Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

NEXT Biometrics has launched a new fingerprint sensor in response to customer requirements. The ‘L1 Slim’ is a new addition to its NEXT Basalt FAP 20 product series (formerly NEXT Access 300 series) and is the thinnest sensor of its kind, while maintaining the same security and performance. This optimises the integration process for identity verification module, point of sale terminal, tablet and other device makers. The sensor is also certified for use in India’s Aadhaar program and countries adopting the Modular Open Source Identity Platform (MOSIP) framework for their national ID programs, reducing time-to-market by up to 12 months. Integration efficiency “We love it when customers come to us with a challenge,” comments Marcus Laurén, Chief Product Officer at NEXT Biometrics. “As devices get more compact and competition is fiercer than ever, integration efficiency can be the difference between commercial success and market follower. Our hardware and software engineers are now poised to help OEMs around the world to integrate this super slim sensor to bring strong biometric authentication to any device.” NEXT’s Active Thermal technology NEXT’s Active Thermal technology uses both heat from the finger and 3D imaging to authenticate the user NEXT’s Active Thermal technology uses both heat from the finger and 3D imaging to authenticate the user. This enables superior liveness detection to combat spoofing attacks, when compared with other fingerprint authentication technologies. With embedded hardware, the overall cost of the solution is reduced, and integration of the hardware and software is simplified. The NEXT Basalt L1 Slim The NEXT Basalt L1 Slim product minimises sensor thickness and optimises image resolution and energy consumption, simplifying integration with devices like readers, peripherals, terminals and more. This enables portability of identification devices and exceptional performance in varying light and environmental conditions. Historical growth Over the last 25 years, NEXT Biometrics has shipped more than 10 million sensors. Its Active Thermal® technologies are certified by entities including Aadhaar, FBI-PIV, MOSIP Compliance and NIBSS, and have been implemented in countries including Bangladesh, China, Ghana, India, Malaysia, Pakistan, U.S. and Vietnam.

The new, ultra-compact RSL 200 from Leuze is the smallest safety laser scanner on the market. It safeguards machines, automated guided vehicles and robots. Thanks to its minimal dimensions, it is very easy to integrate even where space is limited. With the RSL 200, Leuze is launching the smallest safety laser scanner on the market. The Sensor People are thus setting new standards in the miniaturisation and integration of safety laser scanners. Small, smaller, RSL 200 Thanks to its small dimensions the RSL 200 safety laser scanner is very easy to integrate, even where space is limitedThe exceptionally compact size and innovative connection technology allow unprecedented possibilities for sensor integration. The powerful device reliably safeguards machines, systems, automated guided vehicles and autonomous mobile robots. Thanks to its small dimensions the RSL 200 safety laser scanner is very easy to integrate, even where space is limited. The safety laser scanner adds an ultra compact variant to the Leuze portfolio. The RSL 200 offers an operating range of three meters and a 275- degree scanning angle. For a greater operating range of up to 8.25 meters, system operators can rely on the RSL 400. Flexible stationary use With its configurable protective fields, the RSL 200 is ideal for area guarding and for applications with protective field switchover. In this way, the safety laser scanner detects anyone entering or staying in a machine or system’s monitored area. Thanks to its large scanning angle, it also safeguards two sides of a machine around a corner with just one device. The configurable protective fields allow the monitoring area to be conveniently adapted to the machine’s contours. In addition to the compact design, the laser scanner’s rotating M12 connection also helps make integration easier, as this standardised connection allows extremely flexible cable routing. This also reduces the space required and makes commissioning easier. Space-saving solution for mobile use The RSL 200’s minimal dimensions also make it the right choice for automated guided vehicles and autonomous mobile robots. The configurable and switchable protective and warning fields of the RSL 200 enable flexible protection. They allow the monitored areas to be optimally adapted to curved paths, different speeds and various load conditions. Omnidirectional vehicles can be safeguarded in all directions with the laser scanner: Only two diagonally mounted devices are required thanks to the 275-degree scanning angle. 32 switchable sets of protective and warning fields enable its speed and direction of travel to be continuously adjusted. Another advantage for mobile use: The RSL 200 is insensitive to shocks and vibrations. Quick to commission and replace The RSL 200 also contains a removable configuration memory The mounting bracket was specially developed for the RSL 200 to help speed up integration and commissioning. It allows the safety laser scanner to be easily aligned horizontally and vertically. This makes it particularly easy to set the scan level. The mounting bracket’s design is optimised for minimum space requirements. If servicing is required, the laser scanner can be replaced quickly and easily with just four screws. No realignment is required thanks to the innovative mounting bracket. The RSL 200 also contains a removable configuration memory. This makes it easy to transfer the configuration to the new device. App for convenient remote access Practical: System operators can use the RSL 200 app to access status information and diagnostic data. All important information can be captured remotely via Bluetooth. This is particularly helpful if the RSL 200 is installed in system areas that are difficult to see or if access to the device is restricted. The machine can continue to work without disruption because you do not need to enter the protective field to read out the information. All messages are displayed in plain text in the app. Users can also send these directly to Leuze Service if required. Other interfaces such as USB and additionally Ethernet TCP / IP (for device variants RSL 230 and higher) offer additional configuration and diagnostics options.

