry-defining real-time protection to the hardest-to-secure environments. With elevated wide-area visibility, edge AI processing, and guards who intervene within seconds, the solution transforms outdoor security from passive recording into active crime prevention. Ultra-responsive security surveillance “Customers have told us for years: ‘We need Deep Sentinel’s ultra-responsive security surveillance in places where we can’t install cameras or run power.’ This trailer is our answer,” said Founder and CEO, David Selinger at Deep Sentinel. “It delivers the full Deep Sentinel experience, real-time monitoring, human verification, and immediate intervention in a format that can be deployed anywhere in minutes. In short, if a threat can reach the site, Deep Sentinel can stop that threat.” Gen V Deep Sentinel Hub and integrated cellular connectivity Built for reliability and response speed in demanding outdoor environments, the system’s enterprise-grade hardware includes a Gen V Deep Sentinel Hub, four wide-area cameras, a PTZ camera for alignment and tuning, dual solar panels, an 800Ah battery system, and integrated cellular connectivity. The system operates autonomously with minimal maintenance and requires no wiring, trenching, generators, or onsite power. Key differentiators of the Deep Sentinel Mobile Monitoring Trailer Key differentiators of the Deep Sentinel Mobile Monitoring Trailer include: Real-time guard intervention: Trained guards speak through the trailer’s two-way audio to deter intruders, escalate threats, or contact emergency services as needed within 30 seconds or less, stopping crime before loss or damage occurs. Unlike other mobile surveillance competitors, Deep Sentinel publishes clear service-level agreements that outline guard response times. Operational-grade reliability: Built for continuous, high-demand use with SLA-backed performance, far more robust than traditional rental-style surveillance units. Edge AI + elevated visibility: Mast-mounted cameras and on-board AI work together to reduce false alarms, accelerate response, and deliver wide-area situational awareness. $0 upfront costs for customers and dealers: Deep Sentinel has integrated financing covering the full cost of the trailer and all of the attached equipment creating a simple pricing structure, no third-party financing. Nationwide distribution: Leveraging Deep Sentinel’s nationwide distribution partners, the Deep Sentinel Mobile Monitoring Trailer can be delivered, installed and live within days virtually anywhere in the U.S. Designed for reliability within a range of climates: A separate cold-weather model supports deployments in regions with average temperatures below 40ºF, ensuring consistent performance in harsh winter environments. This is ideal for sites such as: Construction sites and material yards Industrial yards and remote lots Auto dealerships and parking lots Utility, energy, and infrastructure projects Retail and multitenant commercial properties Critical infrastructure sites, including bridges, dams, and similar properties Deep Sentinel’s Mobile Monitoring Trailer "Most surveillance trailers watch crime happen. Ours stops it,” added Selinger. “By combining mobility, solar power, and human intervention, we’re giving businesses the ability to secure valuable assets anywhere, without infrastructure, hassle, or compromise.” “Sites without infrastructure have always been some of the hardest environments to secure,” said Jack Azbill, CEO of Varitec Systems Inc, a Deep Sentinel dealer. “Deep Sentinel’s new trailer finally gives us a way to deliver real-time deterrence where traditional systems fall short. It’s a powerful addition to our toolkit.” The Mobile Monitoring Trailer is available exclusively through Deep Sentinel partners and includes hardware, monitoring, connectivity, and system maintenance in a simple monthly subscription.
