Mobile Access Trends

ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Latest Access control news

At a time when quantum computing is rapidly emerging as an entirely new security challenge for organisations and governments around the world, Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud and one of the first cyber resilience vendors to support post-quantum cryptography (PQC), announces enhancements to its PQC capabilities. These advancements are designed to help customers protect their highly sensitive, long-term data from a new generation of imminent but unknown cyber threats, creating an additional layer of support, when needed. Quantum computing 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks Quantum computing uses quantum mechanics to process data and solve complex problems that could take decades with classical computers. However, these advancements bring unprecedented security challenges, along with the potential for threat actors to use quantum computing to decipher and unlock traditional encryption methods. According to the Information Systems Audit and Control Association’s (ISACA) Quantum Computing Pulse Poll, 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks and 50% believe it will present regulatory and compliance challenges. Now is the time to prepare and take action. Support for quantum-resistant encryption standards Commvault has provided support for quantum-resistant encryption standards, like CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON, as recommended by the National Institute of Standards and Technology (NIST) since August 2024. It was then that Commvault introduced a cryptographic agility (crypto-agility) framework, enabling its customers, via the Commvault Cloud platform, to address rapidly evolving threats without overhauling their systems. With today’s announcement, Commvault has built on that framework by adding support for Hamming Quasi-Cyclic (HQC), a new error correcting code-based algorithm designed to defend against threats like 'harvest now, decrypt later' where adversaries are intercepting encrypted network traffic and storing it for a later time when quantum computers are powerful enough to decrypt it. Quantum threat “The quantum threat isn’t theoretical,” said Bill O’Connell, Chief Security Officer at Commvault. “We were among the first cyber resilience vendors to address post-quantum computing, and by integrating new algorithms like HQC and advancing our crypto-agility framework, we are providing our customers with the tools to navigate this complex landscape with confidence.” “Our goal is simple and clear: as quantum computing threats emerge, we intend to help our customers keep their data protected.” Post-quantum cryptography For industries where long-term data storage is required, like finance and healthcare, Commvault's expanded post-quantum cryptography capabilities provide access to a variety of safeguards that can help fortify network tunnels against quantum-based attacks. With Commvault’s Risk Analysis capabilities, customers can discover and classify data to determine where these cryptographic capabilities may be helpful. In addition, Commvault’s capabilities are simple to implement, often using a checkbox configuration, making it easy for customers to utilise when needed. The evolving quantum landscape – the need for speed As investments pour into the quantum field, the time to address emerging threats is shrinking As investments pour into the quantum field, the time to address emerging threats is shrinking. This makes proactive adoption of post-quantum cryptography critical. “Quantum readiness has become a business imperative, particularly for industries which handle data that remains sensitive for decades. The time when currently encrypted data can be decrypted using quantum technology is closer than many people think,” said Phil Goodwin, Research VP, IDC. “Commvault’s early adoption of quantum-resistant cryptography and commitment to crypto-agility positions it at the forefront among data protection software vendors in proactively addressing quantum threats. Organisations with sensitive, long-term data need to prepare now for a quantum world.” Commvault: An invaluable partner “Commvault has been an invaluable partner in our journey to enhance cyber resilience. Their leadership in adopting post-quantum cryptography, combined with their crypto-agility framework, is exactly what we need to meet stringent government security mandates and protect highly sensitive information from emerging quantum threats,” said Jeff Day, Deputy Chief Information Security Officer, Nevada Department of Transportation. “Safeguarding sensitive data is paramount, and the long-term threat of quantum decryption is a significant concern. Commvault's rapid integration of NIST's quantum-resistant standards, particularly HQC, gives us great confidence that our critical information is protected now and well into the future,” said Peter Hands, Chief Information Security Officer, British Medical Association. “Their commitment to crypto-agility is important for healthcare organisations like ours.” Availability Commvault’s post-quantum cryptography capabilities, including support for NIST’s HQC algorithm, are immediately available to all Commvault Cloud customers running software version CPR 2024 (11.36) and later, enabling seamless adoption of quantum-resistant protection.

