Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

Global security manufacturer, Gallagher Security has announced the release of the latest addition to its award-winning controller product range, the High Security Controller 7000 (High Sec C7000) to the American market. US General Services Administration (GSA) compliant, the High Sec C7000 provides customers with the confidence that Gallagher will continue to meet the highest standards of countries in the Five Eyes Alliance and ensure they’re meeting their compliances with confidence and a future-proofed vision. High Sec C7000 The High Sec C7000 has been designed with all the features of the recently released C7000 The High Sec C7000 has been designed with all the features of the recently released C7000 Enhanced, a FIPs approved micro, and cybersecurity at the heart. It also incorporates all the core functions of the award-winning C7000 Standard variant released 18 months ago, while expanding capabilities in key areas to deliver customers enhanced reliability, resilience, redundancy, and cybersecurity. Authority comment Gallagher Security Product Manager, Jim Rayner, who led production on the High Sec C7000 says: “While the Controller 7000 Standard already has excellent cybersecurity functionality, the High Sec C7000 goes a step further with higher security government and commercial applications firmly in mind.” He adds: “We’re increasingly seeing an appetite for large users who need solutions that are certified to be used on critical national infrastructure. These are not necessarily government sites, but also commercial enterprises seeking to mitigate risk to ensure business continuity. These users are wanting devices that are PIV-ready to get that extra level of security – they want to get ahead of emerging threats.” Meeting compliance The High Sec C7000 is built with FIPS compliant components and as with previous High Sec generations The High Sec C7000 is built with FIPS compliant components and as with previous High Sec generations, has been approved by the GSA and is PIV-compliant (FIPS 201-3). It has also achieved UL/ULC compliance and meets Class 5 standards which require monitoring of cabling between device and controller for Australia and New Zealand high security customers including government, defense, prisons, and data centers. Providing End Users with industry-leading protection against attacks on firmware in the supply chain and a platform ready for the future, Gallagher’s C7000 product range are IP based controllers that can manage all localised access control, intruder alarms, perimeter security, business automation and logic needs for an organisation. Independent operation Able to operate independently from the Command Centre server, the C7000 product range ensures predefined responses to monitored events, site safety, and continuity, and features a highly scalable system design, able to scale from single door systems to global systems with up to 10,000 controllers per server. The release of the High Sec C7000 brings Gallagher’s controller product range to a total of four, including the C7000 Single Door, C7000 Standard, and C7000 Enhanced variants.

Hanwha Vision, a pioneer in security and surveillance solutions, is excited to introduce the second-generation X series AI cameras, with six currently available models, powered by the new Wisenet 9 AI-native System on Chip (SoC). Designed for diverse environments, this next generation of cameras ensures clearer images, smarter monitoring, and more efficient data handling for security operations-while delivering superior AI object detection and attribute extraction, as well as enabling greater control over AI functions. X series AI cameras While one NPU handles image processing, the other focuses on object detection and advanced analytics At the core of the second-generation X series AI cameras is Wisenet 9, an AI-native SoC with powerful dual neural processing units. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual-NPU concept was introduced to ensure video quality and analytics have independent resources, for ultimate performance and preventing one function from impacting the other. Powerful AI The AI event detection pipeline is separated into three independently adjustable streams: metadata streaming, intelligent video analytics, and image enhancement. This allows users to tailor detection settings, utilise specific features, and reduce unnecessary alerts. Intelligent video analytics on the cameras use advanced AI object detection to trigger events. The second-generation X series AI camera features a host of analytics such as vehicle counting, people counting, and queue management to address a wide range of customer needs. Additionally, analytics such as slip and fall detection, face mask detection, and social distancing detection are available. Range features BestShot The range features BestShot, a powerful role that captures and transmits the most relevant images The range features BestShot, a powerful function that captures and transmits the most relevant images of classified objects. These images, cropped directly around the detected objects by the AI, accelerate forensic searches. Metadata such as gender, vehicle type, and clothing colour is transmitted alongside the images to further streamline the search process. AI Noise Reduction With AI-based Wide Dynamic Range (WDR), the models capture fine details in both dark and brightly backlit areas by reducing saturation in bright spots and improving shadow visibility. AI Noise Reduction minimises noise in low-light environments, ensuring sharper, enhanced images. For privacy protection, AI-powered Dynamic Privacy Masking (DPM) provides real-time safeguarding of personal information at the edge with objects, such as people, faces, vehicles and licence plates, dynamically masked with a mosaic or colour overlay. RE-ID technology, trusted cybersecurity RE-ID technology is a deep learning-based approach to matching visual identities The range also includes RE-ID technology. RE-ID technology is a deep learning-based approach to matching visual identities across non-overlapping camera views. For example, it can identify a person entering a building with an orange jacket and later recognise the same person leaving with the jacket unzipped and a hat, across different cameras. The second-generation X series AI cameras also enable comprehensive and trustworthy cybersecurity. With Secure Storage, Secure OS, and Secure Boot, these cameras prevent the execution of unauthorised software and ensure the integrity of captured data. Furthermore, the cameras are FIPS 140-3 Level 3 certified, meeting the highest standards for secure surveillance. Key features of the X series AI range Key features of the second-generation X series AI range: Powered by the advanced Wisenet 9 AI-native SoC Independent AI control over metadata streaming, analytics, and image enhancement Dynamic Privacy Masking (DPM) to protect personal information at the edge Advanced bandwidth reduction with up to 50% saving AI-based WDR and noise reduction for superior images Enhanced cybersecurity - FIPS 140-3 Level 3 certification Hardware tampering detection RE-ID technology Compatible with AI Packs Discover how the range delivers smarter detection, clearer images, and superior performance to elevate security operations. Models include XND-A8084RV, XND-A9084RV, XNO-A8084R, XNO-A9084R, XNV-A8084R and XNV-A9084R.

