Mobile Access Trends

Beyond technology exuberance, ISC West 2025 also embraces the practical
Beyond technology exuberance, ISC West 2025 also embraces the practical

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre.  Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials  Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation.  “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.”  What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement.  Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

What are the most promising new technologies in security?
What are the most promising new technologies in security?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?   

2025 Access Control Solutions: Key trends & Innovations
2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations.  Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities.  2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.

Latest Access control news

Johnson Controls' Metasys 14.1: Cutting-edge BAS
Johnson Controls' Metasys 14.1: Cutting-edge BAS

An upgrade to the Johnson Controls flagship building automation system (BAS), Metasys 14.1 offers a suite of new and enhanced features that answers the need for more comprehensive energy management. The BAS, which combines HVAC, fire, security and lighting systems into one, seamless platform, allows facility managers, IT teams and decision makers to optimise operations, fortify cybersecurity, advance energy and emissions goals, boost productivity and strategically modernise facilities. Building automation system “Metasys is the pioneering-edge building automation system in the industry for many reasons. With 14.1, we’ve continued our innovation of the Metasys User Interface to focus on spaces and equipment with an emphasis on data visualisation that gives users a direct line of sight into energy management." "The enhancements to BACnet Advanced Workstation, as well as expanded architectural flexibility, sets Metasys apart by meeting the global market demand for a regulatory-compliant BAS that delivers enhanced building management together with operational efficiency,” said Kaishi Zhang, Vice President of Global Product Management, Building Automation Systems and Controls at Johnson Controls. Energy management capabilities Metasys 14.1 significantly improves energy control abilities with a growth of the renowned Metasys UI Metasys 14.1 significantly improves energy management capabilities with an expansion of the renowned Metasys User Interface (UI). Energy Dashboard and Reporting (EDR), which replaces Energy Essentials, visualises and contextualises energy usage as it relates to equipment and spaces. EDR supports a broader range of energy types, including electricity, natural gas, steam and chilled and heated water, and makes it easier to track usage and consumption for actionable insights.   Metasys UI enhancements Additional Metasys UI enhancements include: Mean kinetic temperature (MKT) calculation and reporting to maintain optimal product quality and ensure compliance in temperature-sensitive environments Spaces Manager for Metasys UI allows users to adapt to changes with capability to easily add/edit/delete spaces via browser Electric demand monitoring (EDM), visible in Metasys UI, monitors and forecasts demand, helping execute contracts with electric companies Advanced capabilities of Metasys Ghelamco, an international real estate investor and developer responsible for The Wings, a triple-certified, state-of-the-art and first-of-its-kind modern office complex praised for its sustainable design and energy-neutral status, utilises Metasys.  “Together with Johnson Controls and our contractor SPIE, we are enabling an excellent, vibrant and versatile working environment and enhanced wellbeing for our tenants at all times. Leveraging the advanced capabilities of Metasys, including its robust EDR functionality and built-in cybersecurity features, we are able to achieve this while reducing energy usage and keeping emissions to an absolute minimum,” said Tim Van de Voorde, Project Manager at Ghelamco.  Performance on ADS systems With system and architectural flexibility, Metasys 14.1 has grown deployment options to suit various active needs With system and architectural flexibility, Metasys 14.1 has expanded deployment options to suit various operational needs. This version allows for both Microsoft and Linux operating systems to help process data quickly, improving performance on ADS systems with multiple users and giving users more visibility into the Linux OS.  Metasys 14.1 is the first version to exclusively use Metasys UI, since the legacy Site Management Portal (SMP) has officially been discontinued. Legacy GGT and UGT graphics continue to function in Metasys UI.  Enhancements of Metasys 14.1  Metasys 14.1 has earned BACnet Advanced Operator Workstation (B-AWS), the highest level among BACnet operator workstation certifications. This enhancement provides:  Comprehensive system configuration and commissioning: Discover and integrate all BACnet devices while simplifying configuration and commissioning  Support for a wide range of BACnet objects: View and modify all standard BACnet properties in most general-purpose BACnet objects for comprehensive oversight. Electric demand monitoring (EDM), visible in Metasys UI, monitors and forecasts demand, helping execute contracts with electric companies Enhanced alarms and events management: View, manage and adjust BACnet alarms and events as well as access detailed summaries for proactive management Advanced scheduling and trending capabilities: Access complex scheduling and trending for precise control over building systems and in-depth analysis of performance over time Extensive device and network management: Manage devices and networks more comprehensively  Like Metasys 14, this version harmonises capabilities with the Metasys engine at the server level. This allows users to seamlessly integrate devices over various IP protocols with the Metasys server, making expansion easier and more cost-effective. 

