Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
Skills for Security has partnered with C-TEC to strengthen the training opportunities for apprentice fire and security technicians through greater access to current technologies and direct engagement with industry expertise. C-TEC’s involvement will include providing equipment for training, technical resources and the expertise of its engineering and product development teams. Apprentices will benefit from demonstrations and discussions that show how design choices affect performance, usability and long-term maintenance. How such systems are designed, installed Apprentices will work with fire alarm, evacuation alert and lockdown systems used across the UK, helping to gain a clear understanding of how such systems are designed, installed and maintained in line with relevant British Standards and industry regulations. Says Andy Green, Marketing Director at C-TEC: “C-TEC recognises the importance of ensuring new technicians are trained using equipment they will encounter throughout their careers. By supporting Skills for Security, we can help apprentices develop the confidence and technical understanding needed to work with life-safety systems responsibly and competently. Our aim is to contribute to a well-prepared workforce that can maintain the standards to ensure compliance.” Competence within the fire safety sector The partnership reflects the increasing focus on competence within the fire safety sector. As technology evolves and regulations continue to develop, engineers are expected to demonstrate a higher level of understanding and accountability. Collaboration between manufacturers and training providers plays an important role in ensuring apprentices are equipped to meet these expectations. Hands-on experience with current systems David Scott, Managing Director at Skills for Security, added: "Partnering with C-TEC gives our apprentices hands-on experience with current systems while combining technical expertise and training to develop knowledgeable, confident fire and security professionals." "This collaboration highlights our shared commitment to practical learning, industry standards, and the continued commitment to a skilled, safety-focused workforce."
Squire Locks USA has appointed Channel Championz, founded by security industry veteran Jerry Burhans, to lead its expansion into the North American critical infrastructure market. Burhans, a seasoned industry executive with leadership roles at ISONAS, SimonsVoss, and ASSA ABLOY, brings over 30 years of experience in the U.S. security hardware and access control market. He will lead Squire’s North American expansion, with a focus on transportation, utilities, telecommunications, and other mission-critical infrastructure sectors. Squire’s Stronghold® series With 245 years of lock-making experience in the United Kingdom, Squire is recognised for its hard-wearing, industrial padlocks, including the world’s strongest production padlock, the S100CS. But beyond strength, Squire is also one of the few manufacturers whose padlocks undergo the rigorous EN12320 European testing standards for real-world attack resistance. These criteria are often more demanding and application-relevant than many U.S. benchmarks. “Squire’s Stronghold® series brings a level of mechanical security this market hasn’t seen in years,” said Burhans. “These aren’t just strong padlocks, they’re engineered and tested to survive in the real world. We’re talking about products that can resist drilling, cutting, sawing, freezing and corrosion, certified to EN12320 Grade 6, which goes far beyond U.S. standards. In critical infrastructure, that level of protection matters.” Squire’s inigma smart access control system Channel Championz will focus on introducing the Stronghold line to the U.S. market, alongside Squire’s inigma smart access control system. inigma enables users to manage access to compatible padlocks via Bluetooth, using a secure smart key programmed through a dedicated mobile app. Designed specifically for critical infrastructure applications, inigma eliminates the need for managing multiple physical keys across remote or dispersed sites. Just as importantly, the system offers centralised control and detailed audit trails, supporting compliance with NERC-CIP standards that require strict logging and traceability of access to protected utility assets. Security hardware distributors “Squire is bringing something security hardware distributors haven’t seen in a long time,” added Burhans. “An independent, family-owned manufacturer that’s technically sophisticated, strategically focused and truly committed to its U.S. partners.” “Distributors today aren’t just looking for a product, they’re looking for a partner who answers the phone, provides knowledgeable support and builds long-term relationships. You’re not dealing with a revolving door of salespeople or a diluted corporate structure. You’re getting consistent expertise, direct access to decision-makers, and a brand that’s here to invest in the channel, not bypass it.” High-performance security solutions John Squire, Global CEO at Squire, added: “We’re thrilled to be working with the Channel Championz team and to leverage Jerry’s expertise in this sector. They understand the value of strong distributor relationships and staying close to the customer, which aligns perfectly with Squire’s approach of building a long-term presence rooted in trust, service and performance." "Squire Locks USA is deeply committed to serving the North American market. This expansion underscores the company’s long-term dedication to providing North American critical infrastructure customers with trusted, high-performance security solutions to safeguard the systems that millions rely on every day.”