Ten years ago, a corporate social responsibility initiative by a Glasgow-based cybersecurity firm sparked what would become a movement for change. That initiative, led by Stuart Macdonald of SERIC, brought 500 young people to Glasgow Caledonian University for a single-day event to explore opportunities in STEM. On Friday 13 June 2025, SmartSTEMs returns to where it all began, Glasgow Caledonian University, once again welcoming 500 young people through the doors, not just to learn about science, technology, engineering, and maths, but to see themselves in it. SmartSTEMs Over the past decade, SmartSTEMs has reached more than 70,000 young people SmartSTEMs has grown into a national charity with a mission to ensure that every young person, no matter their gender, background, ethnicity, location, or belief system, has equal and fair access to STEM education and career opportunities. Over the past decade, SmartSTEMs has reached more than 70,000 young people and engaged with over 5,500 schools across the UK. Looking back Reflecting on the journey, Stuart Macdonald, SmartSTEMs founder, said: “What began as a one-off idea to support young people into STEM careers quickly revealed a gap far wider than we expected. We didn’t set out to start a charity, but the response from schools, young people and industry partners made it clear, this work was needed.” “We know that great things happen when great people get involved; ten years later, we and our partners have had the privilege of working with tens of thousands of young people, and we’re only just getting started.” Enduring relationship with schools SmartSTEMs enduring relationship with schools like Hillhead Primary, who attended the very first event and continue to take part ten years on, is a testament to its lasting impact. A teacher from Hillhead Primary said: “Our pupils… enjoyed everything from bridge building and code breaking to plumbing and wheel fitting. These events open up the world of STEM as a place where anything is possible for young learners, and STEM as a way we can shape the world we want. This is why we love SmartSTEMs and hope it continues and grows for many years to come.” Focus on deeper development In the early days, the charity’s core focus was on tackling gender imbalance in STEM In the early days, the charity’s core focus was on tackling gender imbalance in STEM. That remains important, but as the STEM skills gap deepened, so too did their purpose. SmartSTEMs plays a pivotal role in creating equity of opportunity by reaching pupils aged 10-14 at a crucial point in their lives. This work is delivered not just through large-scale events, but increasingly through in-classroom experiences, targeted projects, and deep collaboration with both academia and industry. Future-ready communities This milestone event, supported by global digital transformation pioneer Atos, represents the kind of partnership that defines SmartSTEMs success. Atos shares their commitment to embedding STEM skills where they are needed most and understands the role of early intervention in building resilient, future-ready communities. SmartSTEMs work isn’t just about the future of the STEM sectors, it’s about the future of young people. It’s about building confidence, raising aspirations, and breaking down barriers. It’s about showing young people that STEM is not only for someone else, it’s for them. As they mark ten years of impact, they are proud to return to where the journey began, and even prouder of where it’s heading next. One day. 500 young people. Countless futures changed.

