Mobile Access Trends

What is the role of ethical hacking in physical security?
What is the role of ethical hacking in physical security?

In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?

What is the next generation of physical security solutions?
What is the next generation of physical security solutions?

Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?

How are security systems transitioning from reactive to proactive?
How are security systems transitioning from reactive to proactive?

Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?

HID highlights digital transformation, futureproofing among access trends
HID highlights digital transformation, futureproofing among access trends

Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander.  Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important.  In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research.  In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander.    Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams.  Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually.  Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards.  Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.

Latest Access control news

DNAKE Cloud Platform V2.3.0: Smarter home solutions
DNAKE Cloud Platform V2.3.0: Smarter home solutions

DNAKE, a foremost provider of video intercom and smart home solutions, has rolled out Cloud Platform versions 2.1.0, 2.2.0, and 2.3.0. Designed to deliver more control, flexibility, and possibilities, these updates strengthen team collaboration, expand device integration, and simplify resident access. Key highlights of DNAKE Cloud Platform 2.1.0–2.3.0 1. Multiple Property Manager Accounts with Custom Permissions A single site now supports multiple property manager accounts, each with customisable access and management permissions. Team members get their own logins, eliminating the need to share a master account. 2. Two-Factor Authentication (2FA) Adds an extra layer of security to every login. Even if a password is compromised, login attempts cannot proceed without the verification code sent to the registered email address. 3. Call and Unlock Permissions by Apartment Configure which apartments can call or unlock specific devices at the apartment level. This is particularly useful for shared access points such as parking gate stations that require restricted resident access. 4. Remote Emergency Exit Control Pre-configure emergency exit groups and unlock them remotely from the cloud with one tap, helping improve emergency response efficiency. 5. QR Code Self-Registration for Residents Generate QR codes directly from the cloud — no indoor monitor required. Residents simply scan the code to complete the registration process themselves, eliminating manual setup and email-based onboarding. 6. Elevator Control Integration Connect elevator control modules directly to the cloud. A single QR code can now be used for both door access and elevator control, allowing visitors to access authorised floors seamlessly. 7. Multi-Home Management Under One Account A single resident account can now be linked to multiple homes, allowing residents to manage multiple homes without switching accounts. Additional enhancements Beyond these seven highlights, there is much more to explore across DNAKE Cloud 2.1.0 through 2.3.0. Resident Registration and Access: Personal PIN code setup and offline QR code verification Device Integration and Smarter Interactions: IPC monitoring via indoor monitors, smart lock integration, NFC-based unlocking, and Smart Pro calling to management centers Efficient Management and Smart Alerts: Device abnormality alerts via email and targeted messaging for specific apartments or buildings Batch Operations and Improved Efficiency: Batch apartment creation and batch personnel import for access control And there are still more UX refinements across the platform — delivering a faster, cleaner, and more intuitive user experience. Supported models All new features are available across a wide range of DNAKE devices: Door Stations: S617, S615, S215, S212, S213K, S213M, C112 Indoor Monitors: E217, E216, E214, H618, H616, H612, E416, A416 Master Station: 902C-A Access Control: AC01, AC02, AC02C  Elevator Control: EVC-ICC-A5 No matter your setup, there’s a supported model ready to make the most of Cloud 2.1.0 through 2.3.0. Coming soon: Version 2.4.0 Even more powerful features are on the way, including: Unified License Management: Simpler purchasing, without indoor monitor verification Sub-Installer Account Management: Installers can create and manage sub-admin roles with their own permissions Upgraded Import Templates in .xlsx format: Better inline guidance and cleaner layout Smoother Firmware Upgrades: Improved model selection and optimised remote flow Availability DNAKE Cloud Platform versions 2.1.0, 2.2.0, and 2.3.0 are now available globally.

