Mobile Access Trends
 
                                    Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
 
                                    Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
 
                                    ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
 
                                    Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Latest Access control news
 
                                    Commvault has introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access with built-in classification and compliance controls, Data Rooms bridges the gap between data protection and data activation, helping organisations transform backup data into AI-ready assets without adding new risk or complexity. By integrating directly with Commvault Cloud, Data Rooms gives authorised users governed access to files, emails, and objects across environments. It automates data discovery, and classification, simplifying the creation of curated, AI-ready datasets. Data trust and compliance As enterprises move from data protection to data utilisation, Commvault preserves data trust, and supports compliance and readiness throughout the activation process. Most enterprises don’t need yet another AI platform to manage - Commvault’s Data Rooms offering is designed to address these challenges. The Commvault Data Rooms offering is currently available in early access and is targeted for general availability in early 2026, with pricing details to be shared at that time.
 
                                    An access management company secured a new set of supporters after one of its maximum-security key safes proved impenetrable at Europe’s largest locksmith exhibition. The Key Safe Company invited locksmiths and industry experts at The Master Locksmiths Association (MLA) Expo to take on a lock-picking challenge, with the opportunity to win the cash inside. They were each given five minutes to pick the company’s formidable ark Tamo key safe, but not one of the 73 master locksmiths who participated was able to pull off the feat. It is widely reported that some key boxes on the market can be easily breached, not just by brute force attacks, but also by stealth picking attempts. Maximum security This is something David Ogden, Founder and Chief Executive of The Key Safe Company, felt strongly about when he developed the ark Tamo. He said: “We wanted to prove that a mechanical key safe could truly deliver maximum security without compromising on usability.” “Too many products on the market claim to be ‘secure’ but fall short when faced with a real-world attack. Our mission was to set a new benchmark to develop a product which locksmiths, security professionals and the general public could trust to provide protection.” Commitment to innovation “When we designed the ark Tamo range, we approached it from the perspective of not only the end users’ convenience, but also as an attacker seeking weak points. Therefore, every mechanism, every material and every tolerance was tested and refined to resist manipulation,” continued David. “Seeing so many skilled professionals attempt to breach the ark Tamo at the Expo, with no success, was a fantastic validation of our engineering and our commitment to innovation.” The ark Tamo features patented, multi-push technology that allows the same button to be used up to four times in one passcode. This world-first enables up to 9.7 million different passcode combinations. An advanced anti-pick mechanism is also included, divorcing the dial from the buttons to prevent known picking techniques. Feedback from locksmiths and industry experts David added: “Seventy-three trained locksmiths attempted to pick the Tamo, via the picking challenge on our stand, and there was not a single successful pick all weekend!” “We offered a five-minute period to pick the key safe, based on competitor key boxes being breached online in less than one minute. The feedback from locksmiths and industry experts was really positive - proven by the hundreds of key safes sold - and we had great engagement around our ark Tamo and ark Tamo Pro products.” The Key Safe Company led two ‘training seminars’, titled Not All Key Safes are Equal, during the Expo at Telford International Centre. The sessions were designed to raise awareness within the industry of exactly what should be classified as ‘safe’ and to highlight the unique features of the ark Tamo range. Precision and engineering David said he was delighted by the industry’s collective response to the ark Tamo and that attending the MLA Expo had been a total success. “Day One of our training sessions was completely full, with no seats left, which was great for our team and we secured fantastic feedback. Our new Tamo display showing the interior mechanisms drew a lot of attention, with locksmiths fascinated by the detail, while the extreme attack testing videos created a real buzz at our stand.” “Overall, the show exceeded our expectations. It’s clear that locksmiths really appreciate the precision and engineering behind the ark Tamo range, and there’s great potential to continue building our presence in the industry.” Designed in-house The ark Tamo is designed in-house at The Key Safe Company, based in Worcester, UK, and has been endorsed by Secured by Design, the official UK Police security initiative that certifies products proven to reduce crime. Tamo Pro is the only mechanical key safe in the world to achieve an LPS1175 Issue 8 B1 security rating from the Loss Prevention Certification Board (LPCB), making it officially the world’s most secure mechanical key safe. The Key Safe Company has sold more than three million of their products worldwide since it launched in 1996, and supply national security distributors such as Aldridge, JMA and Duffels.
 