Allegion US, a foremost provider of security solutions, technology and services, has introduced the Outdoor Defense (OUT) option for 98/99 exit devices, the first Von Duprin product designed to protect device functionality in outdoor conditions, providing the reliability, quality and function expected from Von Duprin. Authority comments "As the demand for reliable security solutions in outdoor environments continues to grow, we're excited to introduce the Outdoor Defense option for Von Duprin exit devices,” said Marli Williams, general manager, Exits & Door Controls at Allegion. “This innovation not only enhances the durability and performance of our 98/99 Series but also offers additional protection for critical components against weather conditions.” “Our commitment is to provide our customers with peace of mind, knowing that their panic hardware is built to help withstand the elements." The Outdoor Defense option The Outdoor Defense option is designed to safeguard against moisture, temperature variations and corrosion in exterior applications The Outdoor Defense option is designed to safeguard against moisture, temperature variations and corrosion in exterior applications. Available for the popular 98/99 Series rim and surface vertical rod exit devices, this option is engineered to protect device functionality. The Outdoor Defense option is also available for mechanical devices as well as popular electronic components, such as switches, latch retraction, delayed/controlled egress, alarm kits and more. Outdoor Defense products are designed to perform in outdoor conditions within the parameters of the products testing conditions such as courtyards, perimeter security, rooftops and patios. Electrical options available Several popular electrical options are available with the Outdoor Defense option. Latch retraction (QEL), alarmed exits (ALK), delayed/controlled egress (CX) and monitoring (RX and LX), are all available options. "With the introduction of the Outdoor Defense option, we are setting a new standard in exterior security solutions. This offering reflects our dedication to engineering excellence and customer satisfaction, providing robust protection for both mechanical and electronic components,” said Williams. “Whether it's for courtyards, rooftops or perimeter security, Von Duprin's Outdoor Defense helps ensure safety without compromise in outdoor environments.”