Inner Range updates Traka Keylocker integration
Inner Range updates Traka Keylocker integration

  Inner Range has recently announced the release of its latest update to the ASSA ABLOY, Traka Keylocker Integration for the Integriti unified Access Control, Video Surveillance and Security solution delivered in their intelligent management software, further strengthening its ecosystem of enterprise-grade integrations.   Designed to deliver seamless interoperability between physical access control and intelligent key management systems, the latest update enhances operational efficiency, audit transparency, and security compliance across critical infrastructure, commercial, and government environments. Unified security and key management The Traka integration enables organisations to: Centralise control of electronic access and physical key usage within a single platform Automate key access permissions based on Integriti user credentials and roles Improve audit trails and compliance reporting with synchronised event logging across systems Reduce risk of unauthorised key usage through real-time monitoring and enforcement This integration supports Inner Range’s vision of a unified security architecture—bringing together access control, credential management, and physical asset tracking into a cohesive operational framework.   Enhanced capability for high-security environments The latest plugin release introduces performance improvements and enhanced system compatibility, ensuring robust deployment across enterprise-scale environments.   Combined with Integriti’s Security First design principles and support for high-assurance sectors—including government and critical infrastructure—the Traka integration provides an additional layer of control for organisations managing sensitive assets and restricted access zones.             Supporting a growing integration ecosystem “This latest release reflects our continued investment in open, scalable integrations that solve real-world operational challenges,” said Steve Mitchell, Director of Product, at Inner Range. “By integrating intelligent key management with our access control platform, we’re helping customers achieve higher levels of security, accountability, and operational efficiency—all from a single interface.” Availability The Traka Keylocker Integration Plugin (v1.4.0.3572) is available now to Inner Range partners and customers via the Inner Range website.

TURBOO Turnstile Cloud Platform: Modern access control
TURBOO Turnstile Cloud Platform: Modern access control

As access control projects continue to expand in scale and operational complexity, traditional standalone turnstile management is rapidly being replaced by cloud-based centralised management platforms. For multi-site, multi-project, and cross-region deployments, customers now demand higher standards in remote control, system stability, operational efficiency, and centralised management. As a professional turnstile manufacturer and access control solution provider, TURBOO develops intelligent cloud platforms that help integrators, distributors, and facility operators achieve smarter and more efficient turnstile management. What Is a Turnstile cloud platform? A turnstile cloud platform is a cloud-based access control management system that enables remote control, centralised monitoring, and intelligent maintenance of turnstile gates through network connectivity. Compared with traditional local control systems, cloud platforms transform isolated turnstile devices into a unified, remotely manageable, and data-driven smart access control system. Challenges of traditional Turnstile management In conventional projects, operators often face the following problems: Distributed devices with difficult centralised management On-site parameter adjustment requirements Lack of standardised management across multiple projects Difficult overseas technical support and maintenance As project scale increases, these operational issues become significantly more challenging. The core value of a turnstile gate cloud platform is transforming “passive maintenance” into “proactive intelligent management.” Core functions  1. Remote Turnstile Control The cloud platform supports real-time remote operation of turnstile gates, including: Gate opening / closing Normally open / normally closed mode switching Temporary access strategy adjustment Rapid response during peak traffic periods This allows operators to manage access control systems remotely without visiting the site, making it ideal for large-scale projects such as airports, metro stations, industrial parks, and commercial buildings. 