Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
ADT is now offering ADT Blu, a self-installed home security system that customers can set up in minutes and manage directly through the ADT+ app. The modular DIY system can be scaled over time as customers' lives change and evolve. As more households adopt smart home devices and seek self-install options, ADT Blu is designed to eliminate the long-standing trade-offs of a DIY category that, to date, has largely been defined by standalone cameras. ADT uniquely understands that a reliable camera feed is just one part of an integrated security system that can both proactively prevent and rapidly respond to a security incident when every second counts. Many systems prioritise simplicity at the expense of performance or flexibility at the expense of reliability. ADT Blu delivers both. It combines the convenience customers expect from a self-setup system with the broader protection of an integrated security experience. Providing clear customer choice Through the fully integrated ADT+ app, customers can arm and disarm the system and receive alerts. They can also view live video, use AI video features and speak through connected cameras. All of this is available without long-term contracts or an in-home technician visit. The ADT+ platform also allows customers to expand their home security system over time, adding devices and sensors as needed. They can choose to activate ADT’s 24/7 professional monitoring network or monitor their home themselves. This provides flexibility today and a clear path to more support as their needs evolve. "ADT Blu gives customers something the DIY category has never really delivered — the ability to protect their home on their own terms, backed by a company with more than 150 years of trusted experience in home security,” said Todd Dernberger, Chief Growth Officer, ADT Inc. Pricing and availability ADT Blu offers standalone cameras starting at $69 and several packages priced from $249 to $389. Customers can also customise their equipment to suit their home's needs. ADT is streamlining the self-installed security experience from purchase to set up to everyday use. With ADT Blu available on Amazon, customers can buy the full suite of equipment in a place they shop for their home every day. ADT Blu will be available online at Amazon.com, ADT.com, and by phone at 1-800-ADT-ASAP.
iDenfy, a global provider of identity verification, fraud prevention, and various compliance-focused solutions, has launched a major update to its Know Your Business (KYB), or Business Verification, platform by introducing a Dynamic KYB Workflow feature. This new functionality will help companies automatically direct other company representatives who need to complete the onboarding into the most suitable KYB workflow based on their responses, and in this way, help businesses scale the KYB onboarding process effectively. Complaince teams Compliance teams, specifically in banking, fintech, and crypto industries, no longer just check boxes. They are under immense pressure to map complex corporate structures in real-time. Unlike Know Your Customer (KYC) verification, where you need to conduct due diligence checks on individual clients, KYB focuses on more complex background checks on the whole company, including its directors, shareholders, and other linked individuals, to avoid partnering with sanctioned entities and those that do not align with the company’s internal risk appetite. AI, pro or con According to iDenfy, due to the rise of AI and other related technologies, the risk of implementing a solution that can be breached is getting higher. “User experience is being taken to the top of the list, but security issues remain a challenge,” explained Domantas Ciulde, the CEO of iDenfy. “We wanted to create a solution that would cater to KYB processes, in this case, automate Business Verification workflows that are far more complex than standard KYC checks,” added Ciulde. Dynamic entity verification Traditional, static onboarding, where you simply request documents and wait, is failing to keep pace with modern risk management tools. Compared to individual customer drop-offs for KYC onboarding, KYB verification drop-offs are higher at least 15%, iDenfy claims. Therefore, to prevent financial crime effectively, the focus must shift from basic document collection to dynamic entity verification, moving away from manual, rigid processes and toward automated workflows that pull live data to verify business entities and their owners. Questionnaire-based KYB As a result, iDenfy has introduced a flexible questionnaire-based Know Your Business verification Dynamic Workflow builder that assigns scores on user-triggered responses. Based on predefined score ranges and conditions, end-users or company representatives fill out the documentation or complete the AI-powered, customisable questionnaires. Currently, compliance officers working with iDenfy’s KYB platform can use the new Dynamic Workflow feature to set up a simpler process for the client, meaning the client will receive only the required fields and document requests based on their onboarding profile and collected data. This way, the risk of getting back-and-forth with a client will be minimised, as the analysts will be able to set up different KYB processes as they like, putting in the missing elements into the workflow with zero coding. Automation features iDenfy’s Workflow feature offers advanced automation capabilities, and companies can now configure rules to either flag or block applications based on specific criteria. This upgrade helps to prevent high-risk entities from progressing further in the onboarding process, in this way reducing handling time and minimizing exposure to high-risk applicants who do not meet the organisation’s requirements. The