Unveiling TLS exploit: Keysight leads security innovation
Unveiling TLS exploit: Keysight leads security innovation

Keysight’s Application and Threat Intelligence (ATI) research team has uncovered a novel Transport Layer Security (TLS) handshake exploit that uses protocol-compliant behaviour to evade traditional network defenses. This newly discovered covert channel allows attackers to manipulate TLS handshake packets by simply rearranging parameter settings, without injecting malicious code, making detection by firewalls and intrusion prevention systems nearly impossible. By leveraging the flexible, permutation-friendly structure of TLS Client Hello packets, attackers can exfiltrate data or establish command and control (C2) communications, all while remaining invisible to most security tools. Exploiting encryption protocols like TLS Adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS This finding highlights how adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS. “The discovery of this novel covert channel that leverages legitimate TLS protocol behaviours for malicious purposes is a game changer,” said Ram Periakaruppan, Vice President and General Manager of Network Test & Security Solutions at Keysight.   “It helps shift the balance of power back to cyber-defenders.” Robust testing The average breach costs $4.88 million and takes over 250 days to contain The prevalence of TLS encryption in nearly every internet-connected system makes this exploit especially dangerous. According to IBM’s 2024 Cost of a Data Breach Report, the average breach costs $4.88 million and takes over 250 days to contain, amplifying the need for early detection and robust testing. This isn’t just another update, it’s a vital breakthrough. At the recent Silicon Valley Cybersecurity Conference, Keysight presented its findings, offering the first opportunity for the security community to learn about this previously unknown class of threats. The presentation earned the Best Paper Award, underscoring its significance as a major advancement in cybersecurity research. Security innovation With this discovery, Keysight continues to lead the charge in security innovation, helping enterprises, service providers, and network equipment manufacturers confidently validate that their infrastructure is protected against even the most evasive and cutting-edge threats. To help organisations proactively mitigate this unprecedented threat, Keysight has integrated the TLS covert channel exploit into the latest ATI update of its network application and security test solutions. This enables organisations to: Emulate the TLS exploit in a controlled lab environment Validate whether their defenses can detect and block the attack Measure performance impacts of mitigation strategies, before deploying them in production “Cybersecurity is a constant race to stop new and emerging attacks while also maintaining the network performance that users demand,” said Periakaruppan. “Our ATI research team worked tirelessly to uncover this covert exploit. By quickly integrating it into our products, we are empowering our customers to proactively test their systems’ ability to both defend against this threat, and maintain system performance, before attackers can gain widespread traction.” 

Elite's growth with CIVC: Remote video guarding innovator
Elite's growth with CIVC: Remote video guarding innovator

Elite Interactive Solutions, the industry pioneer in remote video guarding and real-time crime prevention, is excited to announce an investment from Chicago-based private equity firm CIVC Partners. The transaction, coordinated by security-sector investment bank Barnes Associates, marks a pivotal moment in the evolution of both Elite and the broader remote guarding industry. Category of proactive security “This is a defining moment not just for Elite, but for the entire category of proactive security,” said Aria Kozak, founder of Elite and a 2024 inductee into the Security Industry Hall of Fame. “After an exhaustive process, CIVC emerged as the ideal partner to help us scale our vision. This strategic investment enables us to fully capitalise on our unmatched ability to prevent crime, drive apprehensions, and deliver industry-pioneering customer retention.” Elite’s growth trajectory Elite is widely recognised as the category pioneer in remote guarding, delivering a proven solution Founded in 2007, Elite is widely recognised as the category pioneer in remote guarding, delivering a proven solution that consistently outperforms traditional guard services at a fraction of the cost. With a nationwide footprint across retail, multifamily, automotive, industrial, and campus markets — and an enterprise-focused client base — Elite is the first security firm to eliminate false alarms at scale and maintains a Law Enforcement Advisory Board made up of former police chiefs. CIVC Partners, which has deployed more than $2.9 billion of capital across 88 platform investments since 1989, will provide both capital and strategic guidance to further accelerate Elite’s growth trajectory. Houlihan Lokey advised CIVC on the transaction. Crime and ineffective security measures “This is a milestone deal for the industry and a transformational opportunity for Elite,” said Michael Zatulov, who has been promoted to CEO as part of the growth initiative. “Private businesses and public agencies are increasingly overwhelmed by crime and ineffective security measures. Elite has already proven it can deliver exceptional results at scale. With CIVC’s backing, we are poised to expand our reach, deepen our impact, and build a truly next-generation security platform.” Prior roles of Zatulov Zatulov, who joined Elite in 2017 and most recently served as president and COO, succeeds Kozak as CEO. Kozak will remain actively involved as chairman of the board. “It’s been a tremendous honour to learn from and work alongside Aria,” added Zatulov. “His legacy as a pioneer in this space is unmatched, and I’m humbled to continue the mission he started — to reimagine security as a proactive, intelligence-driven service.”

