Mobile Access Trends
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
As 2025 draws to a close, the Door & Hardware Federation (DHF) is reflecting on a hugely productive year. Indeed, it has been defined by achievement and collaboration, and by a tireless commitment to the people and industries it serves. From achieving ISO 9001 certification, to publishing the long-awaited Competence Framework and launching a pioneering new qualification, the Federation has continued to strengthen its foundations while looking confidently to the future. Excitement and possibility “2025 began with a sense of excitement and possibility,” explains DHF’s Commercial Director, Patricia Sowsbery-Stevens. “In February, DHF hosted its first Members’ Conference at the Royal Air Force Museum Cosford, where more than 200 members and industry professionals gathered for a highly enjoyable day of insight, discussion and connection.” Invaluable guidance on employment law The event brought together a programme of workshops and speakers, including Dafydd Williams from the Ministry of Housing, Communities and Local Government, who shared the government’s response to Grenfell, and Gillian McAteer from Citation, who offered invaluable guidance on employment law. A moving moment came from Flight Lieutenant, John Nichol, whose keynote address about his experience as a British prisoner of war during the Gulf War was both humbling and inspiring. Alongside the talks, an exhibition hall filled with leading names from across the sector created opportunities for collaboration and the sharing of knowledge that will carry forward into the year ahead. DHF’s enduring mission In April, the launch of the ABBE Level 3 Award in Compliance and Safety of Fire-Resisting Roller Shutter Doors marked a major milestone. Developed by DHF to strengthen competence within this highly specialised area, the qualification has already seen remarkable uptake from companies determined to uphold the highest standards of safety and compliance. It reflects DHF’s enduring mission to support professional growth and align industry practice with a focus on building safety and competence. CLC Competence Framework for Doors “Another defining achievement came with the completion of the Construction Leadership Council’s (CLC) Competence Framework for Doors, Gates and Shutters. Developed in close partnership with the Automatic Door Suppliers Association (ADSA) and guided by the Sector Lead Group 10,” explains Patricia. “The project represented eighteen months of careful collaboration and consultation. Led by DHF and ADSA, and supported by our Senior Training and Compliance Officer, Steve Hill, the framework establishes clear, practical standards for competence across installation, maintenance and servicing." "For DHF members, this work has real impact. More and more organisations, for example, Amazon and Heathrow Airport, are now requiring evidence of individual competence for both installation and maintenance. The framework and accompanying National Occupational Standards help ensure DHF members can demonstrate the professional skill and assurance expected of them.” DHF’s growing role The summer brought one of the Federation’s proudest moments. DHF achieved ISO 9001 certification, confirming its position as an organisation that leads by example. This recognition of quality management and continuous improvement reinforces DHF’s reputation for professionalism and integrity in all that it does. In September, a further milestone followed with authorisation to provide Blue Skilled Worker cards for the Dock Leveller industry. This step has brought well-deserved recognition for individuals working in this specialist area and underlines DHF’s growing role in supporting competence and training across every corner of its sector. Innovation and excellence within the fencing community “Throughout 2025, DHF has remained close to its members and partners,” says Patricia. “We have attended key national events including The Security Event, The FIT Show, Fencex, and the MLA Expo, meeting members face-to-face, sharing updates and listening to feedback. DHF also continued its proud sponsorship of the Automated Gate category at the AFI Awards, celebrating innovation and excellence within the fencing community." "Member engagement has remained central to our purpose, with a series of members’ open days around the UK. One particularly meaningful initiative saw Steve Hill spend several weeks in Ireland, offering training and support to members across the Republic. His visit received outstanding feedback and further strengthened DHF’s ties with the Irish market.” National Insurance contributions While the year brought challenges, including increased National Insurance contributions and a slowdown in construction, the outlook among DHF members has remained encouraging. Many report steady order books and continued demand within commercial and industrial markets, a