Radio frequency Identification
ELATEC, a pioneering manufacturer of access technologies, specialising in RFID readers and credentials, has released its latest software development toolkit, TWN4 DevPack 5.07. The new version delivers faster performance, stronger security and greater flexibility for configuring and managing RFID readers, enabling flexible and future-proof access solutions. Future-ready authentication solutions “With every DevPack release, our goal is to make life easier for developers,&...
Alfred International, a pioneer in smart lock solutions, announced that its ML2 Smart Mortise Locks and DB2S Smart Locks with Zigbee have achieved INTEREL certification, enabling seamless integration with the EOS 2 all-in-one thermostat hub for smart building deployments. This certification positions Alfred as a key partner for property management companies seeking cost-effective, scalable access control solutions across multi-family properties. Alfred's commercial-grade Zigbee smart locks Th...
Third Millennium, a provider of access control solutions and part of HID, announces the launch of new RXQR and RXQRK readers — multi-technology access-control devices that integrate high-security RFID card and QR code credentials into a single, elegant unit. Designed to simplify visitor and contractor management, and support both legacy and modern communication protocols, the RXQR range is part of Third Millennium’s RX Series, delivering an advanced yet cost-effective solution for t...
Spotter Global (SpotterRF) announced the release of NetworkedIO 6.0 (NIO 6.0), the world’s first and only commercially available Command and Control (C2) software with fully integrated dual Radar AI and Video AI classification. This system is designed to deliver unmatched wide-area physical threat detection coverage with a minimum 80% reduction in false alarms for perimeter security systems. Visitors to the GSX 2025 event in New Orleans next week can see a demonstration of NIO 6.0 at boot...
Alfred International, a pioneer in smart lock solutions, will make its debut at GSX 2025 in the First Time Exhibitor Pavilion, Booth #3406, showcasing innovative access control solutions designed specifically for commercial, multi-family, and rental property markets. The company will highlight its expanding portfolio of professional-grade smart locks, led by the new DB1 Pro Smart Deadbolt and the industry-first Interconnect Kit. Key highlights DB1 Pro Smart Deadbolt: Alfred's most adv...
Intelligent power management company - Eaton has launched the new Scantronic Secure Radio (SSR) Range, designed to make wireless intruder alarm systems faster to install, easier to upgrade and more tamper-proof. With over 50 years of security expertise, Eaton’s new SSR Range addresses the growing demand for flexible and secure systems. Traditional hard-wired set-ups The range combines fast structure, encrypted two-way touch and built-in cloud connectivity to secure buildings These can...
News
ASSA ABLOY has acquired Calmell, a Spanish manufacturer of smart cards, smart paper tickets and magnetic tickets. "I am very pleased to welcome Calmell to ASSA ABLOY, an exciting technological addition that will reinforce our current offering within smart cards, and provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. Public transportation ecosystem “Calmell is a fantastic addition to our growing public transportation ecosystem, and we are excited to welcome them to the HID family,” says Björn Lidefelt, EVP and Head of HID. “Calmell’s offering and expertise enable people to get where they need to go, aligning well with our desire to help the world travel more freely.” HID's business area Calmell was founded in 1920 and has some 100 employees. The main office is located in Barcelona, Spain. Calmell will be part of HID's business area Identification Technologies. Sales for 2024 amounted to about MEUR 29 (approx. MSEK 330) with a strong EBIT margin. The acquisition will be accretive to EPS from the start.
