Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

NordVPN, an innovative cybersecurity company, now includes essential identity theft recovery coverage in its cyber insurance benefits for customers in the United Kingdom. This ID theft recovery coverage complements the scam loss recovery protection that the company already offers through partnerships with select insurance providers. Cyber insurance benefits are included in the NordVPN Ultimate bundle subscription plan at no additional cost. This plan also features the NordVPN virtual private network service, the NordPass password manager, and other advanced security features. Identity theft protection NordVPN’s cyber insurance benefits for customers in the United Kingdom include ID theft recovery “Identity theft is a crime that can lead to multiple other offenses and severe financial losses, as criminals use stolen identities to commit further fraud. That’s why we are enhancing our cyber insurance benefits to bridge the cyber protection gap in the areas that matter most today and to support our customers affected by cybercriminals,” says Tomas Sinicki, managing director at NordProtect. Currently, NordVPN’s cyber insurance benefits for customers in the United Kingdom include ID theft recovery and scam loss recovery. ID theft recovery provides reimbursement for necessary legal expenses incurred while restoring a user's identity after falling victim to identity theft. It includes restoration of the user’s credit rating, e-money accounts, bank accounts, mortgages, and loans. Identity theft recovery Additionally, it ensures the removal of any civil judgments wrongfully entered against the user and helps prevent further fraudulent use of their identity. Furthermore, ID theft recovery reimburses lost income if the user has to take time off work to resolve identity theft issues. Scam loss recovery provides reimbursement when a user has transferred funds from a personal account in response to a cyber scam. This includes instances where victims are deceived into opening or responding to fraudulent emails, text messages, or phone calls that appear to be from legitimate entities or trusted contacts. NordVPN’s cyber insurance coverage Customers can claim reimbursements of up to £5,000 within a 12-month period if they are unable to recover their lost funds Customers can claim reimbursements of up to £5,000 within a 12-month period if they are unable to recover their lost funds through their bank, credit card provider, or other financial institution. Cyber insurance benefits are available to affected customers worldwide, 24/7. NordVPN’s cyber insurance coverage is available to customers residing in the United Kingdom, the Netherlands, France, Sweden, Germany, and Italy. In the United States, NordVPN’s identity theft protection solution, NordProtect, provides protection against identity theft, cyber extortion, and online fraud. NordProtect can be purchased as part of the NordVPN Prime plan or as a standalone service.

ThingsRecon, an expert in Digital Asset Discovery and Supply Chain Attack Surface Management (EASM), announced the launch of its new supply chain product and a significantly expanded strategic partnership programme. This initiative is designed to empower Managed Security Service Providers (MSSPs), Application Cybersecurity Partners, and cybersecurity consultancies to deliver comprehensive, next-generation security solutions to global enterprise organisations and governments. Intelligence of AI technology ThingsRecon is providing enterprises with seamless access to its cutting-edge asset discovery By forging powerful collaborations with trusted partners, ThingsRecon is providing enterprises with seamless access to its cutting-edge asset discovery, vulnerability management, and supply chain attack surface management capabilities. This combination harnesses the intelligence of AI technology with the deep expertise of ThingsRecon's own ecosystem and its partners. Game changer for security professionals "We are excited to announce the launch of our supply chain discovery product. This provides greater context and continuous visibility to the digital connections and proximity of suppliers," said Tim Grieveson, Chief Security Officer & EVP Information Security of ThingsRecon. "Our latest product is a true game changer for security professionals as it will provide customers with a far more complete and accurate view of their attack surface, enabling them to identify, prioritise, and remediate vulnerabilities more effectively, including those across their supply chain, within APIs, and their extended digital connections.” Research from BetterCloud Security teams often drown in alerts without clarity, and data without insights. Research from BetterCloud found that 68% of SaaS apps are IT-sanctioned, which means nearly one in three apps are flying under the radar without formal approval, visibility or oversight. ThingsRecon flips the model by connecting technical exposure to business risk. The platform equips organisations to: Detect and respond to emerging threats faster, by automatically discovering and mapping internet-facing assets like domains, IPs, scripts, and APIs—including those forgotten or considered shadow IT. Improve cyber hygiene and reduce attack surfaces, by adding context, proximity, and business relevance insights to every asset, helping security teams understand not just where the risks are, but how they are connected and why they matter. Automate and increase efficiency of attack surface management with advanced AI algorithms and smart scanning engines. Streamline compliance with evolving global regulations demanding clear digital visibility, such as NIS2, SEC, and DORA. Landscape of global regulations "In today's landscape of global regulations and increasingly sophisticated cyber threats, we firmly believe that expanding our partnerships to enhance our discovery, supply chain, and attack surface management capabilities is not just beneficial, but essential," Grieveson added. "This empowers security and risk pioneers to move beyond basic vulnerability scanning and embrace holistic cyber risk management. Together, we're enabling them to find, understand, quantify, communicate, and remediate more assets, more effectively, at a speed and scale previously unimaginable.” ThingsRecon powerful discovery capabilities ThingsRecon is also expanding its Partnership Programme, opening doors for MSSPs and service providers to integrate powerful discovery capabilities into their offerings. Programme benefits include: Enhanced service portfolios and new revenue streams Full technical enablement and AI-assisted Training Frictionless interoperability and data-only integration options Joint marketing and go-to-market support