Netwatch, a provider of AI-powered security services, announced now that it has signed a definitive agreement to be acquired by GI Partners. Netwatch is a pioneering global provider of intelligent security solutions, serving a broad range of verticals, including organisations in the automotive, retail, banking, manufacturing, construction, and infrastructure sectors. Netwatch’s services are mission-critical, providing peace of mind to businesses and individuals by delivering a technology-driven, proactive approach to site protection, risk mitigation, and workplace safety. Now, Netwatch protects more than 330,000 sites worldwide. Application of AI technology “Netwatch has an unmatched reputation among its customers for high-quality, reliable security monitoring solutions to protect essential assets and people,” said Mark Prybutok, Managing Director and Head of Data Infrastructure at GI Partners. “We are excited to support the Company in its next phase of growth through the application of AI technology, strategic capital investment, and deeper partnership with customers; continuing to expand its leadership in the remote video monitoring ecosystem.” “We are very excited to leverage the deep expertise of the GI team to drive continued improvement in our AI, operations and go-to-market strategies,” said Kurt Takahashi, CEO of Netwatch. “We look forward to partnering on our mission to be the global pioneer in intelligent security monitoring and intervention services.” GI Partners’ portfolio Netwatch will operate as an independent company within GI Partners’ portfolio, leveraging GI Partners’ support, expertise, and experience to accelerate growth while continuing to provide the high-quality service that the Company’s customers expect. The transaction is expected to close in the first quarter of 2026, subject to customary closing conditions, including required regulatory approvals. Stifel acted as exclusive financial advisor to GI Partners and Paul, Weiss, Rifkind, Wharton & Garrison LLP served as legal counsel.
Allied Universal has sold a majority stake in AMAG Technology to Shore Rock Partners, a critical infrastructure-focused growth investor. AMAG is a global pioneer in integrated high-security access control, identity, guest, and video management solutions. The new ownership group led by Shore Rock Partners with strategic backing from Belltower Partners will continue to support enhancements to AMAG’s product portfolio, evolve service models, and expand the company’s capabilities to protect people, identities, and assets around the world. AMAG’s long-term growth Allied Universal will retain a substantial minority interest in AMAG. With the transaction, AMAG President David Sullivan will become CEO. Additional terms of the sale are not being disclosed. “AMAG has been an important part of the Allied Universal team and we look forward to supporting this next stage of growth alongside our partners,” said Steve Jones, global chairman and CEO of Allied Universal. “Because the company is an embedded software and hardware platform, we determined it would be best for AMAG’s long-term growth to separate from our services-based business model, giving it more autonomy and flexibility to focus on development of its products and offerings. Our ongoing investment is representative of our continued support for the business and customers.” AMAG’s next phase of growth Shore Rock, Allied Universal, and AMAG are collectively committed to helping ensure a seamless experience for all customers, integrators, and partners. AMAG’s day-to-day operations, support resources, and customer-facing teams will remain in place following the transaction. “We are excited to partner with Allied Universal as we both invest to support AMAG’s next phase of growth,” said Ashton Wackym and Sebastian Levy, co-founders of Shore Rock Partners. “AMAG has earned the trust of customers in some of the most demanding environments, and we look forward to building on this heritage by investing resources to deepen customer and channel relationships while advancing the product roadmap. We respect the leadership David and others have brought to the organisation and believe AMAG is exceptionally well-positioned in an attractive market.” Important milestone for AMAG “This partnership marks an important milestone for AMAG and the customers who rely on our technology every day,” said David Sullivan, CEO of AMAG Technology. “Shore Rock brings a thoughtful, long-term approach that aligns with our commitment to reliability, innovation and service. Their investment will help us continue strengthening our platform and delivering solutions that meet the evolving needs of high-security environments.” AMAG’s tremendous potential Shore Rock and its acquisition of AMAG are supported by a strategic partnership with Belltower, a private investment firm founded by Kewsong Lee. Belltower’s backing provides strategic, operational, and firm-building support to Shore Rock and its affiliates. “Belltower has deep confidence in Shore Rock’s capabilities, judgement and approach to long-term value creation,” Lee said. “We look forward to working together to realise AMAG’s tremendous potential.” Demand from a global base of institutions The private capital raised to finance the acquisition was oversubscribed, reflecting strong demand from a global base of institutions and family offices. Shore Rock Partners was advised by Gibson, Dunn & Crutcher and McGuireWoods. Allied Universal was advised by Sheppard, Mullin, Richter & Hampton. Belltower was advised by McDermott Will & Schulte. The transaction was negotiated bilaterally.