Suprema, a pioneer in AI-powered access control and security solutions, announced the launch of a new 2-door access controller, CoreStation 20 (CS-20), and Door Interface (DI-24) module for 2-door and 4-reader. With these additions, Suprema has expanded its ACU (Access Control Unit) portfolio, further enhancing the portfolio’s security, flexibility, and scalability. New Door Interface module Suprema offers a comprehensive ACU portfolio designed to support building access control systems that can flexibly adapt to a wide range of operational requirements from small facilities to large-scale enterprises. Suprema’s flagship controller CoreStation (CS-40) supports biometric matching suitable for advanced high-level security environments. CoreStation 20 is a compact yet powerful RFID-only controller, supporting up to 500,000 users and offering native PoE+ support and encrypted communication. The new Door Interface module is designed to simplify wiring and operate reliably even without a live network connection. Suprema’s ACU products Suprema’s ACU products provide high deployment flexibility, supporting both centralised systems Suprema’s ACU products provide high deployment flexibility, supporting both centralised systems for large-scale sites and distributed architectures for smaller facilities with simplified connection structures. This flexibility not only enables the deployment of access control systems tailored to diverse environments but also facilitates cost-effective upgrades of legacy infrastructure through cable reuse, simplified installation, and streamlined maintenance—ultimately reducing overall deployment time and cost. Suprema’s access control system “The launch of CoreStation 20 and Door Interface has further strengthens the scalability and flexibility of Suprema’s access control system. These additions enable system designs tailored to a wide range of customer environments, while reducing installation costs, reinforcing security through encrypted communication, and ensuring stable operation, even during unexpected events such as power outages,” said Hanchul Kim, CEO of Suprema Inc. “Moving forward, Suprema aims to help customers operate their systems with greater confidence and expects these advancements to further strengthen the brand’s reliability in the global market.”
Omnilert, a pioneer in AI-powered active shooter prevention technology, today announced a significant expansion of its Secure Schools Grant Program in response to overwhelming demand from schools and universities nationwide. Originally intended to support 20 schools, the program will now provide 50 schools across the United States with three years of free access to Omnilert's AI Gun Detection, the company's AI-driven firearm detection solution. This expansion is made possible in part through a partnership with BCD, a leading provider of purpose-built video surveillance hardware. As the official hardware sponsor for the program, BCD will supply the required hardware infrastructure at no cost to participating schools, enabling faster deployments and further reducing financial barriers for school districts. School gun violence "The overwhelming response to the grant program made one thing clear: schools across the country are actively seeking better ways to protect their students," said Dave Fraser, CEO of Omnilert. "We couldn't turn away schools that are taking a stand for safety. Expanding this program is more than a response—it's a reflection of our mission to stamp out school gun violence through innovation and action." "We are proud to partner with Omnilert on this critical initiative," said Jim Gross, CEO of BCD. "Enabling schools to quickly deploy cutting-edge safety technology is one of the most meaningful ways we can use our expertise to make a real difference." Diverse schools selected The 50 selected schools represent a diverse mix of public, private, urban, suburban, and rural institutions united by one goal: ensuring a safer learning environment for students and staff. Each grant recipient will receive: A three-year no-cost license for Omnilert Gun Detect Expert support for system deployment and setup Staff training and ongoing customer success services Seamless integration with existing security and emergency systems Omnilert Gun Detect uses advanced AI to monitor existing security cameras and instantly detect visible firearms, sending real-time alerts to enable rapid response—often before a shot is ever fired. Kickoff webinars for the awarded schools begin in late June, with installations scheduled in phases throughout the summer and fall of 2025.
Airbus Defence and Space has signed a Memorandum of Understanding (MoU) with Cluster 2 at the Paris Air Show to deliver next-generation digital solutions that enhance airport efficiency, security and collaboration across Saudi Arabia. The ceremony was attended by H.E. Abdulaziz Al-Duailej, President of the General Authority of Civil Aviation (GACA), Wouter Van Wersch, Executive Vice President of Airbus International, Gabriel Semelas, President of Airbus in Middle-East and Africa, and Mr. Saad A. Alajlan, General Manager of Commercial Operations and Business Development at Cluster 2. The partnership will introduce advanced technologies including Agnet Turnaround by Airbus , a smart platform that enables real time coordination of airport operations. Improve situational awareness Through this MoU, Airbus and Cluster 2 aim to raise operational standards This will empower Cluster 2 to streamline workflows, enhance on-time performance and elevate the passenger experience across its network of 22 international and domestic airports. Through this MoU, Airbus and Cluster 2 aim to raise operational standards, improve situational awareness and drive seamless collaboration between ground staff, security teams and control rooms. Agnet Turnaround “This partnership underscores our commitment to driving digital innovation in aviation. With Agnet Turnaround, we are enabling smarter, safer and more connected airports that align with the Kingdom’s vision for the future of transportation,” said Antoun Farra, Managing Director of Airbus Defence and Space in Saudi Arabia. “Airports are vital gateways to the Kingdom, and digital transformation is at the heart of our strategy. Partnering with Airbus allows us to enhance safety, reduce response times and create a unified operations ecosystem across our airports,” commented Eng. Badr Al-Dalami, Chief Executive Officer of Cluster 2. With multiple communication and automation capabilities, Agnet Turnaround is a smart and secure solution that aims at solving daily operational challenges for aviation stakeholders and enhancing On Time Performance (OTP).
