Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
RecFaces, a global developer of enterprise-grade facial biometric software, will host an exclusive online expert panel, “Face Forward: Building the Smart Office Standard in APAC”, on June 2 at 3:00 PM IST, bringing together voices in biometrics, smart infrastructure, and workplace transformation to explore how facial recognition is rapidly becoming the new operational standard for offices across India and the wider Asia-Pacific region. As APAC’s smart office and smart building markets continue to expand at double-digit annual growth rates, driven by the rise of IT campuses, commercial real estate development, and demand for digital workplace efficiency, organisations are increasingly shifting away from traditional access cards toward identity-based biometric systems. Digital workplace efficiency The panel will examine why post-pandemic APAC has seen touchless access control, biometric office entry, and hybrid employee identity models evolve from innovation into expectation — especially for business centres, enterprise campuses, coworking environments, and modern corporate offices seeking to improve both security and operational efficiency. Hosted by RecFaces, the event will feature: Oleg Kurochkin, Business Development Director for APAC, RecFaces Farida Baichora, Product Owner, RecFaces Shashi Kumar Yadav, Co-Founder and CEO, Startologic Technologies Karan Kanal, Director, EINS Technologies India Pvt. Ltd. Workforce time tracking Designed specifically for system integrators, distributors, facility managers, business center operators, coworking providers, and organisations managing offices with 100+ employees, the discussion will address the growing business challenges facing modern offices, including outdated card systems, inefficient workforce time tracking, administrative overload for HR and security teams, and limited scalability of legacy infrastructure. Attendees will gain practical insights into how facial biometrics can help businesses: Eliminate card sharing and badge misuse Accelerate employee access with frictionless office entry Reduce administrative and HR overhead Improve workforce attendance accuracy Strengthen office security without increasing staff burden Scale seamlessly across growing office ecosystems Biometric access control The panel will also showcase real-world implementation of biometric access control, automated time and attendance, infrastructure integration, and workforce analytics. “In a region as digitally advanced and fast-evolving as APAC, smart offices are already a business reality”, said Oleg Kurochkin, Business Development Director for APAC, RecFaces. “But today, businesses need more than digitalisation alone. They need measurable operational and security outcomes. Facial biometrics helps eliminate queues at entry points, removes friction from daily office access, and at the same time protects organisations from costly security risks — from unauthorised access and physical theft to one of the most critical business threats of all: the loss of sensitive data and intellectual property.” Evaluating biometric transformation Shashi Kumar Yadav, Co-Founder and CEO of Startologic Technologies, added: “The market is clearly moving from physical credentials to trusted digital identity. For integrators and enterprise leaders, the real opportunity is not simply deploying new technology, but creating scalable ecosystems that combine security, automation, and business intelligence. This panel is about showing how that transformation can happen in practice.” In addition to market insights and use cases demonstrations, the webinar will provide attendees with implementation-focused guidance covering project lifecycles, infrastructure requirements, deployment timelines, common risks, and strategies for successful scaling, making it especially relevant for partners and enterprise stakeholders evaluating biometric transformation. Registration is now open for this limited online event. Industry professionals interested in understanding how biometric identity is shaping the future of office operations across APAC are encouraged to secure their place early.
Last year, the European IT landscape breathed a collective sigh of relief; the January 2025 deadline for the Digital Operational Resilience Act (DORA) had passed. Many organisations treated it like a finish line – a one-and-done marathon of paperwork and technical audits. Looking ahead to 2026, however, it is clear that this finish line was only a starting block for the next era of building a competitive edge for businesses. A recent report from Boston Consulting Group warns that Europe’s digital infrastructure faces a serious ‘resilience gap’ and that a large-scale or prolonged outage could cause cascading crises across essential services, including payments, financial stability, and emergency response systems. Emergency response systems Mark Appleton, Group Lead Vendor Ecosystem Development at ALSO Group, stresses that this report, amongst similar warnings, highlights exactly why 2026 is the year resilience must become measurable, necessitating an evolved role across cloud partners and IT providers. “Resilience has evolved in today’s market to become more than just a checkbox for the risk department, and instead to be a commercial differentiator and legal obligation in the post-DORA era,” says Appleton. “Against a backdrop of machine-speed threats and interconnected supply chains, orchestrated resilience paves the way for an antifragile business strategy to gain advantage. Europe’s digital ecosystem is now so interconnected that a failure anywhere can quickly escalate to failures everywhere.” Critical SaaS provider “The shift from implementation to enforcement is already visible in supervisory behaviours. Regulators need more than just seeing policy on paper; they are now demanding real-time proof of