Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

Semperis, a pioneer in AI-powered identity security and cyber resilience, announced new detection capabilities in its Directory Services Protector (DSP) platform to defend against “BadSuccessor,” a high-severity privilege escalation technique targeting a newly introduced feature in Windows Server 2025. The enhancements-developed in direct collaboration with the Akamai research team that discovered the vulnerability-enable organisations to detect and respond to exploitation attempts before attackers can escalate privileges and compromise the domain. How attackers can abuse dMSAs Akamai researchers showed how attackers can abuse dMSAs to impersonate high-privilege users BadSuccessor exploits delegated Managed Service Accounts (dMSAs), a new Windows Server 2025 feature meant to improve service account security. Akamai researchers demonstrated how attackers can abuse dMSAs to impersonate high-privilege users in Active Directory (AD), including Domain Admins, without any patch currently available. Challenge in enterprise identity security This high-severity exploitation vector underscores a long-standing challenge in enterprise identity security: managing service accounts. These accounts often operate with excessive or unmonitored privileges, creating hidden attack paths ripe for exploitation. In response, Semperis updated its DSP platform with one new Indicator of Exposure (IOE) and three Indicators of Compromise (IOCs) to detect abnormal dMSA behaviour. Real-world detection capabilities These indicators help security teams spot undue delegation rights, malicious linkages between dMSAs These indicators help security teams spot excessive delegation rights, malicious linkages between dMSAs and privileged accounts, and attempts to target sensitive accounts like KRBTGT. "Semperis moved quickly to translate the vulnerability into real-world detection capabilities for defenders, demonstrating how collaboration between researchers and vendors can lead to rapid, meaningful impact," said Yuval Gordon, Security Researcher at Akamai. "The abuse of service accounts is a growing concern, and this high-profile vulnerability is a wake-up call." Collaboration with Akamai “Service accounts remain one of the least governed yet most powerful assets in enterprise environments,” said Tomer Nahum, Security Researcher at Semperis. “This collaboration with Akamai allowed us to close detection gaps fast and give defenders visibility into a deeply complex area of Active Directory that attackers continue to exploit.” Audit dMSA permissions The vulnerability affects any organisation with at least one domain controller running Windows Server 2025. Even a single misconfigured DC can introduce risk across the environment. Until a patch is released, organisations are urged to audit dMSA permissions and monitor for signs of misuse using enhanced detection tools like Semperis DSP.

Milestone Systems announced updates across its complete security technology portfolio with releases for XProtect video management software, BriefCam AI-powered analytics, and Arcules cloud video security. Each of these products gives security professionals more powerful tools to protect people and assets while streamlining operations. The releases demonstrate Milestone's commitment to providing integrated security solutions that address the full spectrum of modern security challenges, from on-premises operations to cloud-based deployments and advanced analytics. Security teams can now benefit from improvements across all three platforms. Access control visualisation The new XProtect 2025 R2 addresses this challenge by bringing access control directly onto Smart Map Security operations often struggle with switching between different interfaces to monitor video and access control systems. The new XProtect 2025 R2 addresses this challenge by bringing access control directly onto Smart Map. Operators can now see doors and access points, such as card readers, entry gates, turnstiles, and other controlled entry devices, on the same map as their cameras, making it easier to monitor facility security at a glance. When an access-related event occurs, the door icon on the map automatically updates, allowing operators to quickly identify issues. Teams can acknowledge alarms and control doors directly from the map interface, saving valuable time during security incidents when every second counts. Practical workflow improvements Operators will notice several practical improvements in their daily workflow. When creating image snapshots in investigations, operators can now include time stamps and camera information directly on the images, a frequently requested feature that improves traceability in reports. The Smart Client also combines previously separate HTML and image/text functions, making it easier to build comprehensive security dashboards. Milestone AI Bridge 2.0.0 XProtect 2025 R2 enhances the Milestone Integration Platform with geographic positioning for access For development partners, XProtect 2025 R2 enhances the Milestone Integration Platform with geographic positioning for access control units and expanded video codec support for web applications. The Milestone AI Bridge 2.0.0 is now officially available for production, making it easier for organisations to integrate artificial intelligence with their security video. Enhanced analytics portfolio The latest updates from BriefCam focus on delivering more reliable performance and intuitive operation for security teams using video analytics. Key enhancements include: Enhanced stability through modernised infrastructure and strengthened security frameworks for consistent performance when analysing large volumes of video data New Home Research Dashboard with tailored views for specific use cases, making it easier for different types of users to access the tools they need most Improved visualisation capabilities through enhanced mapping in the Respond Module to help better understand incident patterns and locations Streamlined workflows for creating custom classifications and improved synchronisation with video management systems Flexible cloud security solutions For organisations transitioning to cloud-based security, Milestone's Arcules platform has received substantial enhancements that address the growing demand for flexible, scalable video surveillance solutions. The updated platform delivers: Improved enterprise scalability, allowing organisations to expand their video security coverage without compromising performance or management complexity Enhanced user management capabilities that provide administrators with better control over access permissions and system configurations Expanded analytics features that help security teams extract more value from their video data and identify patterns more effectively Better integration capabilities with existing security infrastructure, making it easier to adopt cloud-based video surveillance without disrupting established workflows These improvements enable organisations to deploy hybrid security architectures that seamlessly integrate cloud and on-premises components, providing the flexibility to adapt security strategies as needs evolve.