Trane wins 2025 National Preferred Partner Award
Trane wins 2025 National Preferred Partner Award

Trane® – by Trane Technologies, a climate innovator, is honoured to be named a 2025 National Preferred Partner by David Weekley Homes, one of the nation’s largest privately held home builders.  Trane is one of 12 manufacturing partners, recognised for exceeding expectations, based on the results of a comprehensive survey and evaluation process by David Weekley Homes team members. This is Trane’s 14th year receiving the award, presented annually since 2005. Strategic approach to mutual growth “Recognition from the David Weekley Homes team is meaningful because it reflects our strategic approach to mutual growth,” says Brad Trevillian, vice president of sales, residential HVAC, Trane. “Serving the residential new construction market is an exciting opportunity for us to innovate and deliver exceptional experiences for our valued partners by providing systems and technologies that deliver comfort and efficiency for their homeowners.” Home builder’s supplier evaluation The award recognises field and manufacturing partners who consistently operate at world-class levels The award recognises field and manufacturing partners who consistently operate at world-class levels, as determined through the home builder’s supplier evaluation.  This comprehensive process, anchored by the National Preferred Trading Partner Survey, evaluates companies in the areas of quality and customer service. High-quality products and services “At David Weekley Homes, we’re grateful to have incredible National Preferred Partners, like Trane, who consistently exceed expectations,” said John Schiegg, Vice President of Purchasing and Supply Chain Services for David Weekley Homes. “With these valued partners providing high-quality products and services, we’re able to deliver on our brand promise to provide the best in design, choice and service to our customers.” National Preferred Partner Survey The National Preferred Partner Survey asks David Weekley Homes team members to evaluate their current partners, rating their performance with two questions on a 1-to-5 scale. Those with the highest scores out of the 118 partners surveyed are presented with the prestigious National Preferred Partners Award, with only 20 percent achieving the designation in 2025. HVAC products and customer service “It’s an honour to again be recognised by David Weekley Homes with this prestigious award, which reflects our deep commitment to providing exceptional HVAC products and customer service in support of our home builder partners and their homeowners,” said Andy Stallworth, manager for strategic relationships for Trane’s residential HVAC business.

Access control applications

ASSA ABLOY enhances security with HID IoT solutions
ASSA ABLOY enhances security with HID IoT solutions

With a vast portfolio of smart locks, lock management systems, and connected readers, ensuring strong authentication, data integrity, and compliance with global regulations is essential. To meet these challenges, ASSA ABLOY is leveraging the long-time IoT expertise of HID to implement HID PKI-as-a-Service. This strategic deployment is not just about protecting millions of connected devices but also about future-proofing ASSA ABLOY’s security infrastructure for years to come. Cryptographic assurance: Securing every lock, inside and out ASSA ABLOY boosts trust in its devices, preventing unauthorised clones or counterfeit products A crucial aspect of this solution provides Genuine ASSA ABLOY products — an assurance that every smart lock, reader, and system within the network is verified as an authentic and authorised product.  By leveraging PKI-based identity verification, ASSA ABLOY strengthens trust in its devices, preventing unauthorised clones or counterfeit products from entering the ecosystem. For example, the inside of a lock can only pair with a matching outside component from ASSA ABLOY, ensuring the integrity and security of the entire system. This level of cryptographic trust not only enhances device security but also strengthens protection against counterfeit components or unauthorised modifications. Meeting stringent security and compliance needs As the industry faces increasing regulatory pressure, including the EU Cybersecurity Act and the upcoming Cyber Resilience Act, ASSA ABLOY needed a scalable, automated solution to manage over a million certificates annually. HID’s expertise in certificate management provides enhanced security, reduced complexity HID PKI-as-a-Service enables seamless device authentication, automated provisioning, and hierarchical key management, ensuring compliance with evolving security standards. An essential part of the solution is the offline Root Certificate Authority (CA), which serves as the foundation for secure operations. HID’s expertise in certificate management provides enhanced security, reduced complexity, and operational efficiency across ASSA ABLOY’s global IoT ecosystem. Driving innovation and efficiency By integrating automated bootstrapping and customised attestation certificates, the implementation has significantly improved operational efficiency while minimising manual effort. This allows devices, including those operating offline, to maintain secure provisioning and updates without requiring constant connectivity. Additionally, the system is future-ready, designed to support emerging IoT protocols such as Thread, CoAP, EDHOC, and OSCORE, ensuring adaptability as the industry evolves. Collaborative success The success of this deployment is rooted in a strong alliance between ASSA ABLOY and HID The success of this deployment is rooted in strong collaboration between ASSA ABLOY and HID. A dedicated steering group ensured alignment on global PKI policies and security objectives, leading to a smooth rollout with minimal disruption. “The implementation of HID PKI-as-a-Service wasn’t just about meeting current security requirements, it was about future-proofing our IoT ecosystem for security and scalability,” says Anders Calbom, VP & Head of Technology Solutions, ASSA ABLOY. Major milestone in IoT security   Anders Calbom added: “With the ability to manage over a million certificates annually, we’re now positioned to scale our security infrastructure alongside our business growth.” This initiative marks a major milestone in IoT security, compliance, and operational efficiency. As ASSA ABLOY continues to innovate and expand, HID PKI-as-a-Service provides the secure foundation needed to drive future growth and digital transformation.