continuity under stress test audits. It’s now just as important to be able to display how your multi-vendor ecosystem behaves when a primary cloud region goes dark or a critical SaaS provider faces a breach.” Appleton continues by highlighting the differences in mindset for smarter, competitive cloud partners. “Smart cloud partners already understand that fragmented systems and untested failover mechanisms are now operational liabilities, not IT nuisances. Under DORA, a vulnerability in your smallest sub vendor is a vulnerability in you.” Single digital organism “The supply chain is effectively treated as a single digital organism. Financial entities that historically relied on internal post-mortems will struggle unless they automate resilience testing, reporting and vendor governance. Now, accountability is squarely extended to ICT third-party providers, including cloud platforms and MSPs, with ESA now empowered to designate critical third-party providers for direct insight.” “A vulnerability anywhere in the digital supply chain is now treated as a vulnerability everywhere. Therefore, a continuous, data-backed validation of operational readiness is key to the resilience that businesses will need to align with in 2026.” Digital dependency stack Appleton further outlines that proving resilience is built into cloud operations – into their DNA – is the key to staying competitive in 2026. “A practical roadmap for 2026 involves mapping your digital dependency stack, building multi-vendor resilience into your architecture, automating your incident reporting, and strengthening vendor governance through clear exit strategies.” “A cloud marketplace is rapidly becoming the de facto compliance registry in Europe. By aggregating configuration data, identity controls, activity logs and posture monitoring across multi-vendor environments, it turns resilience into a measurable, data-driven workflow rather than an annual fire drill.” Appleton concludes, “From integrated DRaaS to automated incident reporting, proven resilience demonstrates operational readiness every single day. As large-scale outage scenarios become more plausible, customers will gravitate toward partners who can offer real-time evidence of continuity.”
Secure Logiq has expanded its support coverage across Asia Pacific with the introduction of a dedicated regional technical support team operating on Singapore time. The new team has been put in place to provide more accessible day-to-day support for partners and customers across the region, helping to improve response times and provide assistance during local working hours. Range of surveillance and security installations As Secure Logiq continues to grow its presence in APAC, the regional support team will work closely with partners on technical queries, system support, and project requirements across a range of surveillance and security installations. Franck Martinaux, Director of Global Services & Innovation at Secure Logiq, said: “APAC is an important region for Secure Logiq, and having dedicated support operating in the same time zone as our partners is a positive step for everyone involved. It allows us to provide quicker responses, closer collaboration and better ongoing support as projects continue to develop across the region.” As the volume of sales in the region continues to expand rapidly under the leadership of Graham Wheeler, the APAC support team is now fully operational and supporting partners across multiple territories.
Zimperium, the world pioneer in AI-empowered mobile security, announced the launch of its Mobile SOC Agent, a force multiplier for security analysts confronting the rise of mobile threats aimed at iOS and Android mobile devices. Leveraging Zimperium’s unmatched expertise in mobile security, Mobile SOC Agent is an agentic AI solution that enhances Zimperium’s industry-leading Mobile Threat Defense (MTD), enabling security teams to rapidly identify, prioritise, and remediate mobile threats in real time. Mobile attacks As cybercriminals adopt a mobile-first attack strategy, enterprise security teams are facing a profound rise in mobile attacks fueled by weaponised AI coupled with sophisticated social engineering campaigns. Security teams struggle with the high volumes of alerts across devices, apps, networks, and web activity, requiring analysts to manually verify and investigate mobile attacks that threaten organisations. Mobile SOC Agent Zimperium’s Mobile SOC Agent addresses these challenges for security teams by identifying and prioritising mobile alerts while correlating related threats across the mobile attack surface to confirm a credible malicious attack on the mobile device. Mobile SOC Agent then provides security analysts with a clear attack narrative alongside intelligent, step-by-step remediation guidance, enabling security teams to respond quickly and confidently while reducing investigation time from hours or days to only minutes. Responding to credible mobile threats “Attackers are using AI to scale highly sophisticated mobile attacks to an incredible volume, making speed and clarity essential for security teams,” said Chris Cinnamo, Deputy CTO at Zimperium. “Mobile SOC Agent delivers immediate insight into what matters, what’s real, and what to do next, so teams can reduce risk and respond rapidly to credible mobile threats.” With Mobile SOC Agent, SOC analysts gain clear attack context and guided response actions grounded in deep mobile security expertise, reducing investigation and response time. Key capabilities Incident Discovery: Identifies true incidents with confidence score Event Correlation: Unifies events into a single incident view Attack Context: Delivers plain language attack narratives and timelines Remediation Guidance: Maps threats to MITRE ATT&CK with clear response actions The Zimperium Mobile SOC Agent is available immediately to current and new MTD customers.