AI is one of the fastest-growing technologies in the history of modern business, with the ability to revolutionise industries, optimise operations, and drive innovation, but it is also introducing security gaps, risks, and vulnerabilities. According to McKinsey, 78% of organisations are using AI in at least one business function, up from 55% two years ago. As a result, 73% of them are investing in AI-specific security tools, either with new or existing budgets, according to the 2025 Thales Data Threat Report. Thales is introducing the first foundational capabilities of its AI Security Fabric to protect the core and edge of enterprises' AI ecosystems. Thales AI security fabric–LLM-powered apps, data, and identities With Thales AI Security Fabric, organisations will be able to: Unlock AI-driven growth securely: Maximise AI’s business value by enabling innovation and expansion while mitigating risks such as prompt injection, data leakage, model manipulation, and exposure of sensitive or regulated data. Protect data, applications, and identities end-to-end: Provide Agentic AI and GenAI with controlled dataset access, deploy runtime security across cloud and on-premises environments, and safeguard all AI interactions with minimal integration effort. Rely on enterprise-grade, standards-aligned protection: Leverage proven security capabilities that directly address the most critical OWASP Top 10 risks and prevent costly or reputation-damaging incidents before they impact the organisation. The first capabilities available now are: AI Application Security: a security solution designed to protect homegrown applications that use LLMs. Providing real-time protection for AI-specific threats, including prompt injection, jailbreaking, system prompt leakage, model denial-of-service attacks, sensitive information leakage, and content moderation. With flexible and seamless deployment options to fit any architecture, whether cloud-native, on-premises, or hybrid environments. AI Retrieval-Augmented Generation (RAG) Security: provides the capability to discover and secure sensitive structured and unstructured enterprise data before it is ingested into retrieval-augmented applications with comprehensive data protection solutions, including encryption and key management. Helps secure communication between the LLM and external sources of data. Agentic AI and Gen AI applications “As AI reshapes business operations, organisations require security solutions tailored to the specific risks posed by Agentic AI and Gen AI applications,” Sebastien Cano, Senior Vice President of Thales’ Cyber Security Products Business, said. “Thales AI Security Fabric offers enterprises specialised tools to secure AI applications while minimising operational complexity. Supported by decades of security expertise, Thales enables businesses to confidently scale their AI adoption, safeguarding sensitive data, applications, and user interactions.” AI Security Fabric in 2026 Thales plans to expand its AI Security Fabric in 2026 with new runtime security capabilities, including data leakage prevention, a Model Context Protocol (MCP) security gateway, and end-to-end runtime access control. These features will strengthen protection across data flows, secure agentic AI data access, and ensure unified, compliant management of interactions between users, models, and data sources. See more information or get trials and access to some of these tools at the Thales AI Security Fabric Website.
Alcatraz, the pioneer in facial biometric authentication for physical access, now announced the successful completion of its SOC 2 examination as of November 7, 2025. The independent audit was conducted by A-LIGN, the pioneering provider in cybersecurity compliance trusted by more than 4,000 global organisations. Biometric access with confidence “Trust in biometric systems depends on strong data stewardship,” said Tina D’Agostin, CEO of Alcatraz. “At Alcatraz, we work with some of the world’s most sensitive data and environments, and it’s a responsibility that we take seriously." "Our platform is purpose-built with privacy at its core so customers can deploy biometric access with confidence across their most critical environments. Privacy guides how every identity experience is designed, operated and secured.” SOC 2 examination Established by the American Institute of Certified Public Accountants (AICPA), the SOC 2 examination is designed for organisations of any size, regardless of industry and scope, to ensure the personal assets of their potential and existing customers are protected. SOC 2 reports are recognised globally and affirm that a company’s infrastructure, software, people, data, policies, procedures and operations have been formally reviewed. AI-powered facial authentication technology Alcatraz leverages AI-powered facial authentication technology to enable private, secure and seamless entry across highly sensitive environments. Its solution, the Rock X, is deployed across Fortune 100 campuses, AI data centres, financial institutions, stadiums and government facilities, where precision, compliance and trust matter most. The technology is designed with privacy at its core, incorporating opt-in enrollment, encrypted biometric templates and detailed audit reports to support compliance with major data protection frameworks, including the GDPR, CCPA, CPRA and BIPA. Alcatraz’s continued commitment “Congratulations to Alcatraz for completing their SOC 2 audit, a widely recognised signal of trust and security," said Steve Simmons, COO of A-LIGN. "It's great to work with organisations like Alcatraz, who understand the value of expertise in driving an efficient audit and the importance of a high-quality final report." This attestation reinforces Alcatraz’s continued commitment to compliance and ensures customers with the confidence that required safeguards are in place to protect their data.