In the industrial landscape, ensuring security isn’t just about guarding entry points—it’s about securing processes, assets, and people with intelligence. That’s where the Advanced Access Control system steps in. For manufacturing plants, this system offers more than just card-based entry—they deliver operational safety, traceability, and compliance. Growth in the access control Markets and Data reveals significant growth in the global access control and authentication market An industry report by Markets and Data reveals significant growth in the global access control and authentication market. Starting at $13.2 billion in 2022, it's set to expand to $26.1 billion by 2030, reflecting a robust 8.9% CAGR for the period between 2023 and 2030. In fact, a study by IBM shows that internal threats account for nearly 60% of manufacturing-related data breaches, making identity-based access control a critical need. Why traditional access control isn't enough Manufacturing plants operate with high-value assets, dangerous machinery, and round-the-clock shifts. Legacy access system—limited to basic RFID or PINs—fails to monitor who, where, and when with precision. Most importantly, they can't adapt dynamically to shifts, roles, or emergency overrides The traditional system lacks real-time visibility, contextual intelligence, and scalability to meet these evolving needs. A breach here isn’t just a loss—it could halt production or trigger a safety hazard. Most importantly, they can't adapt dynamically to shifts, roles, or emergency overrides. In an era where cyber-physical threats are rising and compliance audits are tighter, traditional access just isn’t equipped to protect modern manufacturing setups. Types of advanced access control system Modern manufacturing facilities are adopting multiple types of advanced access control system, such as: Biometric Authentication: Fingerprint, iris-based, or facial access control system eliminates the risk of credential sharing. According to the Lift HCM article "Slash Time Theft: Choosing Between Biometric and Digital Time Clocks", for a 100-employee company, a biometric system typically eliminates an average of 2.5 hours of time theft per employee per month, translating to approximately $45,000 in annual savings based on average wage calculations. Multi-factor Authentication (MFA): Combining credentials (card and biometric access control system) to strengthen entry authorisation. According to CISA (Cybersecurity and Infrastructure Agency), the use of MFA makes users 99% less likely to be hacked! Mobile-based Access: Access through secure mobile apps enhances user convenience and hygiene. The global mobile access control system market size is predicted to be valued at $1,638,455.4 thousand by 2032, surging from $228,690.0 thousand in 2022, at a noteworthy CAGR of 22.4%, as noted by the research dive, a market research firm. Role-Based Access: Access is customised based on job function or hierarchy to critical zones. According to a report by Tata Communications, Role-Based Access Control (RBAC) is a key practice that limits the potential effect of insider threats by allowing workers the right to do their duties. How Matrix empowers manufacturing security Solutions such as those offered by Matrix provide capabilities like modular, role-based For manufacturing entities seeking to enhance industrial safety and operational excellence, a robust and advanced access control system is paramount. Solutions such as those offered by Matrix provide capabilities like modular, role-based, time and zone-based, and device-based user access control policies, real-time alerts, and tamper detection mechanisms. How advanced access control solutions can enlighten These features are designed to help streamline operations, ensure compliance with regulatory standards, and mitigate security risks, ultimately contributing to optimised efficiency, enhanced safety, and asset protection within a dynamic industrial landscape. Ready to embrace a future where industrial safety and operational excellence harmoniously converge? Discover how advanced access control solutions can enlighten the manufacturing environment with unparalleled security, seamless efficiency, and complete peace of mind.