                                    Durabook, the global rugged mobile solutions brand owned by Twinhead International Corporation, announced the launch of its next-generation AI-powered fully rugged R10 tablet. Equipped with high-performance Intel Core Ultra 200V series processors, the 10” device is one of the first Copilot+ PC rugged tablets on the market. Redefining versatility in the tablet world, the R10 can be paired with a detachable backlit keyboard, seamlessly transforming it into a 2-in-1 rugged laptop PC. This adaptable design delivers the ideal balance of performance, reliability, and mobility, empowering users with a powerful and intelligent rugged device that fuses cutting-edge AI capabilities with Durabook’s hallmark durability and field-proven design. Durabook devices Twinhead’s CEO, Fred Kao, said: “Durabook devices are built to meet the needs of professionals who depend on powerful, reliable technology to stay productive in any environment. The compact and versatile R10 redefines the 10-inch rugged tablet category by providing AI-enhanced productivity supported by smart engineering for optimal usability.” “The R10’s adaptive design and customisation capability make it the perfect partner for field service operatives working across a wide range of sectors, including industrial manufacturing, warehouse management, automotive diagnostics, public safety, utilities, transport and logistics.” AI-enhanced performance Equipped with the Intel Core Ultra 200V series CPU, the R10 delivers exceptional computing power with enhanced AI performance, energy efficiency, and multitasking capability. Featuring new Performance/Low Power Efficient core architecture, low-latency LPDDR5x on-package memory, and speeds of up to 5.0 GHz, the R10 exceeds expectations by delivering 50% higher performance than 12th Generation Intel CPUs. Built for AI at the edge Built for AI at the edge, the R10’s combination of CPU, GPU, and NPU compute engines delivers 120 TOPS of total AI performance for real-time mission-critical decision-making. As a Copilot+ PC, the R10 also integrates on-device AI acceleration, enabling Microsoft Copilot features to run securely and smoothly, even without cloud access. This sophisticated level of tech provides 24/7 instant summarization, intelligent search, and adaptive task management for professionals in the field. Rugged reliability in all conditions Designed to operate in the harshest conditions, the R10 meets MIL-STD-810H, 6-foot drop, and IP66 standards. With proven resistance to drops, shocks, vibration, dust, and even salt fog, the R10 also remains operative in the most extreme temperatures, from sub-freezing -29°C (-20°F) to 63°C (145°F) heat. Additionally, the tablet is also certified with MIL-STD 461G, for electromagnetic compatibility, and ANSI/UL C1D2 for use in specified hazardous locations and potentially explosive environments. Sunlight-readable display The R10 also features a 10.1” TFT LCD WUXGA (1920 x 1200) DynaVue sunlight-readable display with brightness up to 1,000 nits, so every detail of imagery is delivered with the utmost clarity in all weathers. With Microsoft Pen Protocol (MPP) 1.51 support, the R10 delivers precise stylus performance, empowering engineers to sign reports, sketch diagrams, and annotate blueprints directly on the screen with accuracy and ease. Engineered for connectivity and endurance The R10 comes equipped with a comprehensive suite of integrated technologies, including one Thunderbolt 4, USB 3.2 Gen 2 Type-A port, dual SIM (Nano SIM & eSIM), up to two RJ-45 ports and an optional serial port RS-232. In addition, wireless connectivity includes 5G/4G LTE, Wi-Fi 7, Bluetooth V5.4 and GPS, ensuring constant, secure connectivity in any environment. Adding to its versatility, the tablet supports modular expansion options tailored for field applications, such as a barcode scanner, magnetic stripe reader, smart card reader, and RFID (NFC) reader, enhancing productivity across diverse industrial and operational scenarios. Specialised field applications require extended battery life, so the R10 features a hot-swappable battery design with an optional high-capacity battery up to 16 hours, enabling users to hot-swap batteries in the field without any downtime. Optimal security as standard Purpose-built for professionals handling sensitive data, the R10’s integrated Microsoft Pluton Security Processor provides chip-to-cloud protection at the hardware level, safeguarding credentials and encryption keys from the moment the device powers on. Advanced security support also includes TPM 2.0 as standard and optional Intel vPro, as well as a 5.0 MP IR camera for Windows Hello with dynamic shutter design, 11 MP rear camera with dynamic shutter design, Windows 11 Secured-core PC and an optional fingerprint scanner meet the needs of customers today in an ever-evolving mobile work environment. Designed to deliver full computing capability in a truly mobile form, Durabook has developed the R10 with optimised usability in mind. Designed to minimise e-waste and reduce the total cost of ownership, the R10 promises long-term performance and a strong return on investment for customers working across various industries.
 