After launching in the USA, Milestone’s Project Hafnia is now engaged in Europe with the city of Genoa, Italy. The aim is to develop AI-driven solutions to enhance traffic management systems and create smarter cities with high-quality, regulation compliant video data trained with NVIDIA NeMo Curator on NVIDIA DGX Cloud. Milestone is one of the early adopters of the newly announced NVIDIA Omniverse Blueprint for Smart City AI, a reference framework for optimising city operations with digital twins and AI agents. Milestone is also expanding its data platform with NVIDIA Cosmos to generate synthetic video data from real-world inputs. Leveraging both real and synthetic data, Milestone will build and train vision language models (VLMs) responsibly. European cloud provider Nebius will provide the required GPU compute to train the models. New horizons AI opens up new horizons for smarter, more efficient cities with Project Hafnia’s data platform AI opens up new horizons for smarter, more efficient cities with Project Hafnia’s data platform - from intelligent traffic and transportation management to better safety and security for people and property. VLMs learn to map the relationships between text data and visual data such as images or videos, allowing these AI-models to generate summaries and insights from visual inputs. Milestone Systems is working with NVIDIA to empower European cities like Genoa to build and fine-tune computer vision and AI applications on a foundation of fully compliant and ethically sourced data. Transparency and fairness The project is rooted in regulatory integrity, data diversity, and AI relevance, aligning with the EU’s legal frameworks, including GDPR and the AI Act. This ensures both transparency and fairness in the development of AI technologies. “I’m proud that with Project Hafnia we are introducing the world’s first platform to meet the EU’s regulatory standards, powered by NVIDIA technology,” says Thomas Jensen, CEO of Milestone. “With Nebius as our European cloud provider, we can now enable compliant, high-quality video data for training vision AI models — fully anchored in Europe. This marks an important step forward in supporting the EU’s commitment to transparency, fairness, and regulatory oversight in AI and technology — the foundation for responsible AI innovation.” Milestone’s Project Hafnia Milestone’s Project Hafnia provides the missing link for developing video-centric AI innovation with a fully compliant and ethically sourced data library for fine tuning classical video analytics models and VLMs. The VLM’s accuracy and performance optimisations are tuned for running on NVIDIA GPUs and in NVIDIA AI Blueprint for video search and summarisation (VSS). First service offering trained on transportation data from Genoa Project Hafnia now offers a fully European Visual Language Model for transportation management Project Hafnia now offers a fully European Visual Language Model for transportation management. The VLM is powered by NVIDIA and trained on a large volume of responsibly sourced and compliant transportation data from Genoa, Italy. "AI is achieving extraordinary results, unthinkable until recently, and the research in the area is in constant development. We enthusiastically joined forces with Project Hafnia to allow developers to access fundamental video data for training new Vision AI models. This data-driven approach is a key principle in the Three-Year Plan for Information Technology, aiming to promote digital transformation in Italy and particularly within the Italian Public Administration,” says Andrea Sinisi, Information Systems Officer, City of Genoa. Focus initially on video data While the focus of these collaborations is initially on video data, the framework is designed to scale across multiple domains and modalities, enabling future expansion and adaptation, improving the value of the data. Both the compliant dataset and the fine-tuned VLM will be made available to the cities using Project Hafnia through a controlled access license model, facilitating Europe’s AI ambitions without compromising ethical standards. Nebius to serve as European cloud solution NVIDIA cloud provider, Nebius, will serve as the EU-based cloud solution for Project Hafnia’s collaboration with Genoa. Choosing Nebius as a sovereign cloud provider ensures full compliance with European data protection regulations, supports digital sovereignty objectives, and guarantees that sensitive public-sector data remains securely within EU jurisdiction. “Project Hafnia is exactly the kind of real-world, AI-at-scale challenge Nebius was built for,” says Roman Chernin, Chief Business Officer of Nebius. “Supporting AI development today requires infrastructure engineered for high-throughput, high-resilience workloads, with precise control over where data lives and how it’s handled. From our EU-based data centers to our deep integration with NVIDIA’s AI stack, we’ve built a platform that meets the highest standards for performance, privacy and transparency.”
Access control applications

