Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

RealMan Robotics, a major innovator in embodied intelligence and modular robotic systems, made a powerful impression at Automate 2025, North America’s premier automation technology event. At booth No. 1852, RealMan unveiled its latest lineup of intelligent ultra-lightweight robotic arms, dual-arm platforms, and self-developed joint modules tailored for industrial automation, precision manufacturing, and human-robot collaboration. Dual-Arm lifting platform RealMan’s embodied dual-arm platform integrates two 6-DOF robotic arms with synchronised motion control A standout at the booth, RealMan’s embodied dual-arm platform integrates two 6-DOF robotic arms with synchronised motion control. Designed for collaborative handling, lifting, and manipulation tasks, this platform is particularly suited for logistics automation and research in embodied AI. ECO63 robotic polishing workstation Designed for precision surface finishing, the ECO63 features RealMan’s proprietary joint modules and advanced force control, enabling high-quality polishing across complex surfaces. The station supports adaptive polishing for materials such as metal and composite. Healthcare robot RealMan’s medical massage robot leverages AI-driven touch sensitivity, adaptive force control Bridging technology and wellness, RealMan’s medical massage robot leverages AI-driven touch sensitivity, adaptive force control, and anatomical trajectory planning to deliver personalised therapeutic experiences. Built on a high-precision robotic platform with safety and compliance in mind, it serves applications across rehabilitation centers, healthcare institutions, and wellness clinics. This system reflects RealMan’s expansion into smart healthcare robotics and its vision of enhancing human well-being through embodied intelligence. ECO65 & ECO62 robotic loading and unloading cells These collaborative robots offer a compact footprint and quick deployment for machine tending tasks. Ideal for SMEs and OEM integrators, the ECO65 and ECO62 are optimised for high-speed loading/unloading operations with exceptional repeatability. RM65 heavy-duty robotic arm Built to handle payloads in demanding industrial environments, the RM65 features RealMan’s high-torque joint modules, making it suitable for palletising, inspection, and precision assembly lines requiring robust load capacity. Joint module demonstration RealMan also offered a modular showcase of its self-developed robotic joints, highlighting their compact design, integrated control systems, and plug-and-play scalability - essential for rapid robot prototyping and integration in mobile and humanoid systems. Expanding globally with localised innovation Following strong growth in Asia, RealMan is rapidly expanding its global presence. At Automate 2025, the company engaged with automation system integrators, research institutions, and strategic partners from the U.S. and Canada, reinforcing its commitment to empowering industrial customers with customisable, embodied robotic solutions.