Zivver, Europe’s major provider of secure communications, best known for its AI-powered email security solutions and headquartered in Amsterdam, announced it has been acquired by Kiteworks. Kiteworks enables organisations worldwide to effectively manage risk in every send, share, receive, and use of private data via its Private Data Network (PDN), which protects over 100 million end-users and 1,500 enterprises globally. Kiteworks accelerated its growth trajectory, including international markets, with $456 million in growth equity funding from Insight Partners and Sixth Street Growth in August 2024. Private data exchange Through this acquisition, Zivver will expand its private data exchange portfolio Through this acquisition, Zivver will expand its private data exchange portfolio with sovereign data solutions deployable on-premises, in private cloud, or public cloud environments. This strengthens Zivver’s ability to address the increasing demand among European governments and enterprises for more flexible and sovereign secure data exchange capabilities. At the same time, the acquisition enables Zivver to introduce its solutions to new markets worldwide. Advanced data classification Zivver is Europe’s major secure data exchange provider, recognised for advanced data classification, human error prevention, and zero-access encryption in its secure email, file transfer, and eSignatures solutions. Zivver’s unique solutions ensure that neither Zivver nor the cloud provider hosting the data can access an organisation’s sensitive emails, files, and documents. As a result, Zivver is one of the few cloud providers in the world not subject to data access risks under laws like the U.S. CLOUD Act. However, with the growing demand for broader and more sovereign communication solutions, Zivver sought a trusted partner to help meet this need. Private cloud deployment “Our objective was to join forces with a global leader that shares our vision for zero-access security and meets Europe’s stringent data sovereignty standards,” said Wouter Klinkhamer, CEO of Zivver. “Kiteworks not only mirrors our philosophy on encryption and zero-trust data exchange but also offers on-premises and private cloud deployment options for monitoring all private data moving within, into, and out of organisations—including with countless third parties.” “This synergy with Kiteworks enables us to deliver zero-trust data exchange for every send, share, receive, and use of private data—regardless of the channels. This enables us to prevent everything from human-error data leaks in emails to the safeguarding of large file transfers, all under the customer’s control.” Global presence of Kiteworks With a global presence, including a broad European customer base, the Kiteworks platform provides complete transparency and oversight into how, when, and where data is shared, enabling organisations to prevent inadvertent and malicious data breaches. Drawing upon this breadth of market penetration and its comprehensive platform, Kiteworks will accelerate the introduction of Zivver’s best-in-class data protection, data classification, human-error prevention, and user-friendly secure email capabilities into fast-growing international markets where zero-trust data exchange is essential. Providing enhanced capabilities “Organisations require comprehensive solutions that protect private data shared and sent across all communication channels while maintaining seamless user experiences,” said Amit Toren, Chief Business Officer at Kiteworks. “By bringing Zivver’s innovative secure email technology into our Private Data Network, we’re providing the combined customer base with enhanced capabilities to secure their most sensitive communications while meeting stringent compliance requirements.” “This acquisition reflects our focus on continuous innovation in secure data exchange, including AI-based data protection, coupled with the continued growth in our talented global team.” Unlocking New Opportunities “The challenges surrounding data sovereignty—especially in Europe—require solutions that don’t compromise on user-friendliness while still meeting the highest standards of security and compliance,” adds Rick Goud, Chief Innovation Officer at Zivver. “The Zivver-Kiteworks combination makes this possible by giving organisations full control over where their data is stored, while ensuring compliance with regional regulations. I’m not aware of any other solution worldwide that offers this level of flexibility in terms of supported use cases, hosting models, and security features.” “This will create major opportunities for both our existing and future customers who are looking to reduce their dependency on the ‘American cloud’ in these dynamic times of geopolitical uncertainty.”