                                    ASSA ABLOY Opening Solutions will be returning to GlassBuild America, the largest annual trade show in North America for the glass, window, and door industries. Happening November 4-6 at the Orange County Convention Center in Orlando, Florida, GlassBuild America is where buyers and sellers meet and learn how to solve their most pressing challenges. The action-packed event features networking between exhibitors and attendees, and experiencing new technology and products. ASSA ABLOY Opening Solutions will showcase its latest innovations in comprehensive door security and digital access control at booth #15007, which is conveniently located near the front entrances. Innovation in the glass industry “The show provides an excellent opportunity to showcase the creativity and innovation happening in the glass industry,” stated Tyler Baker, Director of Business Development for Glass and Aluminium at ASSA ABLOY Opening Solutions Americas. “It’s always exciting to engage with designers and partners who share our passion for blending aesthetics, performance, and security in modern architectural solutions.” Range of door security solutions ASSA ABLOY continuously expands its range of door security solutions and innovates to improve security, safety, energy efficiency, and convenience. The company focuses on creating designs that integrate aesthetically pleasing elements into the spaces they enhance. The solution lineup at GlassBuild 2025 includes: Rockwood PDU8000 Panic Device The device’s engraved push area and boundary grooves make exit doors stand out in a crowd. Now ANSI/BHMA A156.44, Grade 1 certified, this durable product offers keyed and non-keyed functions, new bent end return and two-piece configuration options, and a selection of finishes, providing a customisable design. Available to pair with manual or electric strikes, this line provides beauty, security, and peace of mind. Bruken DL-GS3550 Digital Glass Door Lock Provide keyless access control to your all-glass interior openings with the Bruken DL-GS3550 Digital Lock from ASSA ABLOY Glass Solutions. This field-reversible device is ideal for retrofit applications and features three modes of access, including fingerprint identification, numeric passcode, and smart card. This multi-user lock requires no glass fabrication for easy installation and is compatible with single or pairs of glass doors that are 3/8" - 1/2" thick. Control iD iDFace Max With its modern design and elegant finish, iDFace Max is the ideal device for monitoring and controlling venue access through facial identification technology. Its advanced algorithm and high-quality cameras allow the identification of up to 100,000 faces (1:N) with face liveness detection and identification of users with and without a mask. iDFace Max has an integrated SIP intercom with TCP/IP, USB, and PoE connectivity. The device also features a large 7-inch LCD touchscreen display, allowing for easy and intuitive navigation to configure access rules and view reports. ASSA ABLOY ACCENTRA nexTouch Cylindrical Lockset Combines a sleek, modern design with advanced access control technology, delivering a stylish yet secure solution for a wide range of facilities. With a heavy-duty construction and ANSI/BHMA Grade 1 certification, nexTouch ensures durable and dependable performance. This standalone electronic lock features modular technology, allowing seamless upgrades to Data-on-Card functionality. Available with either a capacitive touchscreen or pushbutton keypad, nexTouch® provides an ADA-compliant, user-friendly system engineered to safeguard your facility and personnel. Rockwood OptiCoat Finishes Offering realistic wood and marble patterns for door hardware of all kinds, OptiCoat is ideal for elevating projects where every detail matters, including upscale hotels, offices, and multi-family spaces. With 13 readily available finish options, plus custom capabilities, matching opening hardware to the overall style of your facility has never been easier. Centrios Centrios allows small businesses to manage access to their business by connecting their Centrios locks and smart readers with a simple-to-use mobile app. With Centrios, it’s simple to unlock doors with a touch of a phone, manage access for all employees and visitors in one place, and view audit and event reports. ASSA ABLOY is committed to expanding its solution lineup, along with adding top-of-the-line products to its quick shipping programs. ASSA ABLOY experts are here to listen and ensure that they are meeting the industry's needs. Please stop by the booth to meet with experts from ASSA ABLOY Glass Solutions and Rockwood.
Access control applications
 
                                    Allied Universal®, the world’s pioneering security and facility services provider, has been selected by Seton Hall University™ to provide campus security programs. This moves strengthens the University’s commitment to providing a safe, secure, and welcoming environment for students, faculty, staff, and visitors. New security program Allied Universal will deliver comprehensive campus security services, including trained personnel, safety patrols, and emergency response support. The new security program is designed to enhance the University’s existing safety infrastructure, while helping to ensure that the campus community benefits from Allied Universal’s expertise in proactive risk management and security operations. New partnership “On behalf of Allied Universal, I want to express our sincere appreciation for this new partnership and for our shared commitment to creating a safer campus community,” said Steve Jones, Allied Universal Global Chairman and CEO. He adds, “As the pioneering security provider for higher education, we are excited to have been chosen to work with Seton Hall University as a higher education campus safety partner.” Seton Hall’s ongoing commitment The selection of Allied Universal builds on Seton Hall’s ongoing commitment to campus safety, combining the University’s strong public safety framework with Allied Universal’s proven expertise in higher education security. Together, the collaboration aims to provide a proactive, community-focused approach that reinforces a secure, welcoming environment for everyone on campus. Seton Hall’s mission “Allied Universal brings deep experience supporting higher education institutions across the country,” said Sergio Oliva, Associate Vice President for Public Safety and Security, adding “Their approach emphasises professionalism, training, and engagement with the communities they serve, values that align closely with Seton Hall’s mission and our own Public Safety philosophy.”
 