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer the company through this exciting new chapter is the newly appointed Regional Director, Graham Wheeler – a well-respected figure in the security and surveillance world with deep technical know-how and a sharp understanding of the APAC market. Graham’s appointment Graham’s appointment marks an exciting next step for Secure Logiq, as the company looks to build Graham’s appointment marks an exciting next step for Secure Logiq, as the company looks to build on its strong foundation in Europe and the Middle East and bring that same success to a region full of potential. With Australia and New Zealand already embracing tech innovation, it’s the perfect time to introduce smarter, more cost-effective ways of designing and deploying video surveillance systems. Secure Logiq performance solutions “At Secure Logiq, we don’t just provide hardware - we help our partners build better systems,” said Wheeler. “The ANZ market is ready for that kind of thinking. There’s a real hunger here for reliable, high-performance solutions that don’t come with inflated costs or over-complicated specs. I’m really excited to show people what we can do.” Secure Logiq well-informed partnerships The goal is to support local consultants, integrators, and end users with not just great products Secure Logiq is committed to building strong, well-informed partnerships. The goal is to support local consultants, integrators, and end users with not just great products, but real expertise - delivered through hands-on engagement, value-added distribution, and smart education. Unlike many in the server space, Secure Logiq doesn’t just ship boxes. It works closely with partners to create tailored, end-to-end solutions that deliver better performance and stronger long-term value. Secure Logiq’s surveillance systems “APAC has been on our radar for some time,” said Ben Yoxall, Joint-MD of Secure Logiq. “But it wasn’t about rushing in. We wanted the right person, the right plan, and the right timing—and with Graham on board, we’ve got all three. His depth of knowledge and network in the region are a huge asset.” The company is entering the market at a time when many surveillance systems are still over-engineered, under-optimised, or both - often costing far more than they should. Secure Logiq’s team believes there’s a better way. Secure Logiq planning to run workshops and sessions Secure Logiq is planning to run workshops and sessions across the region to share knowledge By designing systems with a clear understanding of how surveillance hardware should perform, they’re helping customers achieve more throughput, more storage and more resilience, without blowing the budget. Education will play a key role in this rollout, with Secure Logiq planning to run workshops and sessions across the region to share knowledge and elevate industry standards. The team will also be on the ground at two of the region’s biggest trade events: ASIAL Security 2025 in Sydney this August, and The Security Event Singapore in November. Secure Logiq's key concerns Australia is a natural fit for this next chapter. It’s a market that embraces innovation and sits in a prime spot for engaging with the wider APAC region. With increasing demand from government and enterprise sectors, especially where cybersecurity and total cost of ownership are key concerns - Secure Logiq is confident it can bring something different to the table. “I’m looking forward to hitting the ground running,” added Wheeler. “From industry events to partner visits and knowledge-sharing sessions, it’s all about showing up, listening, and proving we can add real value.”

As he celebrates a decade with Gallagher Security, Regional Manager for China and North Asia, Jin Hui, reflects on a career marked by strong relationships, regional growth, and a deep passion for delivering exceptional outcomes for customers and partners. Gallagher’s own expansion Jin joined Gallagher in 2015 as a Business Development Manager, quickly establishing himself as a key member of the Asia team through his technical expertise, customer-centric approach, and deep understanding of the North Asia market. His progression through the company has mirrored Gallagher’s own expansion in the region, taking on the role of Regional Manager for North Asia in 2019, before stepping into his current role as Regional Manager for China and North Asia in January 2024, a strategic appointment aligned with Gallagher’s long-term growth plans for China. Jin's role in driving growth Jin has played an instrumental role in driving growth across Japan, Korea, Taiwan, and Hong Kong Over the past 10 years, Jin has played an instrumental role in driving growth across Japan, Korea, Taiwan, Hong Kong, and Macau. His ability to build trust and lead with both technical depth and customer-centricity has earned him the respect of colleagues, customers, and partners alike. Jin’s impact on the region General Manager for Asia, David Thean, says Jin’s impact on the region has been profound. “Jin is a tremendous asset to our team and our business,” says David. “His knowledge, passion, and commitment have helped us grow our presence and capability across North Asia, and his leadership as we expand into China will be critical to our continued success. I’m excited to see what the next 10 years will bring for Jin and for Gallagher under his guidance in this region.” Gallagher's continued expansion As Gallagher accelerates its growth in Asia, Jin says he is energised by the opportunities ahead As Gallagher accelerates its growth in Asia, Jin says he is energised by the opportunities ahead. “I’m proud to have been part of Gallagher’s journey over the last decade,” Jin says. “It’s been incredibly rewarding to work alongside such talented people and contribute to the growth of the North Asia region. I’ve seen first-hand the difference Gallagher makes for our customers, and I’m excited to lead our continued expansion, bringing world-class solutions and local partnership to a dynamic and evolving market.” Gallagher’s success in North Asia Throughout his tenure, Jin’s mix of technical expertise, strategic thinking, and people-first leadership has stood out. His role continues to be pivotal in shaping Gallagher’s success in North Asia and the company looks forward to many more milestones ahead.
Access control applications