2. Remote Parameter Configuration Different application scenarios require flexible turnstile parameter adjustments, such as: Opening and closing speed Infrared detection logic Anti-pinch sensitivity Passage mode settings Through the cloud platform, operators can achieve online modification, batch configuration deployment, and unified multi-device management, significantly improving operational efficiency while reducing manual errors. 3. Online Fault Diagnosis & Predictive Maintenance Traditional maintenance often relies on on-site troubleshooting and manual repair, resulting in high costs and slow response times. The intelligent turnstile gate cloud platform enables: Real-time device monitoring Automatic fault alarms Abnormal data recording Remote diagnosis and troubleshooting Many operational issues can be resolved remotely, minimising downtime and improving system reliability. 4. Centralised Multi-Site Management For enterprises managing multiple projects, the platform provides: Unified multi-site management Group device control Hierarchical permission management Enterprise-level data administration This helps companies standardise operation and maintenance processes across all access control projects. 5. Data Monitoring & Operational Analysis The cloud platform collects and analyses operational data such as: Passenger flow statistics Usage frequency analysis Peak traffic identification Fault history analysis These insights help operators optimise traffic flow strategies, improve efficiency, and support data-driven management decisions. Typical Applications of Turnstile Gate Cloud Platforms Smart Office Buildings: Unified management for multi-building access control systems Airports & Metro Stations: High-throughput and high-security access management Industrial Parks & Factories: Remote maintenance and multi-zone access control management Government & Public Facilities: Enhanced security, stability, and centralised control Overseas Projects: Efficient remote technical support and cross-region management Advantages of a cloud-based Turnstile management system  Lower Maintenance Costs: Reduce manual inspections and minimise on-site maintenance frequency. Improved Operational Efficiency: Centralised management enables faster response and real-time system adjustments. Enhanced System Stability: Real-time monitoring and predictive alarms reduce downtime risks. Flexible & Scalable Deployment: Support multi-project expansion, flexible configuration, and standardised management. How to choose a reliable Turnstile gate cloud platform supplier When selecting a turnstile manufacturer or cloud platform supplier, customers typically focus on the following capabilities: Long-term system stability and reliability Mature remote control and configuration technology Third-party system integration capability Custom development and OEM/ODM support Experience in global and overseas projects As an experienced turnstile factory and access control system manufacturer, TURBOO provides integrated hardware, software, and cloud platform solutions for global partners. Future trends of Turnstile cloud platforms With the development of smart cities and intelligent campuses, turnstile cloud platforms are evolving toward: AI-driven operational analysis Deep integration with contactless access systems Cloud-edge collaborative architecture Data-driven operational optimisation Modern turnstile cloud platforms are transforming access control systems from standalone equipment into intelligent management ecosystems. Conclusion For modern access control projects, cloud-based turnstile management platforms not only improve operational efficiency, but also significantly enhance system stability, scalability, and controllability. As project complexity continues to grow, intelligent cloud platforms will become one of the core capabilities of future turnstile and access control solutions.