Iveda®, a pioneer in AI-driven video surveillance and smart-city technologies, announced that Subic Sun Development, Inc. has chosen the IvedaAI™ platform as the video surveillance solution for the soon-to-open Subic Sun Resort, Convention & Casino. IvedaAI was selected early in the build-out to inform camera placement and ensure frictionless integration with future-ready, AI-powered analytics. Focus on safety and service Located on the former U.S. naval base in the Subic Bay Freeport Zone—a special economic hub that hosts thousands of international and local businesses—the resort will feature 500 guest rooms, a state-of-the-art convention centre, a luxury casino, and two Accor-brand hotels, Ibis Styles and Mercure, scheduled to open in December 2025. The decision comes as global resort operators sharpen their focus on safety, service and operational efficiency. The global resort market generated $347 billion in 2024 and is projected to reach nearly $945 billion by 2030, an 18.5% CAGR. IvedaAI’s AI-enabled video analytics IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster and unlock data-driven insights that boost both guest satisfaction and bottom-line performance. “Iveda being selected as a premier security and surveillance provider before the first Subic Sun Resort guest ever checks in is a powerful endorsement of our commitment to providing state-of- the-art monitoring technology,” said David Ly, CEO and Founder of Iveda. IvedaAI’s real-time analytics Ly added: “By designing camera layouts around IvedaAI’s real-time analytics, Subic Sun can optimise coverage, reduce blind spots, and deliver safer, smoother guest experiences—without a costly equipment overhaul. We expect more ground-up projects to follow this blueprint.” Iveda Philippines—Iveda’s joint venture focused on nationwide smart-city deployment—secured the Subic Sun contract and will oversee the on-site rollout. The win represents the team’s first major hospitality project and advances its plan to generate US$ 3 million in smart-city revenue by FY 2026, building on the broader initiative it announced last year.

Comelit-PAC has successfully upgraded the access control infrastructure at Blackpool Victoria Hospital, ensuring a seamless and secure environment for staff, patients, and visitors. Blackpool Victoria Hospital is one of the largest and busiest hospitals in the Northwest, providing essential healthcare services to thousands of patients each year. As a pioneering medical facility, ensuring a secure and efficient environment is a top priority. Integrated PAC Access Central Security technology works programme integrated PAC Access Central with multiple PC workstations Designed to provide a robust and scalable security solution, the security technology works programme integrated PAC Access Central with multiple PC workstations for comprehensive global administration across the hospital’s network To safeguard critical areas within the hospital, Comelit-PAC’s advanced 500 series controllers were utilised. This includes the 511, 512 model door controllers linked into the existing 500 Access & Alarm servers on site, offering a mix of ethernet and RS485 connectivity to enhance system flexibility and efficiency. Security and administrative control Martyn McKechnie, Head of Digital Identity at Blackpool Victoria Hospital, commented: "As a busy hospital with multiple departments and critical areas, we required an access control system that could integrate seamlessly while offering high levels of security and administrative control." Martyn McKechnie adds, "PAC Access Central provides the scalability and reliability we need to manage hospital-wide access efficiently. The ability to oversee all access points from multiple PC workstations ensures our Digital Identity and Security teams can respond quickly to any situation." Future-proof access control system Blackpool Victoria Hospital benefits from a resilient and future-proof access control system A key element of the installation is its server-based architecture, providing enhanced security measures and fail-safe redundancy. This ensures Blackpool Victoria Hospital benefits from a resilient and future-proof access control system, capable of meeting the bespoke demands of the healthcare environment. Advanced security infrastructure Jason Sullivan, PAC/GDX Strategic Development Manager at Comelit-PAC, said: "We worked closely with Blackpool Victoria Hospital right from the initial specification stage to deliver a solution to balance security with ease of management." Jason Sullivan adds, "PAC Access Central presents a future-proof system that allows the hospital to maintain strict access control, while adapting to evolving needs. By adopting this advanced security infrastructure, Blackpool Victoria Hospital continues its commitment to maintaining a safe and secure environment, leveraging Comelit-PAC’s expertise in access control technology."

In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.

The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.