reminder of the sector’s resilience and its ability to adapt and thrive even when conditions are uncertain. “No reflection on the year would be complete, of course, without recognising the people who make DHF what it is,” says Patricia. “As the year draws to a close, DHF prepares to say farewell to Nick Perkins, whose knowledge and expertise have left a lasting mark on the industry. Nick’s retirement will be felt by colleagues and members alike, and he departs with the Federation’s gratitude and warmest wishes”. Organisation’s commercial insight and engagement Earlier in the year, the Federation wished a fond farewell to Helen Skelding, whose calm professionalism and loyal service earned her the respect and affection of all who worked with her. The team was joined by Eddie Payne as Finance Manager, bringing fresh perspective and experience to support DHF’s continuing growth. Later in the year, Jason Smith moved on after many valued contributions, and the Federation welcomed Jonathan Colen as its first Commercial Manager, strengthening the organisation’s commercial insight and engagement. Within the Membership Department, Olivia Juxon began maternity leave in November, and we were delighted to welcome Charlotte Winsper to the team to ensure members continue to receive excellent support. DHF’s educational portfolio “As we move into 2026, DHF stands ready for the next chapter,” concludes Patricia. “With ISO 9001 certification achieved, the Competence Framework completed, the Level 3 Award launched, and authorisation secured to issue Blue Skilled Worker cards for the Dock Leveller industry, DHF has laid strong foundations for the future." "The coming year will see the introduction of a new Ofqual-regulated training programme for the building hardware industry, extending DHF’s educational portfolio and offering a clear route to recognised qualifications. Above all, DHF remains committed to raising standards, supporting members, and strengthening the sector it proudly represents.”
As the world transitions to renewable energy, Battery Energy Storage Systems (BESSs) are helping meet the growing demand for reliable, yet decentralised power on a grid scale. These systems gather surplus energy from solar and wind sources, storing it in batteries for later discharge. This process helps stabilise the grid by ensuring a steady power supply and mitigating the variability associated with renewables. Excess daytime electricity from solar farms, for instance, can be stored at a BESS facility for use overnight. More than 90% of these grid-sized energy storage systems utilise lithium-ion batteries with spending for new facilities expected to grow at an annual rate of more than 30%, reaching $12.1 billion by 2025. Lithium-ion batteries offer higher energy density, faster charging and longer life than traditional batteries. Addressing BESS safety concerns Lithium-ion batteries in energy storage systems have distinct safety concerns that may present a serious fire hazard unless operators understand and address the risk proactively with holistic, advanced fire detection and prevention methods. Once a lithium-ion battery overheats in a BESS and the process of “thermal runaway” occurs, it can be nearly impossible to extinguish, potentially causing catastrophic damage and risking the lives of first responders called to put out the fire. Such an event occurred in April 2022 at a 10 MW storage facility in Chandler, AZ, where fire crews struggled to extinguish a blaze for four days. In 2019, a fire and explosion at an energy storage system in Surprise, AZ, near Phoenix, was triggered by an overheated lithium-ion battery injuring several first responders and resulting in significant damage to the facility and disruption to the surrounding community. Abuse Factors Lithium-ion cells are prone to failing if not kept within specific environmental conditions. When these conditions are compromised, so-called abuse factors can lead to thermal runaway. Awareness of these abuse factors can help operators prevent thermal runaway at its earliest stage. Electrical Abuse: This occurs when a battery exceeds voltage limits during charge or discharge and overheats. The simultaneous operation of these batteries poses the risk that any one of the battery cells could exceed voltage limits during charge or discharge and can cause overheating that triggers a potential fire event. Mechanical Abuse: This can be caused by physical or mechanical damage to the battery such as a crush, indentation, or puncture from vibration or shock. Thermal Abuse: This is initiated when the operational temperature exceeds the limits of the battery. If caused by overcharging, the extra current triggers a chemical reaction that breaks down the battery’s organic liquid electrolytes and changes them from a liquid to a highly flammable gaseous state. Why is the earliest possible detection of a battery failure When an abuse factor continues