Access control applications
ANSecurity, a pioneering specialist in network security and wireless solutions, has successfully delivered one of the UK education sector’s first campus-wide Wi-Fi 7 deployments at Sir William Perkins’s School, providing the Surrey-based independent school with a secure, high-capacity wireless infrastructure designed to support its growing digital learning ambitions. Serving around 580 students and 142 staff, Sir William Perkins’s School has fully embedded 1:1 iPad usage into daily teaching. However, the school’s legacy wireless network struggled to cope with the rising density of devices, particularly when large groups connected simultaneously through Apple Classroom. Technical requirements Ensuring secure authentication, safeguarding compliance, and consistent performance across hundreds of devices became increasingly challenging – and other vendors were unable to meet the school’s strict technical requirements. “We spoke to multiple providers, but none were able to implement the solution we envisioned. ANSecurity not only made it possible – they tested it, validated it, and delivered it flawlessly,” said the school’s IT Manager. A structured, consultative approach Introduced by RUCKUS Networks, ANSecurity began by validating the school’s design requirements and conducting extensive lab testing to confirm compatibility with Jamf School’s certificate-based authentication and the school’s existing network architecture. A collaborative deployment plan followed, with a tight three-month schedule carefully aligned to the school holidays to avoid disruption. ANSecurity then deployed RUCKUS Wi-Fi 7 access points and configured Cloudpath to seamlessly issue certificates to nearly 550 school-managed iPads – a capability other vendors could not match. Wi-Fi 7 provides dramatically higher throughput, lower latency, and improved efficiency thanks to technologies such as wider channels and multi-link operation, enabling fast, reliable connectivity even in dense device environments like classrooms. ANSecurity integrated RADIUS and API-driven workflows To support safeguarding and compliance, ANSecurity integrated RADIUS and API-driven workflows to ensure accurate user-to-IP mapping across both the Palo Alto Networks next-generation firewall and the ContentKeeper filtering service. Additional networks were created for BYOD and guest access, with Opportunistic Wireless Encryption (OWE) used to protect traffic on open networks. ANSecurity also assisted in restructuring parts of the network, implementing new VLANs and applying updated firewall policies to ensure the right users and devices could securely access the right resources. Following deployment, a detailed wireless site survey was carried out to confirm optimal signal strength, signal-to-noise ratio, and throughput across both indoor and key outdoor areas of the campus. “The difference in consultative support compared to other vendors was night and day,” said the IT Manager. A high-performance, future-ready outcome The school now benefits from fast, stable, and secure Wi-Fi coverage across the entire campus. The new network reliably supports nearly 800 devices, with the majority operating seamlessly on 5 GHz, and is fully prepared for future upgrades, including WPA3 and 6 GHz Wi-Fi once supported by Jamf School. Integration with existing security solutions ensures all safeguarding, logging, and compliance requirements are met. Improvements to switching, segmentation, and overall network architecture have further enhanced performance and manageability. Cyber Essentials Plus certification Delivered within the agreed three-month window, the project positions Sir William Perkins’s School at the forefront of digital education. Wi-Fi 7 provides the performance headroom needed to support emerging educational technologies – from AR/VR learning to high-bandwidth cloud applications – ensuring the school remains ahead of future digital demands. With upcoming initiatives including Cyber Essentials Plus certification, expanded security controls, and wired network access control, the relationship between the school and ANSecurity continues to deepen, built on trust, technical expertise, and a shared commitment to innovation.