iDenfy, the award-winning RegTech company specialising in identity verification and fraud prevention, announced its newest collaboration with SpaceCore, a global hosting provider known for its powerful, high-performance hosting and server infrastructure. With iDenfy’s AI-powered identity verification suite integration, SpaceCore expects to strengthen its platform security, align with global compliance requirements, and ensure its servers maintain trusted, user-friendly tools, not exploited by malicious online actors. Scalable infrastructure tailored for diverse clients SpaceCore offers scalable infrastructure tailored to a diverse range of clients As a hosting provider with data centres in multiple countries, SpaceCore offers scalable infrastructure tailored to a diverse range of clients, from crypto node operators and startups to enterprise-level organisations. The company's primary focus is to build for performance and accessibility as it uses advanced server capabilities with a user-friendly interface that makes it easy for users to deploy and manage digital workloads. In today’s digital environment, technical excellence alone isn’t enough; therefore, ensuring that every account is tied to a verified, legitimate individual or business is crucial to preventing misuse and maintaining regulatory standards. iDenfy’s end-to-end identity verification solution To address this, SpaceCore turned to iDenfy’s end-to-end identity verification solution tools providers. After assessing several providers, iDenfy emerged as the most adaptable, robust, and user-friendly customer identification program software. iDenfy’s software was able to offer multiple user verification and onboarding flows, which were easily customised to match SpaceCore’s needs and its industry requirements. This was beneficial to SpaceCore’s team, as they looked for an already established KYC brand that knew how to help onboard larder customer volumes without creating a backlog. Implementing a global ID verification solution For SpaceCore, this also meant implementing a global ID verification solution that accepts a wide range of identity documents from various countries and regions. According to Daniil Velykyi, the Founder of SpaceCore, “iDenfy’s tools stood out across all the providers we evaluated. From the beginning, we were impressed not only with the speed and depth of their verification process but also with how seamlessly it integrated into our client onboarding system.” iDenfy’s identity verification platform iDenfy’s identity verification platform supports over 3,000 types of identification documents iDenfy’s identity verification platform supports over 3,000 types of identification documents from more than 200 countries and territories. It leverages a hybrid model that combines AI-powered automation with manual oversight, enabling fast and accurate verification, while minimising the risk of false positives. This dual approach has been proven to deliver a 99.99% accuracy rate in identity verification, significantly enhancing operational security and user trust. SpaceCore now uses these capabilities to validate new accounts in real-time, helping ensure that server rentals and other services are only accessed by verified users. Need for robust identity verification tools The need for robust identity verification tools has never been more pressing. In 2024, identity fraud cost victims $47 billion in the U.S. alone, with a sharp rise in false identity fraud, where fake or partially fabricated identities are used to access digital services. The hosting industry is particularly vulnerable to these threats, as bad actors often exploit weak verification systems to rent servers for illegal activities, including phishing campaigns, DDoS attacks, and cryptocurrency scams. By adopting iDenfy, SpaceCore is taking proactive steps to block such risks at the onboarding journey while registering new users. Implementing iDenfy’s full verification suite SpaceCore’s decision to implement iDenfy’s full verification suite was driven not only by security concerns, but also by usability and adaptability. iDenfy offers customisable verification flows that can be tailored to fit a company’s existing infrastructure and compliance requirements. Each new customer at SpaceCore now undergoes a complete verification process With support for low-code and no-code integrations, as well as compatibility with over 2,000 third-party platforms, the identity verification process was embedded into SpaceCore’s system with minimal disruption. Each new customer at SpaceCore now undergoes a complete verification process, which includes biometric facial recognition, document scanning, and 3D liveness detection — all of which work in real time to prevent spoofing or fraudulent access. Faster onboarding, fewer manual reviews For SpaceCore, this means faster onboarding, fewer manual reviews, and clearer audit trails that support transparency and regulatory compliance, particularly with stringent UK identity regulations. Automated logs are generated for each verification, providing a verifiable digital footprint that meets the standards of Know Your Customer (KYC), Know Your Business (KYB), and Anti-Money Laundering (AML) protocols. Identity verification services Domantas Ciulde, the Chief Executive Officer (CEO) of iDenfy, commented on the partnership: “SpaceCore is a company that prioritises speed, performance, and reliability. The same principles we uphold in our identity verification services as well. By working together, we’re making sure that security and compliance will enhance the user experience rather than hinder it.”
Access control applications

In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.

The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.