WatchGuard® Technologies now announced that its endpoint security solution delivered outstanding performance in the latest MITRE ATT&CK® Enterprise Round 7 (ER7) Evaluation. The results highlight WatchGuard’s ability to combine strong threat prevention with low-noise detection, giving Managed Service Providers (MSPs) a reliable and efficient way to deliver high-quality security services at scale. WatchGuard’s commitment In the Windows “Hermes” scenario, WatchGuard achieved comprehensive detection and flawless prevention across the evaluated adversary techniques while maintaining exceptionally low alert volume, no blocked legitimate processes, and minimal operational friction. These independently validated results reinforce WatchGuard’s commitment to predictable security outcomes that strengthen partner service delivery and drive real-world value. Security teams and MSPs need protection “Security teams and MSPs need protection that works without slowing down their business,” said Andrew Young, chief product officer and senior vice president of product management at WatchGuard Technologies. “These results prove that full protection doesn’t require more workload. With WatchGuard, you get fewer alerts, fewer manual interventions, and faster response times, which is exactly what our partners count on to deliver reliable and scalable security services.” MITRE ATT&CK evaluation The MITRE ATT&CK evaluation showed that WatchGuard detected and blocked every malicious step tested, surfacing only the most actionable insights. Across two full attack paths, WatchGuard generated just three high-fidelity alerts, helping MSPs reduce noise, streamline investigations, and strengthen service delivery. Key results from the evaluation 100% Attack Visibility 100% step detection across the entire evaluation1 96% sub-step detection2 (27/28 covered) 100% Threat Prevention 100% prevention of all malicious actions3 Zero Operational Friction Zero legitimate activity blocked Only three high-fidelity alerts Real-world benefits These outcomes demonstrate that WatchGuard delivers full attack-path visibility and dependable protection without generating alert storms, blocked false positives, or customer-impacting disruptions common with many security tools. This combination of proven security efficacy and low operational burden strongly differentiates WatchGuard in the endpoint security market. For MSPs, the real-world benefits include stronger customer outcomes, fewer unnecessary escalations, faster response cycles, and more efficient use of analyst resources. WatchGuard’s Unified Security Platform® architecture "We’ve relied on WatchGuard’s endpoint security for years," said Neil Holme, founder and CEO of Impact Business Technology, a WatchGuard MSP. "MITRE ER7 simply confirms what we already knew: WatchGuard turns EDR from reactive to proactive. Anything unknown is untrusted. Every alert comes with the confidence that the response has already been initiated. No guesswork. Just better protection.” Empowered with WatchGuard’s Unified Security Platform® architecture, the MITRE ER7 performance underscores how WatchGuard enables partners to scale services while reducing complexity and increasing profitability. MITRE ATT&CK® ER7 Evaluation For more information on WatchGuard’s performance in the MITRE ATT&CK® ER7 Evaluation, visit WatchGuard’s MITRE ER7 results page. Result from MITRE Detections Evaluation for both the initial and configuration change runs in the Windows scenario Result from MITRE Detections Evaluation for the run with configuration changes in the Windows scenario Result from the MITRE Protection Evaluation
Access control applications