                                    Cognitec Systems Pty Ltd is working with Home Affairs Australia to deliver 250 camera devices for facial image capture, image quality check, and traveller identity verification at all major international airports in Australia. With approximately 41 million international travellers entering and leaving Australia each year, the Department uses facial biometrics to collect and electronically verify the identity of eligible international travellers. Cognitec hardware and software systems Cognitec’s capture device, FaceVACS-Entry, detects the person’s height, automatically adjusts the camera position to capture a frontal pose photo, and uses automated face recognition to verify person identity. Cognitec is also providing integration software, mounting hardware, device installation services, as well as ongoing support and maintenance services for all Cognitec hardware and software systems. Relationship with the Department of Home Affairs “Cognitec is proud to continue a successful relationship with the Department of Home Affairs, and to deliver our technology for quick collection of biometric photos and for accurate traveller verification at the Australian border primary lines,” says Terry Hartmann, Cognitec’s Vice President Asia Pacific, adding “This project contributes to the security and ongoing digitisation of the Australian border, ensuring trusted traveller identities.” FaceVACS-Entry is used by governments worldwide for applications that require the acquisition of standards-compliant photos, and the verification of a live image against reference images, such as access control, border control, and entry/exit programs.
 
                                    Ericeira, a seaside town on the western coast of Portugal, is a popular tourist destination and is known as one of the top surfing destinations in Europe. It has a population of just over 10,000 citizens with this increasing during the busy summer season. The Municipal Council of Mafra, the local government body overseeing the region, recognised that the increase in traffic during the summer months needed greater monitoring and control to reduce congestion and the risk of accidents. Improving traffic and pedestrian flow A national road, 247, is the main through route for the town and, therefore, is priority for an intelligent traffic management system. At marked crossings where traffic will stop for pedestrians, congestion was particularly acute. The council wanted a solution that would prevent static, inefficient traffic and could adapt to dynamic changes in vehicle and pedestrian flow. Local installer Soltrafego undertook a detailed technical study that identified the need for intelligent video surveillance and traffic analysis. Hanwha Vision was chosen due to its effective and robust cameras. Monitoring congestion Cameras were installed at signal-controlled intersections, with four QNO-C8083R AI cameras installed per intersection. Two were positioned to monitor traffic in both directions, and the other two covered pedestrian areas. Entry and exit zones were set up to monitor vehicle flow, counting the number of vehicles and sending this volume data to traffic light controllers. Traffic light red and green intervals would be automatically adjusted according to detected traffic density. Two virtual zones on each side of the pedestrian crossings were set up on the other two cameras to monitor the number of people waiting in those areas. When the number of people reaches a pre-defined threshold, the pedestrian green light is triggered, and traffic is stopped to prevent overcrowding at the waiting area and ensure a safe crossing for pedestrians. A boosted traffic and pedestrian experience Thanks to the implemented intelligent traffic solution, vehicle and pedestrian movements in Ericeira have improved, especially during the summer months. Optimised traffic light timing based on real-time, dynamic data from the QNO-C8083R cameras avoids unnecessary delays and lowers the risk of accidents at the crossing points where the cameras are installed. Automating traffic light and pedestrian crossing controls improves operator efficiency and meets actual demand without manual input. The cameras were installed within existing infrastructure, requiring no extensive construction or physical alterations. The data collected by the cameras can be used to inform future town improvements, and the installation has become a pilot model for other towns in the area that are facing similar challenges.
 
                                    Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In the report, Cybersecurity Analyst Stan Wisseman recognised Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organisations run behind on patching an average of 56 days. Although organisations set their own patching schedules, this is well beyond the accepted 30-day standard set by organisations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index. With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognised Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customisation: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organisation’s business priorities. Workflow Integrations: GigaOm emphasised Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).
 
                                     
                                     
                                     
                                    