Regula, a developer of forensic devices and identity verification (IDV) solutions, has made its inaugural appearance in the KuppingerCole Leadership Compass for Identity Verification 2025. Mentioned in the Innovation Leaders category, the company is recognised for its 100% in-house R&D, forensic-grade technology, global document coverage, and advanced liveness detection capabilities. Cybersecurity industry analysis Specialising in IDV and cybersecurity industry analysis, KuppingerCole forecasts that the global IDV market will grow from $18.4 billion in 2025 to $50.07 billion by 2030, driven by increasing identity fraud, compliance requirements, user expectations, and technological advancements. As identity verification rapidly shifts toward fully remote and automated environments, innovation has become a key differentiator. Customer-oriented upgrade approach Innovation pioneers in IDV are defined by taking a customer-oriented upgrade approach According to KuppingerCole, innovation pioneers in IDV are defined by taking a customer-oriented upgrade approach, delivering customer-requested and forward-thinking features, while ensuring seamless compatibility with existing systems. Positioning Regula in the Innovation Leaders category, KuppingerCole analysts highlight: “Regula’s products are mature and often used to supplement other identity verification vendors’ offerings. While not as feature-complete as other offerings, Regula is a best-of-breed document and biometric verification solution with strong global coverage. With expertise across diverse industries and a global reach, Regula is positioned as a verification provider with in-house expertise for adaptable and scalable solutions.” KuppingerCole analysts In their Leadership Compass, KuppingerCole analysts pay special attention to the fact that IDV vendors have in-house technology development, strong data privacy policies, wide geographical coverage for their ID databases, and automation and machine learning (ML) to facilitate processes and user experience. On these fronts, Regula stands out by: Best-of-breed on-premises document and biometric verification solution. Comprehensive ID template database made of 15,000+ templates from 251 countries and territories. In-house R&D capabilities with significant domain-specific expertise. Advanced liveness detection technology supporting enhanced security. A mature organisation with products often used to supplement other IDV vendor offerings. Regula’s recognition Regula Document Reader SDK provides automated reading and comprehensive verification of all types At the heart of Regula’s recognition are its flagship software products, which serve clients in finance, government, healthcare, education, aviation, and more. Regula Document Reader SDK provides automated reading and comprehensive verification of all types of identity documents. It reads data in all document zones, verifies security features—including dynamic ones such as holograms—and cross-checks all the data to spot forgery. Advanced spoof detection For biometric checks, Regula Face SDK enables real-time face matching, image quality assessment, and both passive and active liveness detection—the latter tested and certified under iBeta’s Presentation Attack Detection (PAD) Level 1 and 2. The solution supports 1:1 face matching and 1:n face identification with advanced spoof detection via texture and movement analysis, using both 2D and 3D methods. Regula’s solutions All biometric templates are driven locally by the client, with no data processed or stored by Regula Importantly, Regula’s solutions are designed for privacy-first deployments. All biometric templates are managed locally by the customer, with no data processed or stored by Regula. The face-matching algorithms undergo continuous testing and are benchmarked through programs like the NIST Face Recognition Vendor Test (FRVT). Document verification to biometrics “Being named an Innovation Leader by KuppingerCole is a significant milestone for us. It highlights our decades-long commitment to building all our solutions in-house, from document verification to biometrics, and doing so with the precision and trustworthiness that customers demand." "As identity verification principles and standards rapidly evolve, our focus remains the same: delivering technology that’s not only robust but also deeply practical, scalable, and privacy-conscious,” says Ihar Kliashchou, Chief Technology Officer at Regula.