new feature is based on a scoring logic and an instant trigger setup. The “Country select” functionality now includes grouping and weighting logic based on their severity and impact, with a dedicated scoring number and trigger configurations based on an applicant’s country of operation. These functions enable organisations to define how different answers impact the business owner onboarding journey. For example, higher-risk responses according to the set goals can automatically direct applicants into more comprehensive verification flows, while lower-risk profiles can proceed through simplified checks. In addition, the Dynamic KYB Workflow builder also works as an automatic blocking system that can identify and block users from high-risk jurisdictions or sanctioned countries. There’s now a “Decline session” action trigger, which enables organisations to automatically reject users based on their selected responses during the onboarding process. Application termination Rather than requiring a manual analyst review for predictable rejection criteria, this automated action allows compliance teams to define the exact conditions under which an application should be terminated immediately. The same principle works for other pre-defined custom factors linked to common risk flags, such as layered ownership structures, which are known to have potential ties to money laundering and fraud. If an application is blocked, all other automations are stopped immediately. Further, partners can now easily manage, edit, duplicate, name, or remove workflows using iDenfy’s Business Verification dashboard. This ability to flexibly use the KYB interface allows users to adapt KYB processes as regulatory requirements or business needs change over time. This is a particularly important step for industries that are exposed to evolving risks, where changes in ownership or financial activity may indicate potential fraud. Customisation fields The platform also supports extensive customisation, with 14 company data fields and 17 representative fields available to collect detailed information about corporate structures and key individuals. Businesses can request additional documentation, gather financial data, and apply KYC and AML measures to verify ultimate beneficial owners as part of the KYB process. The solution connects to more than 180 company registries across over 120 countries, which provide quick access to official, real-time data from official governmental and credit bureau databases, allowing businesses to verify company details with the most accurate and reliable data using a single platform. Onboarding customers “Using our Workflow builder, you can onboard different customers, whether it’s a freelance client or a big corporation. The “dynamic” part of our KYB solution allows you to adapt and trigger different corporate client onboarding flows based on your setup that you can manage without coding or any complexity of that sort,” said Domantas Ciulde, the CEO of iDenfy.
Allied Universal®, one of the world’s pioneer security and facility services provider, announces that Glen Kucera, president of Allied Universal Enhanced Protection Services, will lead a one-hour webinar titled “Executive Protection in a High-Risk World” on Wednesday, May 28, 2026 at 2 p.m. ET. “The potential impact of a targeted attack against an executive extends far beyond that individual,” Kucera said. “It can devastate organisations, families and teammates. The repercussions of a single violent incident can resonate across an entire enterprise for years, affecting operations, reputation, legal liability and morale.” Layered security strategies The webinar will discuss how quickly a threat can become a reality and how many organisations do not have the appropriate protections in place until after it’s too late. Kucera will draw from his experience keeping high-level executives safe to discuss how threats evolve, how perpetrators gain intelligence and target their victims, and where most executive protection programs fall short in fully protecting their executives. He’ll outline measures that organisations can take to reduce risk and more effectively protect their executives by implementing planning, awareness and layered security strategies that integrate into how they live and work. In particular, the webinar will delve into the challenges of traveling to different cities and countries and how to provide executives with advanced knowledge about their destination. Participants will learn what to communicate with executives prior to arrival, how to research potential risks specific to the area, and how to adapt their protection strategy to their environment. Complex risk environment “The reality is that today’s executives operate in an increasingly complex risk environment,” Kucera said. “Whether dealing with planned or opportunistic threats, this webinar will provide practical information security professionals, risk managers and executive teams can use today to enhance their executive protection programs and help ensure business continuity.” About the Webinar Title: Executive Protection in a High-Risk World Presenter: Glen Kucera, president, Allied Universal Enhanced Protection Services When: Wednesday, May 28, 2026, at 2 p.m. ET Duration: 1 hour Sponsor: Allied Universal Enhanced Protection Services