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced now that Ki Charter has expanded its contract following initial success. ZeroEyes’ proactive gun detection and intelligent situational awareness solution will now be deployed across the school’s San Marcos campus. Largest residential treatment centre Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school serves over 6,500 students annually (500% mobility rate) with a dedicated team of educators and staff. The San Marcos campus is located within the 65-acre San Marcos Treatment Centre, the largest residential treatment centre in Texas. The centre houses approximately 200 residents (and community students) who attend Ki Charter, and employs 425 staff members, including 50 from Ki and 375 from the San Marcos Treatment Centre. Level of real-time awareness “At Ki Charter, we serve a unique population of behaviourally challenged students, so our approach to security has to be comprehensive, proactive, and intentional,” said Dr. Jerry Lager, Superintendent of Ki Charter. “Our Safety and Security Committee, campus teams, mental health staff, and local law enforcement all play a role in preventing and de-escalating potential threats, but ZeroEyes added a level of real-time awareness we simply didn’t have before. After seeing how effective the technology was, expanding its use was an easy decision.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Multi-layered safety program “Ki Charter has built a thoughtful, multi-layered safety program, and we’re proud to continue to play a role in strengthening it,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “Their leadership is deeply committed to protecting students and staff, and this expansion proves that they understand that proactive security is essential on a campus of this size and complexity.”
Acoem, a pioneer in advanced physical security solutions, announced that a large North American utility is utilising its ATD Gunshot Detection system to protect critical infrastructure at multiple sites across the country. Over the past few years, utilities across the United States have faced a troubling trend: gunfire directed at electrical substations and other energy assets. Whether the intent is vandalism, sabotage, or reckless target practice, the results are the same. A single rifle round can destroy a million-dollar transformer that could take months to replace. This happens when the cooling fluid drains from the transformer. Once the fluid is lost, the unit quickly overheats and frequently ignites. Physical attacks on critical infrastructure A recent DHS Homeland Threat Assessment concurs, stating, “We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals…” One of the largest electric power and natural gas utilities in North America recognised this risk after a number of gunshot attacks on substations disrupted power to tens of thousands of customers. In one case, power was not restored for days, and a person dependent on life support equipment tragically lost their life. The challenge Before implementing a new solution, the utility needed to reassess how its security technologies worked together. Traditional security cameras were excellent for documenting clearly visible problems, but they could not reliably detect something as small as a bullet hole in a damaged transformer, leaving a critical awareness gap. The company’s challenge was not only detecting a gunshot but doing it fast enough to act before cascading failures occurred. Threats outside the perimeter In many cases, gunfire at substations originates from hundreds of feet outside the fence line. The sound of the muzzle blast may never reach the site, leaving only the supersonic ballistic wave as evidence of incoming rounds. A system limited to triangulating muzzle blasts within a perimeter would miss these long-range threats entirely. Integration with security cameras and VMS Facing these unique requirements, the utility sought a technology that could provide instant notification with video and audio verification. This capability was essential to confirm whether an event was malicious or accidental. Integration with the utilities existing video management system (VMS) was a requirement, while direct control of a pan-tilt-zoom (PTZ) camera would allow operators to focus immediately on the source of the gunfire and determine if an actual threat existed. "We needed immediate, accurate alerts to prevent catastrophic damage,” said the utility’s physical security program manager. “Whether a threat is close-range or from a high-powered rifle fired from hundreds of feet away, we needed a modern, self-contained, highly accurate system to provide a full picture.” The requirement of a closed, secure network Cybersecurity was another defining requirement for this utility. The company prohibits internet connectivity within its operational network, a strict “air-gapped” policy that rules out any cloud-based system. For these secure environments, any new security technology must operate entirely on-premises, integrating directly with existing video and access control platforms. Finding the correct solution To address the complex nature of the threats and meet these stringent demands, the utility required a specialised solution that avoided a full infrastructure overhaul. After extensive testing, the