unaddressed, more of the liquid electrolyte from the battery will convert to gas, causing an internal build-up of pressure sufficient to vent or rupture the battery seals and resulting in an off-gassing event. Eventually, as more gas is generated, internal pressure and heat continue to increase rupturing, melting the separator, and releasing the smoke. By this point, thermal runaway is imminent. A single cell failure can quickly overheat and spread to surrounding cells. That’s why the earliest possible detection of a battery failure is crucial to preventing a potential disaster caused by thermal runaway. It is common for mobile BESS units to utilise traditional heat and smoke detectors in interior spaces, but these sensors are not equipped to provide sufficiently early warning of an impending fire. They are only sensitive enough to detect smoke after a fire has started, which is much too late to stop thermal runaway from igniting an entire bank of batteries. Furthermore, these pre-installed systems cannot be serviced, monitored, or maintained to ensure they are in basic working order due to unit design. The best protection is prevention A holistic approach using advanced detection and performance-based solutions combined with battery management systems can work together to establish layers of safety and fire protection. Battery Management Systems monitor voltage, current, and temperature to identify any battery abuse factors. While this is an important initial layer, it should not be the only layer of protection. Temperature and Humidity Sensors measure the temperature of the air surrounding the sensor including ambient room temperature, shock/vibration/AC power quality and conditions. Advanced detection innovations provide the very earliest possible intelligence about conditions inside the BESS. These early warning systems can be professionally tested, serviced, maintained, and monitored at the fire alarm control panel. Thermal Imaging Cameras graphically illustrate the temperature of the objects and equipment the camera can see. Off-Gas Detection technologies can provide an alert in the initial stage of lithium-ion battery failure when venting of electrolyte solvent vapors begins and prior to thermal runaway. Very Early Warning Smoke Detection systems use ultra-sensitive sensors to provide early warning of an impending fire event, buying time to initiate an appropriate emergency response to prevent injury, property damage or business disruption. If an off-gas event occurs, sensors can be used to quickly notify facility operators to shut down the system or contact first responders to mitigate the spread of fire from cell to cell. Responding to the ever-evolving fire and life safety industry Fire and life safety industry standards are evolving to minimise the fire risks associated with BESSs. Ensuring appropriate criteria to address the safety of such systems in building codes and fire codes is an important part of protecting the public, building occupants, and emergency responders. International Fire Code (IFC) 2021 1207.8.3 Chapter 12, Energy Systems requires that storage batteries, prepackaged stationary storage battery systems, and pre-engineered stationary storage battery systems are segregated into stationary battery bundles not exceeding 50 kWh each, and each bundle is spaced a minimum separation of 10 feet apart and from the building wall. National Fire Protection Agency (NFPA) 855 establishes requirements for design, construction, installation, commissioning, operation, maintenance and decommissioning of stationary energy storage systems and applies to battery installations over 70 kWh. UL 9540—Standard for Safety Energy Storage Systems and Equipment outlines safety requirements for the integrated components of an energy storage system requiring that electrical, electro-chemical, mechanical and thermal energy storage systems operate at an optimal safety level. UL 9540A—Test Method for Evaluating Thermal Runaway Fire Propagation in Battery Energy Storage Systems implements quantitative data standards to characterise potential battery storage fire events and establishes battery storage system fire testing on the cell level, module level, unit level and installation level. Design, construction, installation, and operation of a BESS Because these requirements are continuously evolving, careful investigation of all standards must be performed before beginning the design, construction, installation, and operation of a BESS. Lithium-ion battery storage facilities are pivotal to the transition to a greener economy. Just as eco-friendly technology is evolving to strengthen the renewable energy industry, advanced fire prevention and life safety technology must also advance to protect it. Off-gas detection, very early warning smoke detection and thermal imaging camera systems combined with advanced alarm monitoring can help keep BESSs operating at the highest levels of safety.