Access control applications
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its proactive AI gun detection and intelligent situational awareness software has been deployed by St. Cecilia School in Cincinnati, Ohio, to help protect students, staff, and visitors from gun-related threats. Located in the geographic centre of Cincinnati within Hamilton County, St. Cecilia School serves approximately 250 students in Pre-K through 8th grade and employs 28 faculty and staff members. The school deployed ZeroEyes as part of its continuing commitment to maintaining a safe, welcoming learning environment. Intelligent situational awareness “The safety of our students is always at the forefront of what we do,” said David Lewis, Teacher and Student Resource Officer at St. Cecilia School and a retired police officer with 30 years of service. “I’ve seen ZeroEyes in action, and I believe it will save time and save lives. When I’m teaching, it’s hard to focus on security, so this technology gives me real-time intelligence to respond quickly. It’s a powerful supplement to our existing security measures, and you can’t put a price on student safety.” ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operations centre staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Real-time intelligence If the threat is determined to be valid, alerts and actionable intelligence — including visual description, gun type, and last known location — are dispatched to law enforcement and school officials as quickly as 3 to 5 seconds from detection. “St. Cecilia School has taken a thoughtful and proactive approach to campus safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “By building upon existing security measures and empowering staff with real-time intelligence, the school is demonstrating its strong commitment to protecting students and faculty while preserving the close-knit culture that defines its community.”
The Community Builders (TCB) is a nonprofit organisation whose mission is to build and sustain strong communities where all people can thrive. They work with businesses, institutions, and public officials to revitalise neighborhoods in ways where all people can live in healthy homes with equitable access to resources and opportunities to pursue their dreams. Their partnership with Salient Systems exemplifies the use of video technology in vulnerable neighborhoods to help achieve these goals. Challenge TCB operates and manages 150 sites and properties across the country, employing over 600 staff members. These locations range from campus environments to individual buildings, each presenting unique security challenges to ensure overall resident safety. The primary focus for implementing a video management system is not only to ensure safety and security but also prevent property maintenance issues. Under Joe Giggey’s leadership as senior director of Information Technology, TCB established enterprise- level security standards. These standards enabled access to video remotely through smartphones, iPads, and laptops for a central team of sites in 30 cities. Additionally, seamless integration with existing cameras and access control systems was required, considering TCB’s extensive network of 30+ access control systems and about 6,800 different camera models. Affordability was another crucial factor, as is often the case for nonprofit organisations. Having an easy-to-administer VMS, reliable search and video export functionalities, scalability for future property acquisitions, and centralised management in a distributed environment were also significant requirements. Solution Salient’s CompleteView VMS met all the specified criteria, marking the beginning of the partnership between TCB and Salient in 2016. The deployment of CompleteView has grown to 85 site recording servers and over 2,300 camera licenses. Given the widespread nature of TCB’s properties, certified regionalised integrators have been selected to install CompleteView across TCB locations. These integrators have been trained and received certification from Salient Systems professional trainers on installation, executing upgrades, expanding systems, and customising the deployment ensuring effective implementation and ongoing support. In addition, manufacturer support by Salient’s own System Engineering team has been utilised and according to TCB personnel, “has been phenomenal.” Results TCB staff help address complaints, educate residents on lease rules, and avoid evictions. Salient’s CompleteView has assisted in resolving disputes, and investigating incidents. In addition, the ability to verify details of incidents in progress helps pinpoint the location and gives first responders details about the situation they may face on arrival. Video footage provided by Salient’s VMS, CompleteView has proven invaluable in multiple instances and according to Giggey “The VMS paid for itself immediately, highlighting the effectiveness and value of this partnership.” The collaboration between TCB and Salient Systems has become an exemplar of how technology can be harnessed for the greater good, building trust and effecting positive changes in vulnerable neighborhoods. With ongoing support from Salient Systems, TCB is committed to making a lasting impact and ensuring strong communities where all people can thrive.