Dallmeier electronic USA, Inc. (DUS) announced the appointment of Dave Dalleske as Vice President, Commercial/Industrial Sales, reinforcing the company’s commitment to accelerating growth across North America and key vertical markets. Dalleske brings more than two decades of executive experience driving revenue growth, building high-performance teams, and executing global go-to-market strategies across the video security, SaaS, and industrial technology sectors. Supporting integration processes “Dave’s track record of transforming sales organisations and scaling revenue in complex, enterprise environments make him an ideal fit for our next phase of growth,” said Joe McDevitt, President of Dallmeier electronic USA, Inc. “His experience across security technologies and video platforms aligns perfectly with our strategic direction.” Dave has held executive leadership roles with internationally recognised manufacturers in the video security industry, where he consistently delivered strong revenue growth, expanded global market presence, and secured major enterprise contracts. In these roles, he was also instrumental in supporting integration processes following strategic acquisitions as well as in developing and implementing international sales and marketing strategies. Earlier in his career, he took on various leadership positions with responsibility for marketing and regional sales operations across EMEA. Critical infrastructure markets Dalleske’s expertise spans enterprise sales, strategic account development, and data-driven performance management, with deep industry knowledge in IP video, physical security, and industrial safety. He holds a Bachelor of Science in Business with a focus on Marketing Management from Virginia Tech. “I’m excited to join Dallmeier at such a pivotal time,” said Dalleske. “The company’s technology, particularly in advanced video solutions, positions it uniquely in the market. I look forward to working with the team to expand our footprint and deliver meaningful value to customers.” This appointment underscores Dallmeier’s continued investment in leadership and innovation as it expands its presence across commercial, industrial, and critical infrastructure markets. Video information technology In 1984, Dieter Dallmeier founded what is now Dallmeier electronic – not in the proverbial garage, but in a garden shed in Regensburg, Germany. Today, the company, which can justifiably call itself a hidden champion for video information technology "Made in Germany", has several hundred employees worldwide, more than 250 of them at the company headquarters in the center of Regensburg alone. Dallmeier's camera, recording, software, and analysis solutions optimise security and processes for B2B end customers in a wide range of industries in over 60 countries. The focus is on users from the casino, smart city, airports, logistics, stadiums, and industrial sectors. But also, banks, critical infrastructure facilities as well as medium-sized companies from all sectors. Multifocal sensor technology With pioneering innovations, Dallmeier has succeeded time and again in placing itself at the forefront of technology: From the world's first digital image storage system with motion analysis in 1992, the patented "multifocal sensor technology" Panomera® with its "Mountera®" mounting system, to the latest Domera® camera family, which allows up to 300 camera variants with only 18 components. These and many other innovations provide real, tangible customer benefits. And with a low Total Cost of Ownership (TCO) and a high Return on Investment (ROI) they can easily compete with systems produced and supplied from low-wage countries. With "Made in Germany", they also guarantee the customers the highest standards in data protection, cybersecurity, and ethical responsibility. With high quality and short supply chains, they also ensure – almost incidentally – sustainability and environmental protection. From their prestigious headquarters in the centre of Regensburg, Dallmeier not only carries out its own research and development but also the complete manufacturing process – from component to product to solution.
Access control applications
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its AI gun detection and intelligent situational awareness platform has been deployed by New Jersey’s Sayreville Borough School District to protect students and faculty against gun-related violence. Located in Middlesex County, the district serves approximately 6,500 students and employs approximately 750 staff across 10 buildings, including a high school, middle school, upper elementary school, four K–3 elementary schools, two preschools, and a specialised 18–21 program that operates a publicly accessible store and café for job training. With strong community involvement, the district prioritises proactive safety measures and operates on the principle of staying ahead of evolving security needs. Incident management software ZeroEyes enhances the district’s comprehensive, multilayered security strategy and will be integrated with Singlewire’s InformaCast incident management software. This enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices, supporting faster, more coordinated emergency responses and ensuring critical information reaches those who need it most. “Our responsibility is to create an environment where students and staff can focus on learning while knowing that safety is taken seriously,” said Dr. Richard Labbe, superintendent of Sayreville Borough School District. “By integrating advanced technology, such as ZeroEyes, into our broader security framework, we are strengthening our ability to identify potential threats early and act quickly, helping us move from awareness to action in a matter of moments.” Secure learning environment ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and school security teams as quickly as 3 to 5 seconds from detection. “Sayreville Borough School District’s leadership has demonstrated a strong commitment to creating a safe and secure learning environment,” said Mike Lahiff, co-founder and CEO of ZeroEyes. “We’re proud to support their efforts by turning existing security infrastructure into a source of timely, reliable insight that supports faster, more confident action.”