The use of Photovoltaic power systems (PV), also known as solar panels, has grown over the last decade in commercial settings as many corporations have made commitments to reach zero-carbon emissions in the next few decades to help combat climate change. Solar energy has proven to be a reliable way for corporations to power their facilities without interruption to their day-to-day operations but may come with possible risk. Increased usage of PV power systems has raised awareness of the fire risks these technologies may present. According to The Hartford, “From 2017 to 2018, solar-related fires rose 36%, with the majority of fires affecting commercial buildings.” Overcharging and overheating of electrical equipment There are many possible causes of fire outbreaks due to the use of solar panels, including abuse factors like poor maintenance of the PV panels themselves, delayed cleanings and debris removal, and failure or inability to protect panels against damage. Other factors like lightning and surge suppression, overcharging and overheating of electrical equipment, and short circuiting also pose an increased risk. In large-scale commercial facilities like warehouse distribution centres, solar panels are often installed on the roof of the building, making a fire event difficult to spot until the fire has already spread and increased in temperature, posing a life safety risk to all those working inside. Traditional fire suppression solutions Additionally, traditional fire suppression solutions like sprinklers are unable to be installed on the roofs of these facilities due to possible risk of damage done to the roof, environmental conditions, and an overall lack of space, meaning there is no suppression technology available to slow or prevent the rate of growth of a fire. This makes a solution that can detect a fire as soon as possible very necessary to help protect the building itself, your assets, and most importantly, your people. Identifying a cost-effective, reliable solution Linear heat detectors (LHDs) have proven to be the most effective and inexpensive solution to detect a fire event. LHDs are comprised of a copper wire with an outer sheath that melts away in the event of a fire, thus setting off an alarm. Solar panels installed on the roof of the facility makes them susceptible to environmental factors like weather, and the jacket or sheath outside the LHD wire itself can withstand environmental conditions that could deteriorate other forms of detection. The LHDs are installed directly underneath the PV panel wires, and when paired with Confirmed Temperature Initiation technology, they can discern whether an increase in temperature has been caused by a mechanical short in the linear heat detector and a thermal alarm activation – helping reduce the rate of false alarms. Roof fire caused by PV panels Due to their proximity to the solar panels, fire events are detected quickly, triggering alarms as soon as high-heat temperatures reach the copper wire – allowing for a timely response. Having the LHD installed directly underneath the solar panels also helps pinpoint exactly where the fire outbreak started, leading to a more effective response when first responders arrive on the scene, making this solution more practical and cost-effective than spot detection sensors that require costly maintenance and inspection. A timely and accurate response to a roof fire caused by PV panels can determine the difference between stopping significant damage to the roof and major reconstruction of the entire facility. Importance of enhanced protection and routine maintenance There are a multitude of actions that can be taken to prevent a PV or solar panel fire event from occurring, including routine maintenance and cleaning, clearing debris, and ensuring solar panels are not overcharged or overheating. The placement of solar panels on roofs makes a potential fire risk especially dangerous to occupants inside of the facility due to the overhead location. Fire events can occur due to outstanding factors like weather, making fire detection solutions necessary to, first and foremost, help protect occupants inside large-scale commercial warehouses, while ensuring assets and the building itself are safe. Linear Heat Detectors are an inexpensive solution that can quickly identify a fire event, alert first responders for a timely response, and withstand environmental conditions – remaining reliable and able to detect a fire event even in harsh conditions and suitable for the protection of facilities, assets, and most importantly, life. Everon can help implement linear heat detectors that provide comprehensive fire protection within critical equipment and across large areas while lowering the total cost of ownership.
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, now announced the release of its HikCentral Lite (HCL) V1.1.2 all-in-one units. Designed for small and mid-sized businesses (SMBs) and the integrators who support them, the new units combine streamlined deployment, expanded free channels, and a unified software foundation for reliable, everyday security. Newly upgraded platform "Our newly upgraded platform redefines SMB security by eliminating the initial software cost, giving integrators an enterprise-grade solution at competitive prices they can deploy quickly,” said John Xiao, Vice President of Marketing, Hikvision USA. “This new release is entirely focused on driving speed and performance for our partners and end-users, ensuring predictable costs and pain-free scaling." LiteVMS RM, G7, and B1U models The LiteVMS RM, G7, and B1U models arrive preconfigured with HCL V1.1.2, giving integrators a ready-to-deploy system that behaves consistently across sites. Each unit includes an Intel® i7 processor, an integrated managed PoE+ switch, hot-swappable drive bays, TPM 2.0 hardware protection, and storage options from 20 TB to 80 TB. This tuned hardware architecture shortens installation time and reduces service calls by providing a predictable, stable starting point for every project. Set of free included channels HCL V1.1.2 expands its set of free included channels and adds powerful built-in capabilities that help teams work faster, including: Unified video and access control in a single interface High-capacity live view and multi-channel playback People counting and scene analytics Person and vehicle classification Smart VCA search for streamlined investigations Mobile app access for remote visibility Hikvision’s streamlined request workflow For customers looking to accelerate search workflows, HCL V1.1.2 integrates seamlessly with AcuSeek NVRs for rapid natural-language video search and on-device retrieval. AcuSearch further enhances precision filtering. Together, these tools give organisations a clear upgrade path as their needs expand while keeping the same familiar HCL platform. Licensing is simplified through Hikvision’s streamlined request workflow for integrators, and a direct purchase portal is available for end users who need quick, frictionless expansion.