Comelit-PAC has successfully upgraded the access control infrastructure at Blackpool Victoria Hospital, ensuring a seamless and secure environment for staff, patients, and visitors. Blackpool Victoria Hospital is one of the largest and busiest hospitals in the Northwest, providing essential healthcare services to thousands of patients each year. As a pioneering medical facility, ensuring a secure and efficient environment is a top priority. Integrated PAC Access Central Security technology works programme integrated PAC Access Central with multiple PC workstations Designed to provide a robust and scalable security solution, the security technology works programme integrated PAC Access Central with multiple PC workstations for comprehensive global administration across the hospital’s network To safeguard critical areas within the hospital, Comelit-PAC’s advanced 500 series controllers were utilised. This includes the 511, 512 model door controllers linked into the existing 500 Access & Alarm servers on site, offering a mix of ethernet and RS485 connectivity to enhance system flexibility and efficiency. Security and administrative control Martyn McKechnie, Head of Digital Identity at Blackpool Victoria Hospital, commented: "As a busy hospital with multiple departments and critical areas, we required an access control system that could integrate seamlessly while offering high levels of security and administrative control." Martyn McKechnie adds, "PAC Access Central provides the scalability and reliability we need to manage hospital-wide access efficiently. The ability to oversee all access points from multiple PC workstations ensures our Digital Identity and Security teams can respond quickly to any situation." Future-proof access control system Blackpool Victoria Hospital benefits from a resilient and future-proof access control system A key element of the installation is its server-based architecture, providing enhanced security measures and fail-safe redundancy. This ensures Blackpool Victoria Hospital benefits from a resilient and future-proof access control system, capable of meeting the bespoke demands of the healthcare environment. Advanced security infrastructure Jason Sullivan, PAC/GDX Strategic Development Manager at Comelit-PAC, said: "We worked closely with Blackpool Victoria Hospital right from the initial specification stage to deliver a solution to balance security with ease of management." Jason Sullivan adds, "PAC Access Central presents a future-proof system that allows the hospital to maintain strict access control, while adapting to evolving needs. By adopting this advanced security infrastructure, Blackpool Victoria Hospital continues its commitment to maintaining a safe and secure environment, leveraging Comelit-PAC’s expertise in access control technology."

In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.

The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.

Genetec Inc., the global pioneer in enterprise physical security software, has announced that Binghamton University, a nationally recognised research institution and one of the four university centres of the State University of New York system (SUNY), has successfully implemented the Genetec™ Security Center platform to unify its security systems, streamline operations, and better support the safety of its expanding campus community. Binghamton University selects Genetec Spread across 930 acres with over 120 buildings and four locations, Binghamton University faced increasing challenges with its legacy security infrastructure, which consisted of siloed video, access control, intrusion detection, and mass notification systems. These disconnected technologies made it difficult for staff to respond to incidents in real-time, introduced security gaps, and required inefficient manual processes to bridge system limitations. Genetec Security Center platform Binghamton chose the Genetec Security Center platform, including Synergis™ (access control), Omnicast™ (video management), AutoVu™ (automatic license plate recognition (ALPR)), Sipelia™ (intercom), and Genetec Clearance™ (digital evidence management), to centralise its security operations. With more than 4,800 access control readers and 1,635 surveillance cameras now integrated into a single interface, the university has seen immediate improvements in both efficiency and incident response. Benefits “With Genetec, we’ve eliminated the inefficiencies of siloed systems and gained the tools to respond faster, work smarter, and plan for the future,” said Dave Martin, Assistant Director of Security Infrastructure and Support at Binghamton University. He adds, “Our teams are now equipped with real-time video analytics that enable operators to monitor unplanned gatherings and assess if the situation is a permitted activity or needs to be addressed. Most importantly, we’ve created a safer environment for our students and staff.” More security enhancements on the way Binghamton University plans to continue its security enhancements, including replacing nearly 3,000 residential hall locks with Wi-Fi-enabled, mobile-ready readers and expanding mobile credential adoption for students. The university is also evaluating drone-based emergency response, audio analytics for early threat detection, and space utilisation insights enabled by video analytics.