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that Amos P. Godby High School in Tallahassee, Florida, is the first in the nation to deploy a three-part integrated solution called RADAR (Real-time Alert, Detection And Response). This solution combines ZeroEyes’ AI-based gun detection and situational awareness solution with Ark Strategic’s 3D Mapping solution and Campus Guardian Angel drones to provide comprehensive, real-time threat detection, alerting, and response in the case of a gun-related incident. Enhancing situational awareness "ZeroEyes Al gun detection and Ark Strategic’s 3D mapping solution, combined with Campus Guardian Angel, represent the cutting edge of school security in the United States," said Jimmy Williams, Chief of Safety, Security, and Emergency Management for Leon County School District. "When leveraging these tools collectively in Project RADAR, we’re continuing to set a national standard for school security with solution-oriented and mission-ready resources.” Ark Strategic’s 3D mapping solution blends cutting-edge aerial and interior mapping technologies to deliver unparalleled operational intelligence for its customers. When integrating the exterior and interior intelligence with ZeroEyes AI threat detection software, the solution empowers first responders to quickly identify critical assets, enhance situational awareness, and respond to threats with greater speed and precision. Situational awareness software layers “At Ark Strategic, our mission is to turn the entire campus into actionable intelligence,” said Chris Yellina, Founder & Chief Product Officer at Ark Strategic. “With inside-and-out coverage, responders have a clearer picture of the environment before they ever make entry.” ZeroEyes' AI threat detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Creating a safer environment When a detection occurs at a location mapped in 3D, each camera alert is automatically tied to its exact position on the map, enabling responders to navigate instantly to the area of concern. The system is entirely cloud-based, requiring no installation for local law enforcement. Annotated maps display camera placement, fields of view, and potential blind spots, while operational layers and interactive measurements empower security teams to assess situations and make informed decisions quickly. In tandem, or if a panic button is pressed, Campus Guardian Angel deploys non-lethal drones within seconds, tracking the assailant and navigating obstacles to provide support and situational awareness. While in operation, the drones actively distract, delay, and disrupt the perpetrator, buying precious time and creating a safer environment for students and staff. Truly comprehensive security solution “Amos P. Godby High School’s deployment of RADAR marks a historic step forward in school safety,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “This integrated and innovative approach further demonstrates how utilising a multilayered technology solution can protect students and staff more effectively, setting a new standard for safety nationwide.” "We are thrilled to partner with the innovative team at ZeroEyes in launching Florida’s first-in-the-nation pilot program, which includes Godby High School, bringing together the best in AI-powered gun detection and elite human-piloted drone response capabilities to create a truly comprehensive security solution that can save lives,” said Justin Marston, CEO and co-founder of Campus Guardian Angel. Enhancing campus safety “Our innovative Active Shooter Suppression System is uniquely designed to deliver non-lethal effects that distract, delay, and disrupt a threat within seconds, buying critical time for law enforcement to protect students and staff. We are proud to be working side-by-side with companies like ZeroEyes to advance cutting-edge technology solutions to enhance campus safety in Florida and across the nation.” ZeroEyes, Ark Strategic, Campus Guardian Angel, and the district are hosting a summit June 17 and 18 at Godby High School, featuring demonstrations and discussion sessions surrounding the technologies, including reflections from school leaders on the district’s successful deployment. The event is open to local schools, law enforcement, and the media.