Sectigo unveils new brand, digital trust platform
Sectigo unveils new brand, digital trust platform

Sectigo, a pioneer in automated Certificate Lifecycle Management (CLM) and digital certificates, today announced a new brand identity and corporate positioning centred on a clear vision: delivering Simplicity at Scale as digital trust grows more complex, distributed and critical to operations. Delivered through Sectigo Certificate Manager (SCM), this approach enables a more coordinated way to automate certificate management at scale. For decades, Public Key Infrastructure (PKI) and the digital certificates within it operated quietly in the background. That has changed. Shorter certificate lifespans, growing certificate volumes across distributed environments and accelerating PQC migration timelines are placing mounting strain on IT and security teams. Pushing traditional tools The result is a growing, often hidden risk: certificates expiring more frequently across systems with less room for error, pushing traditional tools and fragmented automation beyond what they can sustain. “Digital trust has evolved faster than most organisations anticipated, and how it is managed must evolve just as quickly,” said Kevin Weiss, Chief Executive Officer at Sectigo. “We’ve spent years building a platform to support digital trust at global scale, and now we’re stepping forward to help customers with a more coordinated approach to automation. Our focus is delivering Simplicity at Scale, bringing visibility, automation and governance together so organisations can eliminate hidden risks. As a global leader in digital trust, Sectigo is defining the standard for how organisations secure and manage their future.” Replacing fragmented scripts To respond to this shift, Sectigo is modernising how automation is delivered through SCM, replacing fragmented scripts, siloed tools and tasks with a coordinated approach. The result is a simpler, more scalable way to manage certificates, reducing complexity today while preparing organisations for what’s next. This is enabled through: Centralised automation: Automate beyond renewals, including issuance, validation, deployment, replacement and revocation from a single platform, streamlining operations and minimising manual work. Deeper integration with AI-assisted workflows with governance intact: Connect AI agents and manage certificates through natural language, enabling more intuitive automation while preserving control and visibility across trust critical environments. Expanded visibility and control across certificate authorities (CAs): Discover, monitor and manage certificates across public and private CAs, hybrid environments and critical systems through an expanding set of CA connectors, providing centralised visibility and control without managing each separately. Certificate volumes grow Reduced friction in domain validation: Automate domain control validation (DCV), reducing bottlenecks as validation cycles outpace certificate lifespans and keeping renewals consistent as certificate volumes grow. Readiness for cryptographic change: With Private PQC in SCM, test and manage PQC certificates within existing workflows without disrupting current operations, while aligning with emerging CA/Browser Forum approaches to PQC certificate issuance. Increasingly complex environments “We’re not just repositioning how we talk about automation, we’re putting it into practice,” said Mark Bilger, Chief Product and Engineering Officer at Sectigo. “Through Sectigo Certificate Manager, our orchestrated approach brings the full certificate lifecycle into one place, so customers can rely on the platform they already know and trust to manage digital trust at scale as complexity grows.” Sectigo’s partner ecosystem plays a critical role in bringing its approach to market. Through the Sectigo Partner Platform (SPP), managed service providers can deliver CLM as a recurring managed service, giving customers greater choice in how they automate, manage and govern certificates across increasingly complex environments. Revenue-generating managed service “Partners are essential to how customers achieve simplicity at scale,” said Jairo Fraile, Vice President, Global Partner Sales, at Sectigo. “With the Sectigo Partner Platform, partners can extend how digital trust is delivered while also turning certificate lifecycle management into a revenue-generating managed service.” Sectigo has introduced a new visual brand identity that underscores its evolution into a more platform-led digital trust company. Designed to embody clarity, confidence and momentum, the refreshed logo and brand system sharpen Sectigo’s story and value while reinforcing its focus on dependable digital trust today and innovation for the next era of cryptographic change. “This rebrand marks an important milestone for Sectigo, reflecting our commitment to aligning every part of how we operate and innovate to help customers manage complexity today and stay ahead of what’s next,” adds Weiss.

Access control applications

ZeroEyes enhances Sayreville school security
ZeroEyes enhances Sayreville school security

ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its AI gun detection and intelligent situational awareness platform has been deployed by New Jersey’s Sayreville Borough School District to protect students and faculty against gun-related violence. Located in Middlesex County, the district serves approximately 6,500 students and employs approximately 750 staff across 10 buildings, including a high school, middle school, upper elementary school, four K–3 elementary schools, two preschools, and a specialised 18–21 program that operates a publicly accessible store and café for job training. With strong community involvement, the district prioritises proactive safety measures and operates on the principle of staying ahead of evolving security needs. Incident management software ZeroEyes enhances the district’s comprehensive, multilayered security strategy and will be integrated with Singlewire’s InformaCast incident management software. This enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices, supporting faster, more coordinated emergency responses and ensuring critical information reaches those who need it most. “Our responsibility is to create an environment where students and staff can focus on learning while knowing that safety is taken seriously,” said Dr. Richard Labbe, superintendent of Sayreville Borough School District. “By integrating advanced technology, such as ZeroEyes, into our broader security framework, we are strengthening our ability to identify potential threats early and act quickly, helping us move from awareness to action in a matter of moments.” Secure learning environment ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and school security teams as quickly as 3 to 5 seconds from detection. “Sayreville Borough School District’s leadership has demonstrated a strong commitment to creating a safe and secure learning environment,” said Mike Lahiff, co-founder and CEO of ZeroEyes. “We’re proud to support their efforts by turning existing security infrastructure into a source of timely, reliable insight that supports faster, more confident action.”