Domino Data Lab, provider of the pioneering Enterprise AI Platform trusted by the world’s largest AI-enabled enterprises, announced its Spring 2025 Release — a major platform update that helps enterprises ship trusted AI products faster. The release introduces a unified system for productivity, governance, and delivery—turning fragmented initiatives into an AI factory for trusted, repeatable outcomes. It also announced Zero-to-AI, a new service offering designed to catalyse proven AI cultural change within enterprises. AI delivery is an ROI bottleneck AI implementations are scaling fast, but business impact still lags AI implementations are scaling fast, but business impact still lags. While 88% of organisations say they’re better at moving models to production, nearly 60% of them expect less than 50% ROI, according to Domino’s 2025 REVelate report. “Getting models into production is no longer the hard part, it's realising business value at scale,” said Heidi Lanford, co-founder at NavAlytix and former CDO at Fitch Group. “That requires a system that connects experimentation to governed, repeatable delivery. Domino provides that foundation.” Shift in focus Domino’s Spring 2025 Release introduces new capabilities that reset every stage of the AI lifecycle This shift in focus—from deployment to scaled, governed impact—requires new infrastructure and discipline across the AI lifecycle. "We’re redefining the AI lifecycle to make it faster, safer, and more efficient,” said Nick Elprin, co-founder and CEO of Domino Data Lab. “Our Spring 2025 Release gives enterprises an AI factory for turning experimentation into impact — with built-in governance and automation to deliver AI products at scale.” With these challenges in mind, Domino’s Spring 2025 Release introduces new capabilities that reset every stage of the AI lifecycle — from experimentation to compliance to enterprise-scale deployment. How Domino is resetting the AI lifecycle Boost productivity without burdening IT Data science teams lose time to restrictive tools and infrastructure overhead. Domino’s Spring Release removes these barriers with new capabilities that accelerate development, increase reuse, and deliver business value—without adding burden to IT. Teams can now: Accelerate development by connecting local tools to Domino workspaces—combining the flexibility of familiar environments with scalable compute, reproducibility, and enterprise-grade governance. Deliver instantly on the last mile of AI with interactive apps that bridge the gap between technical work and decision-making, so business teams act faster on AI-enabled insights without sacrificing governance or control. Built-in governance, not bolt-on bureaucracy Typical AI governance often slows AI delivery and creates manual overhead. Domino’s Spring Release changes that—enhancing the governance built into everyday workflows to accelerate the governance lifecycle, reduce risk, and scale with confidence. With this release, organisations can: Cut audit prep time by 70% with automated checks that track policy compliance in real time—using the right metrics, on the right artifacts, without manual effort. Accelerate model validation and review with structured findings and conditional approvals that streamline collaboration, flag risks, and ensure full traceability in Domino. Empower risk management teams to create and manage governance policies through an intuitive, visual builder interface that bridges risk and data science stakeholders to build governance that goes beyond good intentions. Automate policy enforcement by blocking premature model operation with new Gated Deployment capability. Control costs while scaling AI delivery The Spring Release strengthens Domino’s value for IT and infrastructure teams by helping align AI workloads with performance, data locality, and cost objectives. Enhancements include: A new Cost Centre Dashboard to track compute costs by user, project, or workload. Along with Domino’s budget alerts, this new capability helps teams prevent waste and justify infrastructure spend. Domino Volumes for NetApp ONTAP, now generally available, gives data scientists on-demand access to enterprise data—while IT retains control with trusted ONTAP governance and hybrid infrastructure management. Domino is now validated as part of the NVIDIA Enterprise AI Factory design, providing IT teams confidence to scale Domino's own AI factory architecture with NVIDIA-optimised, full-stack infrastructure. Several Spring Release capabilities — including Domino Apps and enhanced compliance workflows — debuted at Domino’s life sciences–focused RevX event on May 20. In one life sciences use case, teams can use these latest platform capabilities to accelerate clinical trial recruitment by predicting patient eligibility from large, multi-source datasets. Such innovations can serve as a blueprint for scaling AI-driven breakthroughs across industries. Zero to AI: Accelerating the path from use case to impact Domino also announced Zero to AI, a new service offering that helps enterprises industrialise AI by fast-tracking high-impact use cases from pilot to production. It combines Domino's architectural expertise, implementation support, and training, to deliver customers scalable, audit-ready AI solutions. With Zero-to-AI, customers get: Application of Domino’s proven approach to deliver production-ready AI in record time—creating reusable foundations for future projects. Template-first development inspired by software engineering best practices, with modular pipelines, reusable code, and UIs that accelerate delivery. Audit-ready architecture with versioned, testable components that ensure every deployment is scalable and compliant. Availability Most Spring 2025 Release features and Zero to AI are generally available today. Gated Actions and the Policy Builder will be available in July.