Genetec Inc., the global pioneer in enterprise physical security software, has announced that Binghamton University, a nationally recognised research institution and one of the four university centres of the State University of New York system (SUNY), has successfully implemented the Genetec™ Security Center platform to unify its security systems, streamline operations, and better support the safety of its expanding campus community. Binghamton University selects Genetec Spread across 930 acres with over 120 buildings and four locations, Binghamton University faced increasing challenges with its legacy security infrastructure, which consisted of siloed video, access control, intrusion detection, and mass notification systems. These disconnected technologies made it difficult for staff to respond to incidents in real-time, introduced security gaps, and required inefficient manual processes to bridge system limitations. Genetec Security Center platform Binghamton chose the Genetec Security Center platform, including Synergis™ (access control), Omnicast™ (video management), AutoVu™ (automatic license plate recognition (ALPR)), Sipelia™ (intercom), and Genetec Clearance™ (digital evidence management), to centralise its security operations. With more than 4,800 access control readers and 1,635 surveillance cameras now integrated into a single interface, the university has seen immediate improvements in both efficiency and incident response. Benefits “With Genetec, we’ve eliminated the inefficiencies of siloed systems and gained the tools to respond faster, work smarter, and plan for the future,” said Dave Martin, Assistant Director of Security Infrastructure and Support at Binghamton University. He adds, “Our teams are now equipped with real-time video analytics that enable operators to monitor unplanned gatherings and assess if the situation is a permitted activity or needs to be addressed. Most importantly, we’ve created a safer environment for our students and staff.” More security enhancements on the way Binghamton University plans to continue its security enhancements, including replacing nearly 3,000 residential hall locks with Wi-Fi-enabled, mobile-ready readers and expanding mobile credential adoption for students. The university is also evaluating drone-based emergency response, audio analytics for early threat detection, and space utilisation insights enabled by video analytics.

Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritising sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Partnership with Axis Communications The partnership with Axis Communications has allowed Ferroport to meet Brazilian port standards with ease, while also supporting its robust sustainability strategy. Partnership with Axis Communications has allowed Ferroport to meet Brazilian port standards The ISPS Code (Resolution 53 Conportos) and Ordinance 143 of the Federal Revenue Service mandates that Brazilian port terminals must remain under 24/7 video surveillance, pioneering the port to search for a solution that would comply with these stringent standards while also enhancing wildlife conservation efforts in the area. Ferroport’s commitment to environmental stewardship has resulted in the planting of 66,000 trees in the surrounding area over six months and protecting more than 1.3 million loggerhead sea turtle hatchlings since 2008. Balance security with environmental conservation “Security is a top priority for Ferroport, with cutting-edge technology in place to protect our assets,” said Marcelo Oliveira, Property Security Coordinator for Ferroport. “With 206 cameras monitoring offshore, operational, and perimeter areas, our system was equipped to monitor unauthorised vessels during daylight hours, but nighttime surveillance presented a challenge due to the absence of natural light." "To balance security with environmental conservation, we partnered with Axis to capture high-quality images in complete darkness – enhancing security while minimising ecological impact.” Video surveillance network Ferroport invested in 20 Axis cameras, but the company has been expanding its network Ferroport upgraded its video surveillance network with cutting-edge technology capable of ensuring accurate and reliable surveillance of the port around the clock. Initially, Ferroport invested in 20 Axis cameras, but the company has been expanding its network as the impressive quality of the devices and positive impact on sustainability have become clear. With these installations, Ferroport can now: Leverage a high-tech solution that balances security, compliance, and environmental responsibility. Capture high-quality images in complete darkness – minimising the impact of artificial lighting on local ecosystems. Turn off night operating floodlights, allowing endangered species like maned wolves, porcupines, capybaras, and anteaters to return to their habitat. Use deep learning analytics for remote perimeter detection to prevent unauthorised entry by land, sea, or approaching vessels. Security capabilities “While Ferroport was looking to enhance its security capabilities, the company wasn’t willing to sacrifice its values or conservation goals to achieve it,” said Winicius Corali, Regional Sales Manager, Brazil, Americas. “We were able to work closely with port representatives to identify a solution that would provide the functionality Ferroport needed to comply with Brazilian regulations while also sustainability and conservation. Our hope is that Ferroport can serve as an example for other port security projects.”