Access control applications
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced now that Ki Charter has expanded its contract following initial success. ZeroEyes’ proactive gun detection and intelligent situational awareness solution will now be deployed across the school’s San Marcos campus. Largest residential treatment centre Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school serves over 6,500 students annually (500% mobility rate) with a dedicated team of educators and staff. The San Marcos campus is located within the 65-acre San Marcos Treatment Centre, the largest residential treatment centre in Texas. The centre houses approximately 200 residents (and community students) who attend Ki Charter, and employs 425 staff members, including 50 from Ki and 375 from the San Marcos Treatment Centre. Level of real-time awareness “At Ki Charter, we serve a unique population of behaviourally challenged students, so our approach to security has to be comprehensive, proactive, and intentional,” said Dr. Jerry Lager, Superintendent of Ki Charter. “Our Safety and Security Committee, campus teams, mental health staff, and local law enforcement all play a role in preventing and de-escalating potential threats, but ZeroEyes added a level of real-time awareness we simply didn’t have before. After seeing how effective the technology was, expanding its use was an easy decision.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Multi-layered safety program “Ki Charter has built a thoughtful, multi-layered safety program, and we’re proud to continue to play a role in strengthening it,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “Their leadership is deeply committed to protecting students and staff, and this expansion proves that they understand that proactive security is essential on a campus of this size and complexity.”
Acoem, a pioneer in advanced physical security solutions, announced that a large North American utility is utilising its ATD Gunshot Detection system to protect critical infrastructure at multiple sites across the country. Over the past few years, utilities across the United States have faced a troubling trend: gunfire directed at electrical substations and other energy assets. Whether the intent is vandalism, sabotage, or reckless target practice, the results are the same. A single rifle round can destroy a million-dollar transformer that could take months to replace. This happens when the cooling fluid drains from the transformer. Once the fluid is lost, the unit quickly overheats and frequently ignites. Physical attacks on critical infrastructure A recent DHS Homeland Threat Assessment concurs, stating, “We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals…” One of the largest electric power and natural gas utilities in North America recognised this risk after a number of gunshot attacks on substations disrupted power to tens of thousands of customers. In one case, power was not restored for days, and a person dependent on life support equipment tragically lost their life. The challenge Before implementing a new solution, the utility needed to reassess how its security technologies worked together. Traditional security cameras were excellent for documenting clearly visible problems, but they could not reliably detect something as small as a bullet hole in a damaged transformer, leaving a critical awareness gap. The company’s challenge was not only detecting a gunshot but doing it fast enough to act before cascading failures occurred. Threats outside the perimeter In many cases, gunfire at substations originates from hundreds of feet outside the fence line. The sound of the muzzle blast may never reach the site, leaving only the supersonic ballistic wave as evidence of incoming rounds. A system limited to triangulating muzzle blasts within a perimeter would miss these long-range threats entirely. Integration with security cameras and VMS Facing these unique requirements, the utility sought a technology that could provide instant notification with video and audio verification. This capability was essential to confirm whether an event was malicious or accidental. Integration with the utilities existing video management system (VMS) was a requirement, while direct control of a pan-tilt-zoom (PTZ) camera would allow operators to focus immediately on the source of the gunfire and determine if an actual threat existed. "We needed immediate, accurate alerts to prevent catastrophic damage,” said the utility’s physical security program manager. “Whether a threat is close-range or from a high-powered rifle fired from hundreds of feet away, we needed a modern, self-contained, highly accurate system to provide a full picture.” The requirement of a closed, secure network Cybersecurity was another defining requirement for this utility. The company prohibits internet connectivity within its operational network, a strict “air-gapped” policy that rules out any cloud-based system. For these secure environments, any new security technology must operate entirely on-premises, integrating