John Street, Newham, a high‑rise residential development comprising Blocks A and C, has been equipped with a comprehensive life safety solution from Advanced, incorporating SmokeGo smoke control and EvacGo evacuation alert systems to support a stay‑put fire strategy and enhance resident safety. The project, delivered as part of a wider life safety installation by Simple Life Safety Systems Limited, required a robust and compliant approach to smoke control and evacuation alert across two buildings with different heights and risk profiles. Block A is a 14‑storey, high‑rise residential block, while Block C is a smaller, four‑storey building. Each block was equipped with one SmokeGo panel and one EvacGo panel, providing dedicated control tailored to the specific needs of each structure. High‑rise residential block SmokeGo was specified to deliver active smoke control via the fire system, supporting the management of smoke in common escape routes and critical areas. Designed to comply with EN 54 Parts 2 and 4, as well as BS 7346‑8 and ISO 21927‑9, SmokeGo enables automatic and manual control of smoke control fans and dampers from a single, intuitive interface. Its simple matrix‑based configuration allowed the project team to clearly define smoke compartments and cause‑and‑effect relationships, helping ensure smoke is contained and extracted effectively in the event of a fire. EvacGo was installed as a fully independent BS 8629-compliant evacuation alert system, giving the fire and rescue service a reliable and secure means of alerting residents if evacuation beyond the affected flat is required. Each EvacGo panel is housed within a robust, tamper‑proof enclosure and is designed exclusively for use by the fire and rescue service, helping prevent misuse while ensuring clear, decisive control during an incident. Complex residential project John Newton, Director Life Safety at Simple Group, commented: “John Street was a complex residential project that required careful coordination between smoke control and evacuation alert systems. Using SmokeGo and EvacGo allowed us to deliver a fully compliant solution that aligns with the fire strategy while giving the fire and rescue service the tools they need to manage incidents safely and effectively.” The SmokeGo smoke control system and EvacGo evacuation alert system operate as separate dedicated life safety systems, ensuring smoke movement can be actively controlled while evacuation decisions remain firmly in the hands of the fire and rescue service. This layered approach supports resident safety without undermining the stay‑put strategy that underpins the building’s fire design. Implementing smoke control Shaun Scott, Applications Engineer at Advanced, added: “Projects like John Street highlight the importance of implementing smoke control and evacuation alert systems correctly. SmokeGo makes complex smoke control logic far simpler to configure and manage, while EvacGo provides a clear, compliant evacuation alert solution. Together, they deliver confidence for installers, building managers, and emergency responders alike.” With one SmokeGo panel and one EvacGo panel installed in each block, the John Street development now benefits from a coordinated life safety solution that addresses both smoke management and evacuation alerting in line with current best practice and regulatory guidance. The project demonstrates how Advanced’s specialist systems can be combined to meet the evolving safety requirements of modern residential buildings, delivering compliant, practical solutions that prioritise both resident safety and operational simplicity.
Genting Casino at Westfield Stratford City has completed a major fire alarm system upgrade with Comelit-PAC technology, delivered in partnership with installation specialist VTF&S. As the UK’s largest casino floor, including the biggest poker room in the country, Genting Stratford operates around the clock, welcoming visitors day and night. Any upgrade to critical infrastructure needed to be carried out without interrupting the flow of customers and staff, while maintaining strict safety standards throughout. Slowing response times The casino’s previous fire alarm system operated on a closed protocol, which had become increasingly restrictive. Even minor adjustments required specialist call-outs, increasing costs and slowing response times. By contrast, Comelit-PAC’s four-loop fire system offers a more flexible, open protocol approach, enabling easier maintenance and reducing long-term operational expense. The upgrade also ensures improved system reliability and faster fault identification, better suited to the demands of a busy, high-traffic venue. Careful planning and coordination Beyond the technical and visual improvements, the inclusion of Comelit-PAC’s free cloud connection allows the system to be monitored and supported remotely. Secure cloud access enables engineers to diagnose and often resolve issues without waiting for a site visit. The installation was carried out by VTF&S while the casino remained fully operational. Working in a live environment required careful planning and coordination, supported by Comelit-PAC’s technical team. This collaborative approach enabled the upgrade to be delivered with minimal disruption, while also setting the foundation for faster, more cost-effective ongoing support through remote connectivity. Implementing safety and efficiency The project’s success relied on close collaboration between Genting Casino, VTF&S and Comelit-PAC. Clear communication and meticulous planning ensured the system could be upgraded safely and efficiently while the venue continued to operate as normal. Says Ben Howley of Comelit-PAC: “This project demonstrates with the right teamwork and planning, even complex upgrades can be delivered seamlessly in a live venue. Genting Casino now has a system that was implemented safely and efficiently and simple to maintain even remotely, thanks to the strong partnership between all parties involved.”