ZeroEyes AI gun detection: School security revolution
ZeroEyes AI gun detection: School security revolution

ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that Amos P. Godby High School in Tallahassee, Florida, is the first in the nation to deploy a three-part integrated solution called RADAR (Real-time Alert, Detection And Response). This solution combines ZeroEyes’ AI-based gun detection and situational awareness solution with Ark Strategic’s 3D Mapping solution and Campus Guardian Angel drones to provide comprehensive, real-time threat detection, alerting, and response in the case of a gun-related incident. Enhancing situational awareness "ZeroEyes Al gun detection and Ark Strategic’s 3D mapping solution, combined with Campus Guardian Angel, represent the cutting edge of school security in the United States," said Jimmy Williams, Chief of Safety, Security, and Emergency Management for Leon County School District. "When leveraging these tools collectively in Project RADAR, we’re continuing to set a national standard for school security with solution-oriented and mission-ready resources.” Ark Strategic’s 3D mapping solution blends cutting-edge aerial and interior mapping technologies to deliver unparalleled operational intelligence for its customers. When integrating the exterior and interior intelligence with ZeroEyes AI threat detection software, the solution empowers first responders to quickly identify critical assets, enhance situational awareness, and respond to threats with greater speed and precision. Situational awareness software layers “At Ark Strategic, our mission is to turn the entire campus into actionable intelligence,” said Chris Yellina, Founder & Chief Product Officer at Ark Strategic. “With inside-and-out coverage, responders have a clearer picture of the environment before they ever make entry.” ZeroEyes' AI threat detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Creating a safer environment When a detection occurs at a location mapped in 3D, each camera alert is automatically tied to its exact position on the map, enabling responders to navigate instantly to the area of concern. The system is entirely cloud-based, requiring no installation for local law enforcement. Annotated maps display camera placement, fields of view, and potential blind spots, while operational layers and interactive measurements empower security teams to assess situations and make informed decisions quickly. In tandem, or if a panic button is pressed, Campus Guardian Angel deploys non-lethal drones within seconds, tracking the assailant and navigating obstacles to provide support and situational awareness. While in operation, the drones actively distract, delay, and disrupt the perpetrator, buying precious time and creating a safer environment for students and staff. Truly comprehensive security solution “Amos P. Godby High School’s deployment of RADAR marks a historic step forward in school safety,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “This integrated and innovative approach further demonstrates how utilising a multilayered technology solution can protect students and staff more effectively, setting a new standard for safety nationwide.” "We are thrilled to partner with the innovative team at ZeroEyes in launching Florida’s first-in-the-nation pilot program, which includes Godby High School, bringing together the best in AI-powered gun detection and elite human-piloted drone response capabilities to create a truly comprehensive security solution that can save lives,” said Justin Marston, CEO and co-founder of Campus Guardian Angel. Enhancing campus safety “Our innovative Active Shooter Suppression System is uniquely designed to deliver non-lethal effects that distract, delay, and disrupt a threat within seconds, buying critical time for law enforcement to protect students and staff. We are proud to be working side-by-side with companies like ZeroEyes to advance cutting-edge technology solutions to enhance campus safety in Florida and across the nation.” ZeroEyes, Ark Strategic, Campus Guardian Angel, and the district are hosting a summit June 17 and 18 at Godby High School, featuring demonstrations and discussion sessions surrounding the technologies, including reflections from school leaders on the district’s successful deployment. The event is open to local schools, law enforcement, and the media.

SmokeGo, EvacGo: Life safety in high‑rise residentials
SmokeGo, EvacGo: Life safety in high‑rise residentials