directly with existing video and access control platforms. Finding the correct solution To address the complex nature of the threats and meet these stringent demands, the utility required a specialised solution that avoided a full infrastructure overhaul. After extensive testing, the utility selected Acoem’s ATD (Acoustic Threat Detection) system. The company has now deployed numerous detection systems across multiple states and regions, with new installations continuing every week as part of an ongoing modernisation plan. A principal reason behind choosing the Acoem ATD system was based on how the system works compared to legacy solutions. Instead of sending audio data from multiple sensors to a remote server, the Acoem sensor processes detection right on the device. When a gunshot occurs, it detects both the muzzle blast and the ballistic wave, confirming the event and calculating its location instantly. Cybersecurity requirements of restricted internet access Processing analytics on the edge is instant and gives operators the time they need to respond. That might mean rerouting power, isolating a substation, or taking a transformer offline before it fails. Having that situational awareness can make the difference between a quick repair and an extended regional outage. Acoem developed an on-premises version of its Cadence software specifically to meet the utility’s cybersecurity requirements of restricted internet access. The platform displays live maps, sensor health, and provides audio verification clips that allow operators to hear what the sensor heard while viewing the shooter’s position overlaid on the map. Cadence integrates directly with the utility’s Avigilon video management system. “Running software on-premises was non-negotiable,” said the utility’s program manager. “We needed the benefits of automation and analytics without exposing operational systems to the internet.” Situational awareness with eyes on target Detection is only half the story. Integration with a PTZ camera on site provides immediate visual confirmation. When a gunshot is detected, the sensor automatically commands the camera to pivot to the coordinates of the source. Operators can see what happened as it happens, even if the shooter is several hundred yards outside the fence line. In some locations, thermal or infrared cameras may complement the acoustic sensors to detect movement in tree lines or along rights-of-way. This pairing of acoustic and visual intelligence transforms response operations, allowing the utility security team to verify alarms in real time and coordinate with law enforcement or maintenance crews as needed. Hunters or vandals? In one recent example, the utility’s Acoem ATD system detected gunfire at a remote substation. Through the linked PTZ camera, operators quickly confirmed that the shots came from hunters outside the perimeter and that there was no threat to equipment or personnel. The team was able to assess the situation instantly without dispatching crews or contacting law enforcement. Scalability and integration flexibility The utility required open standards and interoperability. They did not want a proprietary system that locked them into a specific platform. The Acoem ATD system met that demand, integrating through APIs with their existing Avigilon infrastructure. Whether a site runs on VMSs such as Avigilon, Milestone, or Genetec, the ATD sensors connect seamlessly within the same ecosystem. Just as important, the solution had to scale. The utility began with a few high-risk sites and has expanded steadily without redesigning its network. This “start small, grow fast” approach aligns with how the organisation evaluates, validates, and then standardises new technologies. CIP-014 compliance and beyond The North American Electric Reliability Corporation’s CIP-014 standard mandates physical security measures for critical transmission substations, including threat detection. The utility wanted to go further. It set a new benchmark for awareness, resilience, and uptime. Acoustic threat detection is now a key component of its operational strategy, providing actionable intelligence that prevents damage rather than documenting it after the fact. A smarter path forward Protecting critical infrastructure today means recognising that not every threat is digital. A single bullet can cause as much disruption as a cyberattack. The key is giving operators the real-time data they need to act quickly and decisively. By combining edge-based AI, on-premises software, and open integration with existing security systems, Acoem’s ATD system has given the utility company the situational awareness it needed to protect its assets and its customers. The system keeps vital equipment online, strengthens compliance, and helps safeguard the communities that rely on uninterrupted service. “Securing the grid now demands both digital and physical vigilance,” said the utility’s program manager. “Gunshot detection has become a critical layer of defense for the infrastructure that powers our daily lives.”