utility selected Acoem’s ATD (Acoustic Threat Detection) system. The company has now deployed numerous detection systems across multiple states and regions, with new installations continuing every week as part of an ongoing modernisation plan. A principal reason behind choosing the Acoem ATD system was based on how the system works compared to legacy solutions. Instead of sending audio data from multiple sensors to a remote server, the Acoem sensor processes detection right on the device. When a gunshot occurs, it detects both the muzzle blast and the ballistic wave, confirming the event and calculating its location instantly. Cybersecurity requirements of restricted internet access Processing analytics on the edge is instant and gives operators the time they need to respond. That might mean rerouting power, isolating a substation, or taking a transformer offline before it fails. Having that situational awareness can make the difference between a quick repair and an extended regional outage. Acoem developed an on-premises version of its Cadence software specifically to meet the utility’s cybersecurity requirements of restricted internet access. The platform displays live maps, sensor health, and provides audio verification clips that allow operators to hear what the sensor heard while viewing the shooter’s position overlaid on the map. Cadence integrates directly with the utility’s Avigilon video management system. “Running software on-premises was non-negotiable,” said the utility’s program manager. “We needed the benefits of automation and analytics without exposing operational systems to the internet.” Situational awareness with eyes on target Detection is only half the story. Integration with a PTZ camera on site provides immediate visual confirmation. When a gunshot is detected, the sensor automatically commands the camera to pivot to the coordinates of the source. Operators can see what happened as it happens, even if the shooter is several hundred yards outside the fence line. In some locations, thermal or infrared cameras may complement the acoustic sensors to detect movement in tree lines or along rights-of-way. This pairing of acoustic and visual intelligence transforms response operations, allowing the utility security team to verify alarms in real time and coordinate with law enforcement or maintenance crews as needed. Hunters or vandals? In one recent example, the utility’s Acoem ATD system detected gunfire at a remote substation. Through the linked PTZ camera, operators quickly confirmed that the shots came from hunters outside the perimeter and that there was no threat to equipment or personnel. The team was able to assess the situation instantly without dispatching crews or contacting law enforcement. Scalability and integration flexibility The utility required open standards and interoperability. They did not want a proprietary system that locked them into a specific platform. The Acoem ATD system met that demand, integrating through APIs with their existing Avigilon infrastructure. Whether a site runs on VMSs such as Avigilon, Milestone, or Genetec, the ATD sensors connect seamlessly within the same ecosystem. Just as important, the solution had to scale. The utility began with a few high-risk sites and has expanded steadily without redesigning its network. This “start small, grow fast” approach aligns with how the organisation evaluates, validates, and then standardises new technologies. CIP-014 compliance and beyond The North American Electric Reliability Corporation’s CIP-014 standard mandates physical security measures for critical transmission substations, including threat detection. The utility wanted to go further. It set a new benchmark for awareness, resilience, and uptime. Acoustic threat detection is now a key component of its operational strategy, providing actionable intelligence that prevents damage rather than documenting it after the fact. A smarter path forward Protecting critical infrastructure today means recognising that not every threat is digital. A single bullet can cause as much disruption as a cyberattack. The key is giving operators the real-time data they need to act quickly and decisively. By combining edge-based AI, on-premises software, and open integration with existing security systems, Acoem’s ATD system has given the utility company the situational awareness it needed to protect its assets and its customers. The system keeps vital equipment online, strengthens compliance, and helps safeguard the communities that rely on uninterrupted service. “Securing the grid now demands both digital and physical vigilance,” said the utility’s program manager. “Gunshot detection has become a critical layer of defense for the infrastructure that powers our daily lives.”