In alignment with the State of Mississippi’s mission of “Empowering Mississippi citizens to stay connected andengaged with their government,” Salient's CompleteView Video Management System (VMS) is being installedthroughout more than 150 state boards, commissions, and agencies in order to ensure safety for thousands ofconstituents who access state services daily. Challenge Determining the right path to success wasn’t a quick process. The elaborate undertaking of converting all State of Mississippi buildings from its legacy video system, which included analog cameras across a disparate video platform, to match their standard of excellence took a lot of planning. This involved researching and interviewing multiple manufacturers of IP cameras and video management systems. The plan was strategic, as it was important to State officials to find an open architecture solution that could utilise as much existing technology as possible, thereby preserving current taxpayer investment. Solution After a thorough evaluation, the decision came down to three competitive VMSs, all based on total cost-of ownership, scalability requirements, software performance capabilities, along with support assessments. Salient’s CompleteView was ultimately determined the top choice. “In the selection process, three VMS manufacturers were deemed a reasonable fit. The choice of CompleteView over these competitors came down to one critical component, partnership. The culture at Salient embodies an unmatched support you don’t typically see in an industry leader. Their greatest value-add is that open line of communication between the RSM, technical support, and engineering. If I need something, I know I can pick up the phone and get immediate assistance” said Mike Cooper with MS Department of Public Safety. Once CompleteView was selected, another strategic decision was made to have personnel from The Statehandle the design and installation of CompleteView internally rather than engage outside consulting. This hasproved to be an effective option, allowing them to tailor each installation to suit individual property needs. TheState works through the channel for procurement, then handles all programming and administration internally.This offers them the most flexibility while still achieving uniformity across each deployment as well as completecontrol of the process. Result The conversion to CompleteView is underway and will take approximately 3-5 years to complete. The State now benefits from a centralised platform that allows for greater administrative control, as well as a product that meets the State of Mississippi standard for NDAA compliance. According to Cooper, “we now have a platform that is easily managed and visibly organised in an efficient manner. We also appreciate having a system that’s permission based with tighter controls.” Finally, The State’s technical team is committed to keeping the system updated as Salient releases newer versions of its software each quarter. These upgrades ensure they are taking advantage of all security enhancements and feature improvements that CompleteView has to offer. The State has also planned integration of its access control system, Open Options, with CompleteView, tying video directly to specific door openings. This gives State personnel an enhanced view into their security operations, with quick and easy auditing of badge events through a single interface. Further initiatives will explore the addition of AI video analytics to add weapons detection, appearance search, and cross-camera tracking — all to help speed up investigations. Salient’s open platform makes these integrations possible. Staying present on these new releases and innovative integrations ensures an advanced level of protection from potential threats and works to achieve the ultimate end game – keeping community members safe.
Willis Tower, an iconic symbol in Chicago for over 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009. Major renovations took place in 2017, culminating in a complete transformation in 2022. Currnetly, Willis Tower offers a range of amenities from short-term workstations to traditional leases, as well as dining, retail, and entertainment spaces. The Skydeck on the 103rd floor, 1,353 feet above street level, provides breathtaking views of up to 50 miles across four states, attracting millions of visitors annually. Challenge As part of Willis Tower’s transformation, the structural separations between the office and Skydeck areas were eliminated, creating a more open and accessible space for visitors and tenants. Recognising the need for a customised strategic security plan, Director of Security Keith Kambic, CPP, spearheaded efforts to find the right partners to ensure the safety and security of tenants, visitors, and employees. Kambic’s first step was to engage with the national security and technology consulting firm Guidepost Solutions. The next priority was to establish a strong partnership with a Chicago-based integration partner and to identify the best security solutions in the market. Kambic chose 4S Security as the integration partner because of their holistic approach to achieving optimal results. The partnership with 4S Security elevated the security measures at Willis Tower to new heights. “We are different than the average integrator,” said Leor Elfassy, Director of Business Development at 4S. “We have software developers on staff who write integrations, and as a matter of business principle for the last 30 years, we only work with software manufacturers that allow us to do so.” Solution The upgrade to Willis Tower involved retrofitting the access control system to a cloud-based solution and the new Video Management System (VMS), Salient CompleteView, was selected based on its ability to integrate seamlessly with the access control platform. “In the end the client wants a single pane of glass that they can work from and Salient’s CompleteView is well-designed to let integrators bring their vision to life,” continued Elfassy. Salient’s open architecture was an essential factor in the decision, along with product features like Dynamic Resolution Scaling (DRS), a powerful bandwidth management tool, and agnostic integration to analytic platforms for future system enhancements. Specific features like snapshot and CompleteView’s interactive mapping feature were also important selection factors. While all of these product capabilities are important, in the end it came down to the personal attention of Salient team members – from the President to the system engineer – and their efforts to go above and beyond in every way. Salient’s dedication to working cohesively with the Willis Tower and 4S teams created an effective partnership that propelled the project forward. Kambic said, “when we selected Salient, we did so not only for their product, but because we could tell that both of our companies were cut from the same cloth – great service, and great people.” Both Salient and 4S provided learning tools prior to implementation to ensure a seamless transition to the new VMS for the Willis Tower security team. 4S created customised training videos and pamphlets and held onsite training sessions, while Salient educated the security team through its YouTube training videos. Results The result of the partnership between 4S and Salient was a 40% reduction in bandwidth usage across the Willis Tower network. In addition, the integrated system provided immediate awareness of events such as forced-open doors, tailgating, and panic alarms. Ongoing top-notch local support from both Salient and 4S ensures smooth and timely software release updates and exploration of new technological capabilities, advancing video surveillance through CompleteView. Pleased with the results, the Willis Tower team attests to the success of the partnership, efficacy of Salient’s product, andoutstanding level of service from Salient both before and after the sale.