John Street, Newham, a high‑rise residential development comprising Blocks A and C, has been equipped with a comprehensive life safety solution from Advanced, incorporating SmokeGo smoke control and EvacGo evacuation alert systems to support a stay‑put fire strategy and enhance resident safety. The project, delivered as part of a wider life safety installation by Simple Life Safety Systems Limited, required a robust and compliant approach to smoke control and evacuation alert across two buildings with different heights and risk profiles. Block A is a 14‑storey, high‑rise residential block, while Block C is a smaller, four‑storey building. Each block was equipped with one SmokeGo panel and one EvacGo panel, providing dedicated control tailored to the specific needs of each structure. High‑rise residential block SmokeGo was specified to deliver active smoke control via the fire system, supporting the management of smoke in common escape routes and critical areas. Designed to comply with EN 54 Parts 2 and 4, as well as BS 7346‑8 and ISO 21927‑9, SmokeGo enables automatic and manual control of smoke control fans and dampers from a single, intuitive interface. Its simple matrix‑based configuration allowed the project team to clearly define smoke compartments and cause‑and‑effect relationships, helping ensure smoke is contained and extracted effectively in the event of a fire. EvacGo was installed as a fully independent BS 8629-compliant evacuation alert system, giving the fire and rescue service a reliable and secure means of alerting residents if evacuation beyond the affected flat is required. Each EvacGo panel is housed within a robust, tamper‑proof enclosure and is designed exclusively for use by the fire and rescue service, helping prevent misuse while ensuring clear, decisive control during an incident. Complex residential project John Newton, Director Life Safety at Simple Group, commented: “John Street was a complex residential project that required careful coordination between smoke control and evacuation alert systems. Using SmokeGo and EvacGo allowed us to deliver a fully compliant solution that aligns with the fire strategy while giving the fire and rescue service the tools they need to manage incidents safely and effectively.” The SmokeGo smoke control system and EvacGo evacuation alert system operate as separate dedicated life safety systems, ensuring smoke movement can be actively controlled while evacuation decisions remain firmly in the hands of the fire and rescue service. This layered approach supports resident safety without undermining the stay‑put strategy that underpins the building’s fire design. Implementing smoke control Shaun Scott, Applications Engineer at Advanced, added: “Projects like John Street highlight the importance of implementing smoke control and evacuation alert systems correctly. SmokeGo makes complex smoke control logic far simpler to configure and manage, while EvacGo provides a clear, compliant evacuation alert solution. Together, they deliver confidence for installers, building managers, and emergency responders alike.” With one SmokeGo panel and one EvacGo panel installed in each block, the John Street development now benefits from a coordinated life safety solution that addresses both smoke management and evacuation alerting in line with current best practice and regulatory guidance. The project demonstrates how Advanced’s specialist systems can be combined to meet the evolving safety requirements of modern residential buildings, delivering compliant, practical solutions that prioritise both resident safety and operational simplicity.

Comelit-PAC enhances genting casino fire alarm system
Comelit-PAC enhances genting casino fire alarm system

Genting Casino at Westfield Stratford City has completed a major fire alarm system upgrade with Comelit-PAC technology, delivered in partnership with installation specialist VTF&S. As the UK’s largest casino floor, including the biggest poker room in the country, Genting Stratford operates around the clock, welcoming visitors day and night. Any upgrade to critical infrastructure needed to be carried out without interrupting the flow of customers and staff, while maintaining strict safety standards throughout. Slowing response times The casino’s previous fire alarm system operated on a closed protocol, which had become increasingly restrictive. Even minor adjustments required specialist call-outs, increasing costs and slowing response times. By contrast, Comelit-PAC’s four-loop fire system offers a more flexible, open protocol approach, enabling easier maintenance and reducing long-term operational expense. The upgrade also ensures improved system reliability and faster fault identification, better suited to the demands of a busy, high-traffic venue. Careful planning and coordination Beyond the technical and visual improvements, the inclusion of Comelit-PAC’s free cloud connection allows the system to be monitored and supported remotely. Secure cloud access enables engineers to diagnose and often resolve issues without waiting for a site visit. The installation was carried out by VTF&S while the casino remained fully operational. Working in a live environment required careful planning and coordination, supported by Comelit-PAC’s technical team. This collaborative approach enabled the upgrade to be delivered with minimal disruption, while also setting the foundation for faster, more cost-effective ongoing support through remote connectivity. Implementing safety and efficiency The project’s success relied on close collaboration between Genting Casino, VTF&S and Comelit-PAC. Clear communication and meticulous planning ensured the system could be upgraded safely and efficiently while the venue continued to operate as normal. Says Ben Howley of Comelit-PAC: “This project demonstrates with the right teamwork and planning, even complex upgrades can be delivered seamlessly in a live venue. Genting Casino now has a system that was implemented safely and efficiently and simple to maintain even remotely, thanks to the strong partnership between all parties involved.”