DNAKE S617 boosts security at Centro Ilarco
DNAKE S617 boosts security at Centro Ilarco

Centro Ilarco is a state-of-the-art commercial office building in the heart of Bogotá, Colombia. Designed to accommodate three corporate towers with a total of 90 offices, this landmark structure focuses on providing innovative, secure, and seamless access experiences for its tenants. The solution As a multi-building office complex, Centro Ilarco required a robust access control system to ensure security, manage tenant entry, and streamline visitor access at every entry point. To meet these needs, the DNAKE S617 8” Facial Recognition Door Station was installed across the building. Since its implementation, Centro Ilarco has experienced a significant boost in both security and operational efficiency. Tenants now enjoy hassle-free, touchless access to their offices, while building management benefits from real-time monitoring, detailed access logs, and centralised control of all entry points. DNAKE smart intercom solution has not only enhanced security but also improved the overall tenant experience. Installed products S617 8” Facial Recognition Android Door Station Smart Pro APP

Slavija Residence security with DNAKE smart intercoms
Slavija Residence security with DNAKE smart intercoms

Slavija Residence Luxury, a premium residential complex in Novi Sad, Serbia, has implemented its security infrastructure with DNAKE’s cutting-edge smart intercom systems. The installation covers 16 high-end apartments, combining sleek design with advanced technology to enhance resident safety and access control. The solution In the connected world, modern residents prioritise both security and convenience—demanding access control that’s not just robust but also effortlessly integrated into their lifestyles. DNAKE’s smart intercom systems deliver exactly that, blending advanced protection with intuitive technology for a smarter living experience. Unmatched Security: Facial recognition, instant video verification, and encrypted access management ensure residents’ safety is never compromised. Effortless Connectivity: From HD video calls with visitors to remote door release via smartphone, DNAKE keeps residents connected and in command, anytime, anywhere. Designed for Simplicity: With an Android-powered interface, sleek indoor monitors, and the Smart Pro App, every interaction is streamlined for users of all tech levels. Installed products S617 8” Facial Recognition Android Door Station H618 10” Android 10 Indoor Monitor Smart Pro APP

DNAKE smart intercom elevates Dickensa 27 security
DNAKE smart intercom elevates Dickensa 27 security

Dickensa 27, a modern residential complex in Warsaw, Poland, sought to enhance its security, communication, and convenience for residents through advanced intercom solutions.  By implementing DNAKE’s smart intercom system, the building now features top-tier security integration, seamless communication, and an elevated user experience. With DNAKE, Dickensa 27 can offer its residents peace of mind and easy access control. DNAKE smart intercom system DNAKE smart intercom system was smoothly integrated with existing security features DNAKE smart intercom system was smoothly integrated with existing security features, providing an intuitive and reliable communication platform. Facial recognition technology and video monitoring ensure that only authorised individuals enter the building, while the easy-to-use interface helps to streamline security operations. Residents now enjoy quick, secure access to the building and can easily manage guest access remotely. List of installed products S615 4.3” Facial Recognition Android Door Station S213K SIP Video Door Station with Keypad E211 Audio Indoor Monitor 902C-A Master Station S212 One-button SIP Video Door Station H618 10.1" Android 10 Indoor Monitor E416 7" Android 10 Indoor Monitor Solution benefits Advanced security With facial recognition and video access control, Dickensa 27 is better protected, allowing residents to feel safe and secure. Convenient communication The system enables clear, direct communication between residents, building staff, and visitors, improving day-to-day interactions. Remote access control Residents can manage guest entry and access points remotely using the DNAKE Smart Pro App, providing greater flexibility and convenience.