JFrog Ltd, the Liquid Software company and creators of the award-winning JFrog Software Supply Chain Platform, announced a significant milestone: delivering the world’s first universal artifact management solution to natively support 40 unique package types, clients and technologies. This milestone solidifies JFrog's status as the gold standard for cloud-native artifact management (powered by JFrog Artifactory), designed to enable organisations to ensure reliability, security and performance across all DevOps pipelines. New packages and versions “Fast moving organisations are bringing in new packages and versions every day. This includes an ever-growing number of new package types as we enter the world of AI-integrated applications, necessitating automated and improved processes for ensuring the robust management and security of these components brought into the software supply chain,” said Yoav Landman, Co-Founder and CTO, JFrog. “Our continued innovation around JFrog Artifactory allows developers to seamlessly manage the world’s most popular technologies, all from one secure and scalable platform, allowing organisations to accelerate their development cycles, ensure compliance, and unleash their teams' creativity to focus on solving complex challenges rather than getting bogged down in logistics." Software proliferation is transforming every industry JFrog’s cloud-native SaaS solution raised over 7 million new packages into their software supply chains JFrog's recent Software Supply Chain State of the Union 2025 report found that in 2024, organisations using JFrog’s cloud-native SaaS solution introduced over seven million new packages into their software supply chains. Meanwhile, nearly two-thirds of technology professionals (64%) report that their organisations are using seven or more programming languages. New technologies and alternative clients To address this trend, in the last year, JFrog augmented its already robust native package support with nine additional new technologies and alternative clients, including: Ansible, Chocolatey, Hex, Machine Learning (JFrog Proprietary), NVIDIA NIM, OCI with Podman, ORAS, WASM-to-OCI, buildkit/buildctl support, OpenTofu, PowerShell, and Yarn. Cloud-native excellence for scale, speed, resilience The JFrog Platform has set the bar for performance in cloud environments, successfully and rapidly handling: Petabytes of monthly data transfer. Thousands of concurrent requests per customer. Hundreds of thousands of requests per minute per customer. Thousands of projects with tens of thousands of repositories and tens of thousands of users and growing. Artifact management solution JFrog’s cloud-native architecture is designed to enable customers to scale operations JFrog’s cloud-native architecture is designed to enable customers to scale operations seamlessly, regardless of deployment size or complexity. They believe that no other universal artifact management solution on the market can match JFrog's performance in the cloud. Easy, complete governance of the SDLC JFrog provides much more than a smart package management system. As the single source of truth for all software artifacts, the JFrog Platform is designed to enable organisations to govern actions taken against software throughout their SDLC. In the past year, JFrog Artifactory has added capabilities across: Release Lifecycle Management: Improves the speed and integrity of release processes with immutable signed release bundles, customisable SDLC stages, simplified release promotion, auditability and control. Evidence Collection: Streamlines proof capture of any process taken during the SDLC, managing important metadata for compliance and governance. Smart Archiving: The industry's first smart, long-term binary and software asset archiving solution helps organisations easily comply with long-term data retention regulations. Expanding enterprise-needed control over cloud locations For enterprises that require full control over their cloud locations, JFrog has advanced its repository federation capabilities, designed to enable organisations with globally distributed development to build, sync, and scale faster than ever before, thanks to optimizations such as: A 3500% increase in sync speed, enabling processing of hundreds of events per second (vs. hundreds of events per minute). Larger supported synced repository size of up to 100M artifacts (vs. >1M) 400% more federated repositories supported by a single JFrog Platform cloud location. Meanwhile, DevOps teams get unmatched reliability and resilience with advanced features such as: Delta Sync: Efficiently replays only unsynced events, reducing overhead. Auto Healing: Detects errors, queues unsynced artifacts, and auto-resumes sync upon recovery to minimise downtime and maintenance. Federation Monitoring Dashboards: Provides organisations with a real-time, visual status of federation health. Advanced enterprise features With its extensive package support, cloud-native performance, and advanced enterprise features, JFrog remains the preferred choice for building multi-service applications across distributed teams and pipelines. Supporting this, the JFrog Software Supply Chain Platform was named “Best End-to-End DevOps Platform” in the Tools and Services category of the 2024 DevOps Dozen Awards, which celebrates individuals and organisations making a significant impact in the DevOps community.