At a time when quantum computing is rapidly emerging as an entirely new security challenge for organisations and governments around the world, Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud and one of the first cyber resilience vendors to support post-quantum cryptography (PQC), announces enhancements to its PQC capabilities. These advancements are designed to help customers protect their highly sensitive, long-term data from a new generation of imminent but unknown cyber threats, creating an additional layer of support, when needed. Quantum computing 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks Quantum computing uses quantum mechanics to process data and solve complex problems that could take decades with classical computers. However, these advancements bring unprecedented security challenges, along with the potential for threat actors to use quantum computing to decipher and unlock traditional encryption methods. According to the Information Systems Audit and Control Association’s (ISACA) Quantum Computing Pulse Poll, 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks and 50% believe it will present regulatory and compliance challenges. Now is the time to prepare and take action. Support for quantum-resistant encryption standards Commvault has provided support for quantum-resistant encryption standards, like CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON, as recommended by the National Institute of Standards and Technology (NIST) since August 2024. It was then that Commvault introduced a cryptographic agility (crypto-agility) framework, enabling its customers, via the Commvault Cloud platform, to address rapidly evolving threats without overhauling their systems. With today’s announcement, Commvault has built on that framework by adding support for Hamming Quasi-Cyclic (HQC), a new error correcting code-based algorithm designed to defend against threats like 'harvest now, decrypt later' where adversaries are intercepting encrypted network traffic and storing it for a later time when quantum computers are powerful enough to decrypt it. Quantum threat “The quantum threat isn’t theoretical,” said Bill O’Connell, Chief Security Officer at Commvault. “We were among the first cyber resilience vendors to address post-quantum computing, and by integrating new algorithms like HQC and advancing our crypto-agility framework, we are providing our customers with the tools to navigate this complex landscape with confidence.” “Our goal is simple and clear: as quantum computing threats emerge, we intend to help our customers keep their data protected.” Post-quantum cryptography For industries where long-term data storage is required, like finance and healthcare, Commvault's expanded post-quantum cryptography capabilities provide access to a variety of safeguards that can help fortify network tunnels against quantum-based attacks. With Commvault’s Risk Analysis capabilities, customers can discover and classify data to determine where these cryptographic capabilities may be helpful. In addition, Commvault’s capabilities are simple to implement, often using a checkbox configuration, making it easy for customers to utilise when needed. The evolving quantum landscape – the need for speed As investments pour into the quantum field, the time to address emerging threats is shrinking As investments pour into the quantum field, the time to address emerging threats is shrinking. This makes proactive adoption of post-quantum cryptography critical. “Quantum readiness has become a business imperative, particularly for industries which handle data that remains sensitive for decades. The time when currently encrypted data can be decrypted using quantum technology is closer than many people think,” said Phil Goodwin, Research VP, IDC. “Commvault’s early adoption of quantum-resistant cryptography and commitment to crypto-agility positions it at the forefront among data protection software vendors in proactively addressing quantum threats. Organisations with sensitive, long-term data need to prepare now for a quantum world.” Commvault: An invaluable partner “Commvault has been an invaluable partner in our journey to enhance cyber resilience. Their leadership in adopting post-quantum cryptography, combined with their crypto-agility framework, is exactly what we need to meet stringent government security mandates and protect highly sensitive information from emerging quantum threats,” said Jeff Day, Deputy Chief Information Security Officer, Nevada Department of Transportation. “Safeguarding sensitive data is paramount, and the long-term threat of quantum decryption is a significant concern. Commvault's rapid integration of NIST's quantum-resistant standards, particularly HQC, gives us great confidence that our critical information is protected now and well into the future,” said Peter Hands, Chief Information Security Officer, British Medical Association. “Their commitment to crypto-agility is important for healthcare organisations like ours.” Availability Commvault’s post-quantum cryptography capabilities, including support for NIST’s HQC algorithm, are immediately available to all Commvault Cloud customers running software version CPR 2024 (11.36) and later, enabling seamless adoption of quantum-resistant protection.
Access control applications