EnGenius Technologies Inc., a pioneer in advanced connectivity and cloud-managed networking solutions, today announced that Crossroads Church in Rowlett, Texas, has completed a comprehensive security and network modernisation project using EnGenius AI cameras, multigigabit switches, and Wi-Fi 7 access points. The upgrade delivers complete visibility across the church’s 30,000-square-foot facility and 15-acre campus, providing staff, volunteers, and families with unprecedented peace of mind. Rapid growth drives need for enhanced safety Serving more than 1,200 members and hosting daily activities including worship services, youth programs, daycare, and community outreach, Crossroads Church faced increasing challenges with its aging surveillance system. The church’s legacy NVR-based surveillance system left numerous blind spots and lacked the clarity, storage, and analytics needed to support a large, active campus. “With ministry happening every day and families trusting us with their children, we needed to be sure we could clearly monitor every part of our campus,” said the church’s Executive Pastor. “Our previous system simply couldn’t keep up.” A unified EnGenius solution Crossroads Church partnered with Smart Technology Solutions to implement a full-scale modernisation built on EnGenius cloud-managed technology. The deployment includes: 57 EnGenius ECC100 AI surveillance cameras for complete indoor, outdoor, and parking-lot coverage Multi-gig EnGenius ECS2552FP and ECS2528FP switches supporting high-capacity video, livestreaming, and campus-wide traffic 12 EnGenius ECW536 Wi-Fi 7 access points providing fast and reliable wireless connectivity for staff, classrooms, and production teams A single-pane-of-glass cloud dashboard delivering centralised management, real-time monitoring, and instant event review “For the first time, we have total visibility,” said the Lead Pastor. “If something happens anywhere on our property, we can see it, isolate it, and respond immediately. That level of clarity is invaluable.” AI features unlock the future of campus security The church has begun using contextual AI analytics, including event detection, vehicle tracking, and customisable alerts. Over time, leadership plans to expand their use of EnGenius AI capabilities to detect human activity, interpret complex scenarios, analyse movement trends, and enhance after-hours oversight — further improving campus safety. Meet the AI that turns video into insight Ever spent hours scrubbing through video just to find one five-second moment? With EnGenius Cloud AI, those days are over. It eliminates the biggest headaches of traditional surveillance—false alerts, slow investigations, and endless manual review—by delivering real-time intelligence and natural language search. Instead of generic motion notifications, the system interprets what it sees, recognising behaviours with context so the team receives fewer false alarms and earlier warnings when something seems off. And when it’s time to find footage, there’s no need to dig through timelines—simply enter a description like “person in a red hoodie with a black backpack,” and the system instantly retrieves the precise clips from any camera or location. This smarter, context-aware approach helps staff work faster, respond with confidence, and stay focused on what matters most. More than a camera system, it’s a smart security assistant that makes investigations faster, simpler, and far more effective. Key camera features 5MP HDR Clarity: Sony Starvis sensor ensures clear day-and-night visuals. Ultra-Wide Coverage: 132° view and 20m IR distance for versatile environments. 8GB eMMC Flash Storage + 4GB DDR4 Memory: Delivers reliable onboard flash storage and efficient multitasking for smooth, stable performance. Built-in Storage, No NVR Needed: ECC100 includes 256GB of reliable onboard storage, supporting continuous and event recording 24/7 for immediate footage access. Durable Build: IP67 weatherproof and IK10 vandal-resistant design. Cloud Access & Mobile Monitoring: Manage cameras anytime, anywhere. The next era of intelligent surveillance With the launch of its AI Cloud Surveillance Solution and ECC100 AI Camera, EnGenius once again sets a new benchmark for intelligent security—empowering businesses to stay one step ahead with smarter, faster, and more reliable protection. “What truly sets our system apart is its ability to analyse contextual sequences rather than just single-frame images, enabling preventive alerts before incidents occur,” said Roger Liu, Executive Vice President at EnGenius Technologies. “Whether it’s spotting loitering before theft, flagging escalating conflicts, or identifying fatigued workers on a factory floor, our system helps businesses act before incidents escalate.” Availability The ECC100 is available from EnGenius authorised resellers and distribution partners.