Immersive, the pioneer in people-centric cybersecurity, announced the launch of AppSec Range Exercises, expanding its AppSec solution beyond hands-on labs to help cyber pioneers and practitioners prove and improve their capabilities as part of a holistic cyber readiness program. The new product offers range exercises for Engineering, AppSec and DevSecOps teams to embed security into workflows, reduce friction, and ignite secure development practices at scale. Modern software development Enterprises face mounting pressure to improve application security, but legacy training fails Enterprises face mounting pressure to improve application security, but legacy developer training fails to meet the speed and complexity of modern software development. Without relevant, continuous, and measurable training, Engineering and AppSec pioneers struggle to prove or improve secure coding practices or assess their teams’ readiness to prevent vulnerabilities across the software development lifecycle (SDLC). Last year, 90% of organisations suffered a breach—and most blamed the cybersecurity skills gap, according to the World Economic Forum. Immersive AppSec Range Exercises address such skills gaps. How Immersive AppSec range exercises work AppSec Range Exercises simulate real-world workflows within a realistic software development lifecycle. Teams collaborate to triage, assign, fix, and verify vulnerabilities in a live application. Through realistic, engaging, and continuous training, Immersive helps VPs of engineering and heads of AppSec remove barriers to develop security skills across their teams and drive adoption at scale. Practical coding challenges Teams and individuals not only exercise at the code level, but across the entire SDLC The hands-on labs provide practical coding challenges that expose genuine vulnerabilities, while range exercises simulate real-world remediation scenarios that foster collaboration under high-pressure conditions. Teams and individuals not only exercise at the code level, but across the entire SDLC. “We are offering the world’s first live, practical, and repeatable AppSec exercising experience that mirrors how engineering teams identify and fix vulnerabilities together,” said Chris Wood, Principal Application Security SME at Immersive. “We’re addressing the challenges of VPs of Engineering and heads of AppSec by providing a meaningful way of shifting developers’ mindsets from seeing security as a roadblock to embracing it as a driver of software quality and release velocity, while supporting predictability and organisational resilience.” The benefits of Immersive AppSec range exercises The new solution delivers a practical, team-based approach to application security training. This boosts overall cyber resilience by breaking down silos between DevSecOps teams and allows organisations to transform AppSec into a strategic business enabler. The new solution delivers a practical, team-based approach to application security training The AppSec Range Exercises solution tracks individual and team proficiency with detailed insights into completions, attempts, accuracy, and common failure points—this supports upskilling in security for development teams. Moreover, it measures how quickly developers identify and fix vulnerabilities, allowing pioneers to pinpoint strengths and weaknesses in cross-functional AppSec capabilities to drive tangible security improvements across the entire software development lifecycle. Key benefits of the offering Key benefits of the expanded offering include: Increased Productivity: Accelerates secure code delivery by embedding security into daily workflows, reducing delays from late-stage vulnerability discovery and remediation. Optimised Training ROI: Builds real-world readiness for complex threats across the SDLC with data-driven insights that support continuous growth. Reduced Costs: Avoids costly rework and expensive hires, enabling senior developers to focus on more strategic projects. Improved Compliance: Meets secure coding mandates and reduces risk by training teams with real-world exercises that ensure adherence to industry standards. Unified Security: Boosts overall cyber resilience by breaking down silos between DevSecOps teams.