Digitalisation is high on the agenda, or well under-way, in all kinds of commercial environments. As part of this process, many businesses are discovering an additional ROI when they digitalise access management for offices, retail spaces, entertainment venues, warehouses and more. The challenges of securing these buildings are no secret. Staff and business security are a priority, including the resilience of operations and the maintenance of a company’s hard-earned reputation. Filtering access, however, should not erect barriers to accessibility. Buildings should be comfortable to use for all those who are authorised to enter them. Web management software Digital access makes this much easier to achieve, providing day-to-day benefits for each building stakeholder – employees and building managers, owners and the contractors who come and go through commercial building spaces every day. During use, when employees, contractors and visitors can come-and-go with ease, collaboration is simpler and administration for building managers is more streamlined. This functionality supports the broad contribution to business efficiency that digitalisation brings. This functionality supports the broad contribution to business efficiency that digitalisation brings There’s a device to lock almost any opening and a digital solution which can either extend existing access management capability or implement digital access from scratch without cabling or invasive installation. Mobile credentials stored on a smartphone can simplify and accelerate the process of issuing, amending and revoking access. Facility and security managers can benefit from web management software, including mobile access management, which enables remote monitoring and control from one convenient point, or even while off-site. Generating higher revenues According to digital transformation experts, digital access enhances operational agility, improves productivity, enhances security and encourages innovation. Deloitte research found evidence that businesses with greater ‘digital maturity’ generated higher revenues. “Access is an increasingly important part of a digital picture which incorporates both physical and cyber security measures,” says Joachim Mahlstedt, Director and CCO Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “Digitalising access quickly provides benefits which a business can turn into a competitive advantage. It puts powerful tools in the hands of a commercial building manager, as these four real projects demonstrated.” Multiple building technologies Example 1 – Office building Managing access manually and updating multiple systems in parallel can eat up a large amount of facilities staff time. There is a more efficient alternative: management of offices is more streamlined and errors are minimised when multiple building technologies, including access, are connected. There is a more efficient alternative: management of offices is more streamlined and errors are minimised At a new corporate headquarters for Canal+ near Paris, for example, various devices from ASSA ABLOY’s suite of connected Digital Access Solutions – including battery-powered Aperio® wireless handles with integrated readers and ABLOY electromechanical security locks – integrate with a Genetec system to filter access to and through all technical areas, for 1,200 employees plus visitors and contractors. This native integration adds control without adding management complexity. Aperio is not an ‘add-on’, no extra database is required. It becomes part of one streamlined system, controlled from a single interface. Programmable key-operated digital access Example 2 – Manufacturing site Digital access is also available for high security environments and/or locations where multiple different cylinder types must be used. In Germany, RheinfelsQuellen opted for ASSA ABLOY’s eCLIQ programmable key-operated digital access. At its Duisburg HQ and other locations around North Rhine–Westphalia, their new digital locking operates reliably both indoors and outside. The system is managed via the CLIQ Web Manager (CWM); system data may be accessed at any time, and from any location, via the CWM interface. The software's flexibility makes it especially suited to large access systems or for multiple locations which are geographically dispersed. “We would choose this secure and flexible locking solution time and time again,” says Marcus Schlötels, Project Manager at RheinfelsQuellen. Software-powered digital access solution Example 3 – Small retail ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer Petty theft from stockrooms and shop floors is a persistent problem for retailers. Yet in small premises, a software-powered digital access solution may not be appropriate. In Leuven, Belgium, upscale fashion boutique Patio sought an easy, low-cost deterrent. ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer. Door security is operated by a discreet PINpad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN. Flexible work environment Example 4 – Flexible workspace Modern workplace design needs access control that is powerful, flexible and aesthetically in tune with building users. At Plexal, an East London flexible work environment used by up to 800 entrepreneurs, ASSA ABLOY Aperio digital access achieves all three. Plexal offices are fitted with Aperio wireless digital locks which are integrated with DoorFlow, NetNodes’ online platform for managing and auditing access. These locks provide Plexal with physical security and transmit door status to DoorFlow in real time. Because they are battery- rather than mains-powered, Aperio locks also keep maintenance costs and energy consumption low. “Digitalisation presents huge challenges and opportunities for businesses of every size and type, in access management and beyond,” adds Joachim Mahlstedt. “Our expertise in access, established over decades, enables us to work with customers to truly get their access ready for what’s ahead. With ASSA ABLOY, they digitalise with confidence.”

Integrated access control and security manufacturer - TDSi announces that it is offering a free training kit to individuals taking part in its official free GARDiS installer training course for the first time. The offer is designed to support security installers who are new to TDSi’s products and applies to those attending the course at its Headquarters in Poole, Dorset; along with Coventry in the West Midlands, and Haslingden in Lancashire. GARDiS installer training kit Jon Hooley, Technical Support Manager at TDSi, commented, “We believe that supporting installers who are new to the industry, or indeed new to TDSi, is an important step in broadening the remit of our security training.” He adds, “To further help with this, we are offering a training kit that comprises a GARDiS G4 Controller + Power Supply Unit, GARDiS Desfire Mullion Reader, 10 GARDiS Desfire Cards, and GARDiS Express Software – giving attendees everything they need for their first GARDiS Install with their newly earned Installer Training skills.” Free training course on offer Free course is open to multiple attendees from same business, but offer is limited to one training kit per company The free course is open to multiple attendees from the same business, although the offer itself is limited to one training kit per company, spaces are limited and pre-booking via the TDSi website is essential. Jon Hooley continues, “To ensure your company receives its kit, just ensure the training offer is selected as part of the online booking process and we’ll get your pack out to your registered address after the course has been successfully completed.” TDSi’s proud history of offering free installer training TDSi has a proud history of offering free installer training, which is designed to ensure Installers are equipped with everything they need to efficiently install, maintain, and upgrade its GARDiS Integrated Access Control Solution. The training is delivered by Jon and his team, who offer first-hand technical support, guidance, and advice to ensure installers have everything they need. The TDSi training offer runs from June until December 2025.