Having an emergency response plan is essential for businesses of all sizes, across every industry. But in energy facilities, particularly those dealing with hazardous or explosive materials, it becomes a crucial, and often strictly regulated life safety requirement. In an emergency, not only is it critical to identify where all employees are located, but also that any visitors, contractors, or vendor partners are all accounted for and safely evacuated. When an alarm sounds, duty of care requirements and regulatory requirements dictate that companies have protocols in place to effectively respond to an emergency and know precisely who is on-site and that everyone can exit as quickly and safely as possible. Equally important is making sure that everyone at the facility is aware of and follows emergency guidelines. Challenge According to data compiled in the 2021 Guide to the Business of Chemistry from the American Chemistry Council, “Facilities in Texas and Louisiana produce 80 percent of the nation’s primary petrochemical supply, and Texas chemical production tops the nation by far, with chemical shipments valued at $117.5 billion, representing a major portion of the region’s economy, but also the potential for significant security risks and challenges.” Some petrochemical plants use a traditional, paper-based mustering solution for emergency response scenarios. These manual methods of notifying, mustering, and accounting for personnel can result in costly, potentially dangerous inefficiencies during an emergency. Site access control and visitor management processes are also typically stand-alone and do not communicate with each other, which forces manual processes to log and reconcile individuals when mustering during an emergency response evacuation or a required emergency drill. To do this, chemical plant security staff typically prints the logs from on-site access control and visitor management systems, then crosses off the names of individuals from the lists when they are accounted for manually. Each list is reconciled on its own and by hand. This outdated process can take hours to complete and holds a potentially high risk of error. Solution Everon is working with various Houston area petrochemical plants to update their emergency notification systems with innovative, cost-effective solutions. According to these customers, Everon provides comprehensive solutions to fit their needs, and maintains a level of professionalism and dedication to service excellence that other companies too often fail to meet. One solution Everon has proposed to combat this problem across chemical plant facilities consists of three integrated technologies that include: Cloud-Based Access Control: An access control system that is cloud-based may be easier to implement and have a lower cost of entry. This system provides a log of all badged personnel on site to the mustering system for accounting of personnel during an emergency. Visitor Management System: This system allows visitors to pre-register and be managed electronically when they come to the plant while providing visibility in case of an emergency. Mustering Software and Card Readers: These provide seamless management of emergency events, including electronic mustering, unit accountability, and ERT readiness. Access control logs from the cloud-based system With this solution, access control logs from the cloud-based system and visitor management logs can automatically tell plant operations how many people are on-site through the mustering software. A number of portable mustering units were commissioned with card readers, which allow for quick and easy confirmation of badge reads from fixed muster locations. In addition, warning lights and speakers were also added at plant entrances to alert personnel to emergency events. The mustering system’s mustering software takes the information directly from the access control and visitor management logs and communicates directly with the plant operators. This allows them to manage the entire emergency using the software, starting with an accurate count of who is in the plant and then quickly and easily managing individuals as they safely exit. Emergency response events can be initiated with the click of a button and significantly improve the amount of time needed to accurately count the number of people evacuating the plant. Installations are consistently performed with personal safety in mind. Everon believes that no work is worth doing if it’s not done safely and in full compliance with governing regulations and standards. No recordable injuries or lost-time events were recorded during any of the projects completed by Everon at any Houston area petrochemical plants. Results According to one client, "Our previous method of pen and paper was very inefficient and antiquated. Everon's solution with our emergency response protocol gives us the cutting edge in technology. Not only does it allow us to become well-organised and systematic, but safer." Emergency response drills at each petrochemical plant are now completed in minutes, not hours, and emergency responders receive visual confirmation when everyone is confirmed as safe. The plants consider having digital reports of employees that are on- and off-site at the plant a major bonus, along with the ability to deploy mass notifications between the plant and local communities. Said another client, "We are extremely satisfied with our choice of Everon as our life safety partner and are currently working with them to update analog cameras in our plant, as well as advance our infrastructure to bring other innovative security, health and operational monitoring technology solutions to our facility."
Intersec Dubai 2026 news
Dubai World Trade Centre — Sheikh Saeed Hall 2, Stand C43, January 12–14, 2026. Organisations of every size and type have discovered how connected digital access helps them implement smart...