Access control applications

Omnilert, a pioneer in AI-driven safety solutions and AT&I Systems, announced that Amerant Bank has chosen Omnilert’s AI technology to help bolster the security at all of its locations in Florida. AT&I Systems, a longtime security partner of Amerant Bank, was chosen as the security integrator. Omnilert’s software, which recently received the full SAFETY Act Designation by the U.S. Department of Homeland Security (DHS), will be integrated into more than 160 existing Amerant Bank cameras to provide advanced 24/7 surveillance with automated response capabilities. Key layer of security “Omnilert technology has become a key layer of security that can transform traditional surveillance capabilities and ensure a fast, robust and automatic response in an emergency,” said Dave Fraser, CEO of Omnilert. “With our software running non-stop in the background, Amerant can focus on carrying out their daily business knowing their workers and patrons are being kept safe from harm.” New and innovative ways to enhance the safety “At Amerant Bank, we are always looking for new and innovative ways to enhance the safety of our bank locations, and Omnilert’s AI technology will be an important part of our overall security infrastructure,” said Orlando Gonzalez, Head of Corporate Security at Amerant Bank. “Integrating the software into our existing cameras made the installation quick and seamless, and once installed, it transformed these cameras into powerful, intelligent surveillance devices that are constantly detecting potential threats.”

Gunnebo Entrance Control has successfully installed its BoardSec intelligent airport boarding gate system at Chongqing Jiangbei International Airport’s Terminal 3, as part of a major smart renovation and upgrade program. As the primary international gateway for Chongqing - one of the world's most populous cities - Jiangbei International Airport handled over 40 million passengers in 2024, ranking among the top ten busiest airports in mainland China. Gunnebo’s top visual recognition technology To enhance security and streamline airport operations, Gunnebo Entrance Control has supplied over 150 BoardSec systems, integrating advanced biometric face recognition and cutting-edge visual behaviour identification technology to revolutionise self-boarding. Traditional boarding gates often struggle to detect complex passenger behaviours. Gunnebo’s Top Visual Recognition Technology leverages high-precision camera arrays and deep-learning algorithms to identify over 20 types of risky behaviours, including tailgating, reversing, and unattended luggage. If an item is left unattended beyond a set time, the system automatically alerts staff—reducing manual checks and improving efficiency by 90%. Gunnebo Entrance Control’s intelligent boarding solution Implementation of Gunnebo Entrance Control’s intelligent boarding key has enhanced active efficiency Chongqing Jiangbei International Airport has praised the system’s ability to optimise passenger experience while enabling data-driven operational management. The implementation of Gunnebo Entrance Control’s intelligent boarding solution has significantly enhanced operational efficiency while ensuring a smoother, more secure journey for passengers. This innovation supports the vision of Chongqing International Airport becoming a pioneering intelligent aviation hub in China. Advancements in 5G and edge computing Says Davis Zhang, Vice-President China for Gunnebo Entrance Control: “As a trusted intelligent solution provider for nearly 100 international airports worldwide, Gunnebo Entrance Control is proud to support Chongqing’s digital transformation." "With advancements in 5G and edge computing, we remain committed to driving innovation in China’s civil aviation industry. This project is a testament to our global capability to transform large transport hubs - delivering security, efficiency, and an enhanced passenger experience without compromise.” BoardSec’s next-generation The system uses truly even in hard conditions like strong backlighting or mask-wearing BoardSec’s next-generation multi-spectrum face recognition system enables seamless identity verification - passengers simply walk through the gate as dual-mode imaging (near-infrared and visible light) confirms identity in just 0.3 seconds with 99.98% accuracy. The system operates effectively even in challenging conditions such as strong backlighting or mask-wearing. By eliminating manual code scanning, BoardSec cuts queue times by 70%, increasing single-gate capacity from 180 to 320 passengers per hour. Real-time monitoring of gate operations Gunnebo Entrance Control has also equipped the airport with an intelligent equipment management platform, providing real-time monitoring of gate operations, passenger flow, and system health. Powered by AI, the platform automatically opens additional gates during peak demand, initiates remote diagnostics for maintenance issues, and boosts overall operational efficiency by 60%.