runZero, the pioneer in total attack surface management, announced its inclusion in Rising in Cyber 2025, an independent list launched by Notable Capital to spotlight the 30 most promising cybersecurity startups shaping the future of security. Unlike traditional rankings, Rising in Cyber 2025 honourees were selected through a multi-stage process grounded in real-world validation. Major cybersecurity venture firms submitted nominations, and nearly 150 Chief Information Security Officers (CISOs) and senior security executives voted on the final list, highlighting the companies solving the most urgent challenges facing today’s security teams. Why runZero was selected runZero was selected for its innovative approach to exposure management and attack surface discovery runZero was selected for its innovative approach to exposure management and attack surface discovery, helping security teams navigate today’s complex threat landscape. Unlike traditional vulnerability management solutions, runZero delivers complete and accurate visibility into every asset and exposure across internal, external, IT, OT, IoT, mobile, and cloud environments, including uncovering unknown and unmanageable devices and broad classes of exposures that evade other tools. The company joins a cohort that has collectively raised over $7.8 billion, according to Pitchbook as of May 2025, and is defining the next era of cybersecurity across key areas like identity, application security, agentic AI, and security operations. Demand for cybersecurity “The demand for cybersecurity innovation has never been greater. As the underlying technologies evolve and agentic AI reshapes everything from threat detection to team workflows, we’re witnessing a shift from reactive defense to proactive, intelligence-driven operations,” said Oren Yunger, Managing Partner at Notable Capital. “What makes this list special is that it reflects real-world validation — honourees were chosen by CISOs who face these challenges every day. Congratulations to this year’s Rising in Cyber companies for building the solutions that modern security leaders truly want and need.” In celebration, honourees will be recognised at the New York Stock Exchange (NYSE) alongside top security leaders and investors. Authority comments “We’re honoured to be recognised as a Rising in Cyber 2025 company. runZero is challenging the status quo with a novel approach to exposure management that can finally provide defenders with the attack surface visibility and comprehensive risk detection required to protect complex, dynamic environments,” said Julie Albright, Chief Operating Officer for runZero. “As a disruptor in our space, it’s great to be acknowledged by CISOs who are in the trenches every day and who have struggled with outdated approaches to vulnerability management that are fundamentally broken.” “This recognition is a testament to the innovative approach we’ve taken and the meaningful impact we are making for teams responsible for securing their organisations against an increasingly challenging threat landscape.” A new approach to exposure management runZero provides organisations with the most complete and accurate visibility across their total attack surface Leveraging innovative technology and proprietary discovery techniques, runZero provides organisations with the most complete and accurate visibility across their total attack surface, including unknown and unmanageable assets. On average, runZero enterprise customers report finding 25% more assets than they were previously aware of, with some environments yielding 10x more assets than security teams expected, radically expanding their view of their attack surfaces and the exposures within. These previously unknown assets are often those at the most risk. Identifying risks Starting with a foundation of comprehensive visibility enables runZero to provide full-spectrum exposure detection across internal and external attack surfaces. Advanced fingerprinting methodologies build detailed, accurate profiles of each asset in the environment using a library of almost 1,000 attributes. This unmatched depth of data enables the platform to identify much broader classes of exposures going well beyond CVEs to identify risks that evade traditional vulnerability and external attack surface management solutions. runZero recently released new risk findings and dashboards, providing a novel paradigm for organising, addressing, and tracking exposures over time.
Access control applications

In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.

The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.