VIVOTEK, the pioneering security solution provider, actively integrates corporate social responsibility into its operations. This year marks the fifth “Safety Map” corporate sustainability event. For the first time, the team extended its efforts beyond urban communities to the natural environment of Zhonggua River in Guoxing Township, Nantou, Taiwan. Collaborating with the National Chung Hsing University’s (NCHU) University Social Responsibility (USR) team on “Environmental Resilience and Sustainability” and the precision AI agriculture partner DATAYOO, the team launched the “Zhonggua River Ecological Restoration Safety Map” project. VIVOTEK deployed its security solutions to monitor the ecosystem, successfully capturing rare footage of the endangered crab-eating mongoose in its natural habitat. Employees also helped remove invasive species, restore native plants, and construct ecological ponds, embedding sustainability into the company’s core security expertise – extending protection from human safety to habitats and biodiversity. “Returning land to the river:” Reviving the ecosystem After a typhoon in 2004, Zhonggua River’s banks were fortified with high walls and riverbed structures for flood control, which disrupted the ecosystem. Over time, cracks formed, foundations eroded, and exposed steel reinforced the risk. In 2018, Professors Chiou-Rong Sheue and Peter Chesson from NCHU’s Department of Life Sciences began living by the river and advocated a subtraction approach: dismantling walls to “return the land to the river,” balancing flood control with conservation. This effort culminated in 2023 with Taiwan’s first community-initiated river restoration project. Today, the USR team led by Professor Hsu continues ecological monitoring and habitat maintenance, while VIVOTEK contributes technology and manpower through the “Safety Map” initiative, jointly safeguarding the reborn river. Security technology supports restoration through action and care “VIVOTEK uses ‘Concern for Others’ Cares’ as a brand catalyst. During the 2010 Chile mining disaster, our cameras were deployed deep inside the mine to monitor the vital signs of trapped miners, transmitting real-time footage to rescue teams and contributing to the miraculous rescue efforts. In Parks Victoria, Australia, we applied AI solutions to observe seal habitats in Port Phillip Bay, monitoring potential threats such as fishing lines and ropes." "VIVOTEK partnered with the NCHU’s USR team to transform our original commitment to care and social safety into active conservation of the river ecosystem and wildlife, turning technology into a bridge for harmonious coexistence between humans and nature,” said Alex Liao, President of VIVOTEK. Building safe habitats, restoring nature’s vitality Under the guidance of the NCHU’s USR team, VIVOTEK employees observed aquatic insects, native plants, and changes in the river ecosystem, gaining insight into the impact of removing cement embankments on local wildlife. To accelerate ecological restoration, they split into teams to construct ecological ponds and build new homes for the Ayers’ tree frogs using bamboo tubes. At the same time, invasive plant species such as Mimosa pudica, fragrant orchids, and elephant grass were removed, while native species including reed orchids, wild peonies, honeysuckles, purple bead trees, Taiwan mountain laurels, and orange osmanthus were replanted to stabilise the soil and restore riparian vegetation. “Being able to personally contribute to ecological restoration and give back to nature is a source of pride as a VIVOTEKer,” shared Ben, an engineer who has participated in the Safety Map event for five consecutive years. Leveraging big data monitoring to deepen corporate impact “The Safety Map event has extended from neighbourhoods, care facilities, schools, and historic settlements to Zhonggua River, engaging hundreds of employees in inspecting sites and proposing safety solutions. Through these efforts, we have expanded the definition of ‘safety’ from simply protecting people to also safeguarding wildlife and habitats, revealing the multidimensional nature of security." "Moving forward, we will continue to promote cross-industry collaboration, using our security expertise as a foundation to amplify social impact and create more inclusive safety values and practices,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the CorpComm & Sustainability Office. This year, VIVOTEK further leveraged the expertise of DATAYOO, using its FarmiSpace PRO monitoring service and AI crop monitoring system to analyse various crop indices derived from satellite spectral data. These insights provide the NCHU’s USR team with a scientific basis for their ecological research at Zhonggua River, enabling a data-driven approach to natural habitat restoration and making technology a powerful tool for conservation. Industry and academia join forces to set a benchmark “VIVOTEK Proactively proposed initiatives and involving company employees in hands-on participation are the most powerful ways to implement ecological restoration. Through VIVOTEK’s security expertise, volunteer engagement, and AI-driven long-term ecological monitoring, we have accelerated the restoration of Zhonggua River’s ecosystem, allowing more people to witness the harmony between humans and nature,” said Chiou-Rong Sheue. The habitat restoration efforts have already shown tangible results, with the ecological ponds built by VIVOTEK employees quickly attracting creatures such as pond frogs, dragonflies, water striders, and damselflies. VIVOTEK has emerged as a key driver of environmental restoration through its security technology, demonstrating that safety is not only about protection but also stewardship and shared responsibility, and continues to foster a Safety Map where humans and nature coexist.