Amthal Group Companies has supported Tradestars’ new Hackney Wick site with a comprehensive, ground-up technology stack, incorporating integrated smart security and fire safety for the benefit of the thriving entrepreneurial community. Tradestars offers flexible co-warehousing facilities for entrepreneurs looking for collaborative workspaces and shared resources to foster innovation and growth. Its newest location presents spaces in Hackney Wick to suit individual business needs. Integrated security solution Amthal to design a fully integrated security solution that was installed, monitored and maintained With the site spread out across multiple blocks and topped with residential accommodation, Tradestars worked directly with Amthal to design a fully integrated security solution that was installed, monitored and maintained for the benefit of the growing community. The result is a secure, technology-led site with members able to book facilities, and open doors to access offices, meeting rooms and amenities via their phone, whilst giving community managers centralised control over the building. Security and fire safety measures Says Jonathan Marriott, Construction Director at Tradestars: “Our work with Amthal has been instrumental in elevating our Hackney Wick site into a secure, cowarehousing business environment." “With their expertise, we’ve seamlessly integrated comprehensive security and fire safety measures, ensuring the safety and peace of mind of our thriving entrepreneurial community. The ability for our members to effortlessly book facilities and access various amenities via their phones, all while providing our community managers centralised control, truly enhances the Tradestars experience.” Advanced technology features of Amthal Amthal designed and installed a fully integrated, ground-up technology stack – from fibre connectivity Following a detailed risk assessment across the site facilities, in cooperation with main contractors, Amthal designed and installed a fully integrated, ground-up technology stack – from fibre connectivity, Wi-Fi, audiovisual and space management solutions, to fire, security and access control. Paul Rosenthal, Amthal Group Business Development Director added: “Being involved right from the initial design stages of the building site, enabled us to create a system to encourage connectivity, collaboration and innovation. One where members enjoy streamlined access, advanced technology features, and a safe working environment." Integrating fire safety and security systems Rosenthal added: “The focus on integrating fire safety and security systems means the growing community can focus on building their business vision, safe in the knowledge that they are powered and protected wherever they are on site, fitting today’s mobile-connected lifestyle." "This is complemented by fully managed services and support to ensure the continuous operation and maintenance of the complete ecosystem.”

RGB Spectrum™, a pioneer in mission-critical video solutions for real-time decision support, announced that the City of Norman, Oklahoma, has selected the company to deliver a video processing and control system for its new Traffic Management Centre (TMC). This innovative display approach will replace the traditional front-of-room screen with personal console-based video walls, setting a new standard for operational efficiency. RGB Spectrum’s Zio® 4000 series New system redefines what’s possible in compact, efficient traffic management environments Designed in partnership with global engineering and design firm Stantec, the new system redefines what’s possible in compact, efficient traffic management environments. At the core of the deployment is RGB Spectrum’s Zio® 4000 series video processor, XtendPoint® KVM-over-IP, and RGB Rack PCs, enabling seamless, customised workflows to operators. Norman’s commitment “Norman’s commitment to cutting-edge technology ensures we can effectively monitor traffic patterns and enhance safety for all who live, work, and travel through our city,” said David R. Riesland, City Transportation Engineer, City of Norman. “This project has been over 15 years in the making, and it’s incredibly rewarding to see that long-time vision finally become reality. We’re excited to partner with RGB Spectrum to implement a best-in-class solution that supports our mission.” Five discrete networks The new 2,300 square-foot facility will be transformed from a shell space into a highly functional centre, including three offices, an operations room, and an IT room. Within the operations space, four operators oversee five discrete networks—ranging from ATMS/ITS and enterprise to public safety, security, and web administration—through a fully distributed architecture. Each operator will have access to five dedicated Rack PCs located remotely in the IT room, allowing for quiet, clutter-free workstations and centralised maintenance. RGB Spectrum’s XtendPoint KVM The upper displays at the station serve as “videowalls,” dynamically combining a mix of sources Using RGB Spectrum’s XtendPoint KVM-over-IP with multiviewing capability, operators control and interact with any PC across any network from their consoles. The upper displays at each station serve as personalised “videowalls,” dynamically combining a mix of sources. Each operator can mirror a common display layout or configure their own unique, task-specific view. RGB Spectrum performance and adaptability In total, any operator can control and view any or all of the 20 Rack PCs, providing a flexible and resilient operations environment. Whether deploying a centralised videowall or a decentralised, operator-specific layout, RGB Spectrum delivers the mission-critical performance and adaptability that modern traffic management centres demand.