Having an emergency response plan is essential for businesses of all sizes, across every industry. But in energy facilities, particularly those dealing with hazardous or explosive materials, it becomes a crucial, and often strictly regulated life safety requirement. In an emergency, not only is it critical to identify where all employees are located, but also that any visitors, contractors, or vendor partners are all accounted for and safely evacuated. When an alarm sounds, duty of care requirements and regulatory requirements dictate that companies have protocols in place to effectively respond to an emergency and know precisely who is on-site and that everyone can exit as quickly and safely as possible. Equally important is making sure that everyone at the facility is aware of and follows emergency guidelines. Challenge According to data compiled in the 2021 Guide to the Business of Chemistry from the American Chemistry Council, “Facilities in Texas and Louisiana produce 80 percent of the nation’s primary petrochemical supply, and Texas chemical production tops the nation by far, with chemical shipments valued at $117.5 billion, representing a major portion of the region’s economy, but also the potential for significant security risks and challenges.” Some petrochemical plants use a traditional, paper-based mustering solution for emergency response scenarios. These manual methods of notifying, mustering, and accounting for personnel can result in costly, potentially dangerous inefficiencies during an emergency. Site access control and visitor management processes are also typically stand-alone and do not communicate with each other, which forces manual processes to log and reconcile individuals when mustering during an emergency response evacuation or a required emergency drill. To do this, chemical plant security staff typically prints the logs from on-site access control and visitor management systems, then crosses off the names of individuals from the lists when they are accounted for manually. Each list is reconciled on its own and by hand. This outdated process can take hours to complete and holds a potentially high risk of error. Solution Everon is working with various Houston area petrochemical plants to update their emergency notification systems with innovative, cost-effective solutions. According to these customers, Everon provides comprehensive solutions to fit their needs, and maintains a level of professionalism and dedication to service excellence that other companies too often fail to meet. One solution Everon has proposed to combat this problem across chemical plant facilities consists of three integrated technologies that include: Cloud-Based Access Control: An access control system that is cloud-based may be easier to implement and have a lower cost of entry. This system provides a log of all badged personnel on site to the mustering system for accounting of personnel during an emergency. Visitor Management System: This system allows visitors to pre-register and be managed electronically when they come to the plant while providing visibility in case of an emergency. Mustering Software and Card Readers: These provide seamless management of emergency events, including electronic mustering, unit accountability, and ERT readiness. Access control logs from the cloud-based system With this solution, access control logs from the cloud-based system and visitor management logs can automatically tell plant operations how many people are on-site through the mustering software. A number of portable mustering units were commissioned with card readers, which allow for quick and easy confirmation of badge reads from fixed muster locations. In addition, warning lights and speakers were also added at plant entrances to alert personnel to emergency events. The mustering system’s mustering software takes the information directly from the access control and visitor management logs and communicates directly with the plant operators. This allows them to manage the entire emergency using the software, starting with an accurate count of who is in the plant and then quickly and easily managing individuals as they safely exit. Emergency response events can be initiated with the click of a button and significantly improve the amount of time needed to accurately count the number of people evacuating the plant. Installations are consistently performed with personal safety in mind. Everon believes that no work is worth doing if it’s not done safely and in full compliance with governing regulations and standards. No recordable injuries or lost-time events were recorded during any of the projects completed by Everon at any Houston area petrochemical plants. Results According to one client, "Our previous method of pen and paper was very inefficient and antiquated. Everon's solution with our emergency response protocol gives us the cutting edge in technology. Not only does it allow us to become well-organised and systematic, but safer." Emergency response drills at each petrochemical plant are now completed in minutes, not hours, and emergency responders receive visual confirmation when everyone is confirmed as safe. The plants consider having digital reports of employees that are on- and off-site at the plant a major bonus, along with the ability to deploy mass notifications between the plant and local communities. Said another client, "We are extremely satisfied with our choice of Everon as our life safety partner and are currently working with them to update analog cameras in our plant, as well as advance our infrastructure to bring other innovative security, health and operational monitoring technology solutions to our facility."