Comelit-PAC has partnered with Kings Group SW to deliver a bespoke video door entry solution at the historic Bridgwater Arts Centre, a Grade I listed building renowned for its architectural and cultural significance. Situated in the heart of Bridgwater, now owned and operated by the Town Council, the Arts Centre construction was in 1723 and established on its existing site since 1946 to run a theatre programme of performance, music and film. Enhancing video security and access To complete a renovation programme, the Arts Centre worked with Kings Group SW to upgrade its door entry system to incorporate a modular video design. “The Grade I listing of Bridgwater Arts Centre means that any changes, however minor, must be carefully planned to protect the building’s historic character,” said Scott Mason, Director of Amenities at Bridgwater Town Council. “We involved our teams in the initial design and specification process to ensure the solution could be installed to seamlessly blend with its surroundings while enhancing video security and access.” Latest security standards Kings Group SW specified Comelit-PAC’s Ultra Door Entry system, a high-definition video intercom solution designed to allow staff to monitor all entry points via high-definition video intercoms, providing real-time visibility and secure access control. Adam Pitman, Security and Life Safety Systems Supervisor at Kings Group SW, added: “Every aspect of the door entry upgrade had to be approached sensitively. This included routing cables discreetly, installation and ensuring the system met the latest security standards. By choosing Comelit-PAC’s modular system, this could be achieved with minimal disruption to the building’s historic fabric while providing a flexible solution that can be adapted as the Centre’s security needs evolve.” Configuration of the door entry solution The Ultra system was selected because its modular design enabled a simple configuration of the door entry solution to meet the specific requirements of the Arts Centre. Its 2-Wire and ViP door stations allow a combination of audio, video, and button modules in a compact layout, giving the team flexibility to adapt the system to access points. Tony Berry, Business Development Manager at Comelit-PAC, concluded: “Working closely with Kings Group SW and Bridgwater Arts Centre early on allowed us to tailor the solution specifically for this site. By understanding the needs of the team and how the building operates, we were able to deliver a system that functions seamlessly for staff, visitors and performers while integrating thoughtfully into the historic environment.”
Xtract One Technologies announced its SmartGateway has been selected by Nova Scotia Health to strengthen security measures and provide AI-powered weapons detection across facilities province-wide, with an initial order of 25 systems. Nova Scotia Health, in tandem with its nurses’ union, is working to modernise and strengthen security across its facilities to ensure a safe environment for all patients, visitors, and staff. Adopting and deploying advanced technologies like SmartGateway is an important step toward achieving that goal. Safe and secure health care By helping to limit the number of potentially dangerous items entering their hospitals, this technology supports its commitment to providing safe and secure health care. Xtract One was selected for its proven efficacy to accurately detect knives, a top priority for the organisation. Previously tested in Truro, Nova Scotia, over a 12-day trial period, SmartGateway successfully scanned 7,400 individuals entering the facility and detected 49 prohibited items during that period, mostly pocket knives and box cutters. Deploying SmartGateway “Violence against healthcare workers is a challenge that persists and demands addressing. By deploying SmartGateway, Nova Scotia Health is setting an important example for what it means to take meaningful action to protect frontline healthcare workers, patients, and visitors,” said Peter Evans, CEO of Xtract One. “This installation marks another key step in our expanding work with Canadian healthcare organisations, having deployed in Manitoba earlier this year. We look forward to continuing to deliver effective threat detection as more providers take proactive measures to prioritise security and peace of mind for their teams.” Overall approach to security “Our goal is to deliver first class healthcare, and ensuring the safety of all who enter our facilities is a critical step in providing that service,” said Dean Stienburg, Director of Security for Nova Scotia Health. “With SmartGateway, we’re making tangible strides in bolstering our overall approach to security. We were impressed by the system’s effectiveness during the trial period and are looking forward to the deployment helping us mitigate and respond to the threats of today’s environment.” Maximising security screening outcomes SmartGateway delivers fast, discreet, and accurate individual screening, utilising AI-powered sensors to unobtrusively scan for weapons and other prohibited items upon entry. This technology replaces intimidating, traditional metal detectors and mitigates the need for individuals to remove personal items. This prioritises individual privacy and comfort, all while maximising security screening outcomes. SmartGateway is designed to enable seamless passage through checkpoints and promote the uninterrupted flow of movement.