Expert commentary
A key characteristic of many successful companies is that good ideas come from everyone, not just specific departments or job titles. What one person sees as obvious may be questioned by someone else who is less familiar with the product or process. This simple interaction can spark a whole new, faster, and better approach. While valuing tradition is important, if someone uses the phrase “that’s how we’ve always done it,” it’s essential to analyse the process to ensure it remains optimal. Business conditions change rapidly, and what was considered a perfect process last week may need adjustments this week. Comprehensive approach to innovation This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation Innovation should permeate every level of an organisation, from product development and customer experience to sustainability practices and employee training. This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation, allowing companies to stay agile, competitive, and in tune with their customers' constantly evolving needs. Addressing real-world challenges At the heart of pervasive innovation in the security industry lies the development of smart products and solutions that address real-world challenges. This approach integrates advanced technologies to enhance security while improving user experience. For instance, the integration of mobile credentials, biometrics, real-time wireless locks, intelligent keys, and cloud-connected access control systems exemplifies how technology can streamline operations and provide users with seamless and secure access. Offering user-friendly solutions These advancements reflect a deep understanding of user needs and preferences, offering solutions that are not only secure but also convenient and user-friendly. A notable example is UniKey's Kēvo, the first Bluetooth-enabled touch-to-open smart lock, introduced in 2013. Developed in partnership with Kwikset, this innovative product allowed users to unlock doors simply by tapping the lock with a compatible smartphone. By continuously innovating across various aspects of security products and solutions, companies can ensure that their offerings remain relevant and effective in addressing the evolving challenges of the security landscape. Design-driven features Products designed for quick and straightforward installation reduce labor costs and minimise downtime Innovation extends beyond technology to encompass design-driven features that prioritise user convenience and satisfaction. For instance, ease of installation is a critical factor in the adoption of new door hardware. Products designed for quick and straightforward installation reduce labor costs and minimise downtime, making them more attractive to both installers and end users. For electronic locks, long-lasting battery performance is essential for minimising maintenance and ensuring reliability. Products with extended battery life reduce the frequency of replacements and enhance user confidence. Incorporating antimicrobial finishes into door hardware addresses growing concerns about hygiene and cleanliness. Taking hygiene a step further, touchless technology in door hardware minimises physical contact, reducing the potential for cross-contamination and enhancing user convenience. Sustainability initiatives Sustainability initiatives in door hardware have evolved from niche considerations to central pillars of modern product development, not least of which is the growing consumer demand for sustainable products, which is influencing purchasing decisions. According to a Nielsen report, 66% of global consumers are willing to spend more on a product if it comes from a sustainable brand, leading many companies to prioritise the use of recycled and recyclable materials in their products. Beyond material selection, manufacturers are also refining their production processes to minimise environmental impact. Finishing processes are evolving to use non-toxic and low-impact finishing methods, such as powder coating and physical vapor deposition. Energy-efficient door hardware Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings. Properly designed door hardware can help maintain a building’s thermal envelope, reducing heating and cooling demands. For instance, the HID® Signo™ access control reader includes improved power supply technology and energy-saving features that ensure reduced energy consumption when the reader is in a resting state. Environmental Product Declarations To further demonstrate their commitment to sustainability, many manufacturers seek certifications validating their environmental efforts. Environmental Product Declarations (EPD) and Leadership in Energy and Environmental Design (LEED) certifications have become key indicators of a product’s environmental performance. An EPD provides detailed information about the environmental impact of a product throughout its lifecycle, aiding in the transparency that architects and builders require to make informed choices. Similarly, LEED certification emphasises energy savings and broad environmental priorities, including water efficiency, CO₂ emissions reduction, and improved indoor environmental quality. Customer service and training Innovation is also making great strides in the behind-the-scenes efforts of customer service and training. Predictive maintenance technologies are revolutionising how companies manage product performance and customer support. By utilising data analytics and IoT technologies, companies can offer maintenance alerts, remote