Kitakobushi Resort operates multiple distinctive properties in Shiretoko, Hokkaido – a UNESCO World Natural Heritage site since 2005. Their portfolio includes a large resort hotel overlooking the Sea of Okhotsk, a forest retreat, private cottages, and a historic hotel with over 60 years of operation – all showcasing the region’s stunning landscapes and local charm. As Shiretoko grew in popularity, maintaining a consistently safe and comfortable environment across multiple dispersed properties became increasingly important. This demand prompted a comprehensive review of the resort’s aging surveillance infrastructure. Challenge Towards smarter, unified, and more efficient video management As visitor numbers continued to rise, expectations for safety and operational efficiency increased across Kitakobushi Resort’s dispersed properties. The limitations of the resort’s aging, siloed surveillance system became particularly evident at its two flagship properties: Kitakobushi Shiretoko Hotel & Resort and KIKI Shiretoko Natural Resort – where modernisation became a strategic priority. The resort faced three critical challenges: Upgrading aging infrastructure: The resort’s existing cameras and NVR had served reliably for many years, but an upgrade became essential to maintain smooth operations. Unifying scattered monitoring operations: With several properties to oversee, each facility’s video was previously monitored separately, limiting operational efficiency and making management more complex. The resort wanted to enable remote monitoring, allowing staff to view live footage from anywhere without needing to be on-site. Maximising coverage while controlling costs: Comprehensive coverage across facilities required numerous cameras spanning public spaces, parking areas, and back-of-house operations, yet keeping the system cost-effective remained an important consideration. The resort sought a solution that could modernise infrastructure, unify operations, and maximise value while achieving smart upgrading within budget constraints. Solutions Smart video integration for a safer, more connected resort As a global pioneering security solution provider, VIVOTEK was selected for its proven reliability, performance, and strong local support in Japan. The solution deployed 58 VIVOTEK network cameras across key areas at Kitakobushi Shiretoko Hotel & Resort and KIKI Shiretoko Natural Resort, with centralised management through two NVR-Pro units powered by System K’s SK VMS. Strategic camera deployment included: SD9161-H (17 units): This PTZ camera, installed throughout hotel interiors and parking areas, offers 10x optical zoom and flexible pan-tilt-zoom capabilities. Staff can effortlessly monitor wide areas and zoom in on points of interest in real time — all without leaving the office. FD9369 (41 units): Compact and discreet, this dome camera was installed mainly indoors, preserving the resort’s natural ambiance while delivering reliable, cost-effective performance. By unifying all 58 cameras into a single management platform, the resort gained complete visibility across both properties. The centralised system streamlines daily monitoring, reduces patrol labour, and enables faster response to on-site needs. Staff can now monitor multiple facilities from a single interface, significantly improving overall operational efficiency. Result and customer feedback Making resort operations smarter and guest experiences safer The VIVOTEK solution has transformed resort operations, enabling centralised monitoring, real-time flexibility, and enhanced safety. Key improvements Streamlined multi-facility management: Staff can now monitor multiple properties from a single interface. This unified system eliminates the need to check each facility separately, simplifying operations and boosting overall efficiency. Flexible monitoring with PTZ cameras: The SD9161-H PTZ cameras allow staff to pan, tilt, and zoom in real time from any location, reducing the effort required for routine monitoring. Seamless aesthetic integration: The compact FD9369 dome cameras blend discreetly into the resort’s interior, preserving the natural ambiance while delivering reliable performance at a cost-effective price. Enhanced safety and guest experience: By combining advanced video technology with centralised management, the resort ensures a safe, seamless, and welcoming experience for both staff and guests. Customer insights "Based on System K’s recommendation, we explored and selected VIVOTEK due to its stability, intuitive interface, and excellent value. VIVOTEK offers strong warranty support, reliable performance, and an easy-to-manage system. Integrating all cameras with the NVR-Pro platform allows us to manage multiple properties in one place, greatly improving daily operations," Chief Digital Officer (CDO), Kitakobushi Resort. "VIVOTEK offers an impressive balance of high functionality and affordability. With strong local support and ongoing firmware updates, the system continues to deliver reliability and satisfaction," Sales Representative, System K (VIVOTEK Distributor).
Intersec Dubai 2026 news
Dubai World Trade Centre — Sheikh Saeed Hall 2, Stand C43, January 12–14, 2026. Organisations of every size and type have discovered how connected digital access helps them implement smart...