Comelit-PAC has successfully upgraded the access control infrastructure at Blackpool Victoria Hospital, ensuring a seamless and secure environment for staff, patients, and visitors. Blackpool Victoria Hospital is one of the largest and busiest hospitals in the Northwest, providing essential healthcare services to thousands of patients each year. As a pioneering medical facility, ensuring a secure and efficient environment is a top priority. Integrated PAC Access Central Security technology works programme integrated PAC Access Central with multiple PC workstations Designed to provide a robust and scalable security solution, the security technology works programme integrated PAC Access Central with multiple PC workstations for comprehensive global administration across the hospital’s network To safeguard critical areas within the hospital, Comelit-PAC’s advanced 500 series controllers were utilised. This includes the 511, 512 model door controllers linked into the existing 500 Access & Alarm servers on site, offering a mix of ethernet and RS485 connectivity to enhance system flexibility and efficiency. Security and administrative control Martyn McKechnie, Head of Digital Identity at Blackpool Victoria Hospital, commented: "As a busy hospital with multiple departments and critical areas, we required an access control system that could integrate seamlessly while offering high levels of security and administrative control." Martyn McKechnie adds, "PAC Access Central provides the scalability and reliability we need to manage hospital-wide access efficiently. The ability to oversee all access points from multiple PC workstations ensures our Digital Identity and Security teams can respond quickly to any situation." Future-proof access control system Blackpool Victoria Hospital benefits from a resilient and future-proof access control system A key element of the installation is its server-based architecture, providing enhanced security measures and fail-safe redundancy. This ensures Blackpool Victoria Hospital benefits from a resilient and future-proof access control system, capable of meeting the bespoke demands of the healthcare environment. Advanced security infrastructure Jason Sullivan, PAC/GDX Strategic Development Manager at Comelit-PAC, said: "We worked closely with Blackpool Victoria Hospital right from the initial specification stage to deliver a solution to balance security with ease of management." Jason Sullivan adds, "PAC Access Central presents a future-proof system that allows the hospital to maintain strict access control, while adapting to evolving needs. By adopting this advanced security infrastructure, Blackpool Victoria Hospital continues its commitment to maintaining a safe and secure environment, leveraging Comelit-PAC’s expertise in access control technology."

In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.

The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.

Genetec Inc., the global pioneer in enterprise physical security software, has announced that Binghamton University, a nationally recognised research institution and one of the four university centres of the State University of New York system (SUNY), has successfully implemented the Genetec™ Security Center platform to unify its security systems, streamline operations, and better support the safety of its expanding campus community. Binghamton University selects Genetec Spread across 930 acres with over 120 buildings and four locations, Binghamton University faced increasing challenges with its legacy security infrastructure, which consisted of siloed video, access control, intrusion detection, and mass notification systems. These disconnected technologies made it difficult for staff to respond to incidents in real-time, introduced security gaps, and required inefficient manual processes to bridge system limitations. Genetec Security Center platform Binghamton chose the Genetec Security Center platform, including Synergis™ (access control), Omnicast™ (video management), AutoVu™ (automatic license plate recognition (ALPR)), Sipelia™ (intercom), and Genetec Clearance™ (digital evidence management), to centralise its security operations. With more than 4,800 access control readers and 1,635 surveillance cameras now integrated into a single interface, the university has seen immediate improvements in both efficiency and incident response. Benefits “With Genetec, we’ve eliminated the inefficiencies of siloed systems and gained the tools to respond faster, work smarter, and plan for the future,” said Dave Martin, Assistant Director of Security Infrastructure and Support at Binghamton University. He adds, “Our teams are now equipped with real-time video analytics that enable operators to monitor unplanned gatherings and assess if the situation is a permitted activity or needs to be addressed. Most importantly, we’ve created a safer environment for our students and staff.” More security enhancements on the way Binghamton University plans to continue its security enhancements, including replacing nearly 3,000 residential hall locks with Wi-Fi-enabled, mobile-ready readers and expanding mobile credential adoption for students. The university is also evaluating drone-based emergency response, audio analytics for early threat detection, and space utilisation insights enabled by video analytics.