Genetec Inc., the global pioneer in enterprise physical security software, has announced that Binghamton University, a nationally recognised research institution and one of the four university centres of the State University of New York system (SUNY), has successfully implemented the Genetec™ Security Center platform to unify its security systems, streamline operations, and better support the safety of its expanding campus community. Binghamton University selects Genetec Spread across 930 acres with over 120 buildings and four locations, Binghamton University faced increasing challenges with its legacy security infrastructure, which consisted of siloed video, access control, intrusion detection, and mass notification systems. These disconnected technologies made it difficult for staff to respond to incidents in real-time, introduced security gaps, and required inefficient manual processes to bridge system limitations. Genetec Security Center platform Binghamton chose the Genetec Security Center platform, including Synergis™ (access control), Omnicast™ (video management), AutoVu™ (automatic license plate recognition (ALPR)), Sipelia™ (intercom), and Genetec Clearance™ (digital evidence management), to centralise its security operations. With more than 4,800 access control readers and 1,635 surveillance cameras now integrated into a single interface, the university has seen immediate improvements in both efficiency and incident response. Benefits “With Genetec, we’ve eliminated the inefficiencies of siloed systems and gained the tools to respond faster, work smarter, and plan for the future,” said Dave Martin, Assistant Director of Security Infrastructure and Support at Binghamton University. He adds, “Our teams are now equipped with real-time video analytics that enable operators to monitor unplanned gatherings and assess if the situation is a permitted activity or needs to be addressed. Most importantly, we’ve created a safer environment for our students and staff.” More security enhancements on the way Binghamton University plans to continue its security enhancements, including replacing nearly 3,000 residential hall locks with Wi-Fi-enabled, mobile-ready readers and expanding mobile credential adoption for students. The university is also evaluating drone-based emergency response, audio analytics for early threat detection, and space utilisation insights enabled by video analytics.

Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritising sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Partnership with Axis Communications The partnership with Axis Communications has allowed Ferroport to meet Brazilian port standards with ease, while also supporting its robust sustainability strategy. Partnership with Axis Communications has allowed Ferroport to meet Brazilian port standards The ISPS Code (Resolution 53 Conportos) and Ordinance 143 of the Federal Revenue Service mandates that Brazilian port terminals must remain under 24/7 video surveillance, pioneering the port to search for a solution that would comply with these stringent standards while also enhancing wildlife conservation efforts in the area. Ferroport’s commitment to environmental stewardship has resulted in the planting of 66,000 trees in the surrounding area over six months and protecting more than 1.3 million loggerhead sea turtle hatchlings since 2008. Balance security with environmental conservation “Security is a top priority for Ferroport, with cutting-edge technology in place to protect our assets,” said Marcelo Oliveira, Property Security Coordinator for Ferroport. “With 206 cameras monitoring offshore, operational, and perimeter areas, our system was equipped to monitor unauthorised vessels during daylight hours, but nighttime surveillance presented a challenge due to the absence of natural light." "To balance security with environmental conservation, we partnered with Axis to capture high-quality images in complete darkness – enhancing security while minimising ecological impact.” Video surveillance network Ferroport invested in 20 Axis cameras, but the company has been expanding its network Ferroport upgraded its video surveillance network with cutting-edge technology capable of ensuring accurate and reliable surveillance of the port around the clock. Initially, Ferroport invested in 20 Axis cameras, but the company has been expanding its network as the impressive quality of the devices and positive impact on sustainability have become clear. With these installations, Ferroport can now: Leverage a high-tech solution that balances security, compliance, and environmental responsibility. Capture high-quality images in complete darkness – minimising the impact of artificial lighting on local ecosystems. Turn off night operating floodlights, allowing endangered species like maned wolves, porcupines, capybaras, and anteaters to return to their habitat. Use deep learning analytics for remote perimeter detection to prevent unauthorised entry by land, sea, or approaching vessels. Security capabilities “While Ferroport was looking to enhance its security capabilities, the company wasn’t willing to sacrifice its values or conservation goals to achieve it,” said Winicius Corali, Regional Sales Manager, Brazil, Americas. “We were able to work closely with port representatives to identify a solution that would provide the functionality Ferroport needed to comply with Brazilian regulations while also sustainability and conservation. Our hope is that Ferroport can serve as an example for other port security projects.”