diagnostics, and connected support services that anticipate issues and failures before they occur. This shift from reactive to predictive maintenance minimises service disruptions and enhances customer trust by ensuring products operate at optimal levels. Digital training initiatives Digital training initiatives equip employees and customers with the skills needed to utilise new technologies In parallel, digital training initiatives equip employees and customers with the skills needed to utilise new technologies in a cost-effective and accessible manner. Digital installer certification programs, learning portals, and customer enablement initiatives are all part of a comprehensive strategy to equip stakeholders with the knowledge and skills they need to succeed. By investing in comprehensive training programs, companies foster a culture of adaptability and competence, ensuring that customers can fully leverage technological advancements. This approach not only enhances operational efficiency but also strengthens customer relationships by empowering them with the knowledge to make informed decisions. Incremental improvements While groundbreaking innovations often capture headlines, it’s the steady, incremental improvements that consistently deliver real-world value. Companies can achieve sustained growth and success by focusing on continuous innovation across all facets of the organisation. This quiet progress, though less visible, is often more impactful as it builds a solid foundation for long-term achievement. In a world where change is the only constant, fostering a culture of pervasive innovation is the key to sustained relevance and growth.
In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame seekers are finding new, creative ways to use the railway to court notoriety online. Earlier this month, a young man filmed himself laying on the tracks and allowing a train to pass over him. In another instance, two people were seen misusing a level crossing to get an 'Instagram worthy' picture. Meanwhile, the media has recently reported stories from Austria to Australia of people (and in some cases children) being seriously hurt or killed whilst attempting to train surf. Safety and security of the railway Safety and security have always been a top priority for railways and supporting agencies For rail companies, such incidents cause great distress and bring often unjust headlines that question the level of safety and security of the railway. Then, of course, there is the impact on the timetable when incidents cause significant delays. The ramifications of just one incident can be significant, as illustrated by a case in February when a track trespasser caused 16 trains to be cancelled and a further 54 to be partially cancelled at the cost of approximately 600,000 euros. Despite the negative stories, safety and security have always been a top priority for railways and supporting agencies. The British Transport Police, for example, traces its origin back to 1830 when the force was established following the death of a member of Parliament, who was struck by a passing train after alighting onto the track of the newly opened Liverpool and Manchester Railway. Modern surveillance Today, trains, platforms, yards, level crossings and sections of track are monitored by some of the very latest technology hardware and software, from high-definition cameras with built-in advanced video analytics capabilities to PSIM (physical security information management) systems that can be used to orchestrate a response to anything from a trespasser on the line to a major derailment. Even with all these systems, the sheer scale of rail networks means it is simply not possible to always have eyes everywhere. True of video analytics If a driver spots someone or something on the line and immediately applies the emergency brake What’s more, whilst the technology continues to make huge leaps forward, affordability and usability can limit their effectiveness. This has been especially true of video analytics and object detection, where distinguishing between a human trespasser or an animal can be challenging, especially in low light (a particular issue with passenger and freight trains running round the clock). With trains moving at a high speed, early detection is everything. If a driver spots someone or something on the line and immediately applies the emergency brake, it could take the train as much as one mile to come to a stop. LiDAR to the rescue So, what can be done to improve response times for drivers and other stakeholders? One recommendation is to focus on key sections of the rail network that provide easier access for trespassers, such as stations, platforms, tunnels, bridges and level crossings, where more than a quarter of all significant accidents occur on EU railways. This is already standard operating procedure for most rail companies. However, a growing number are going beyond the 'standard' safety and security measures, with the introduction of high-tech solutions such as 3D LiDAR (Light Detection and Ranging) sensors. This technology is already familiar to the rail industry. It has been used for some time in applications ranging from surveying environments in preparation for building high-speed rail networks to mapping railway tracks and surrounding infrastructure for ongoing maintenance works. Management of virtual perimeters LiDAR enables the creation and management of virtual perimeters and/or safe zones In the context of safety and security on the railway, LiDAR enables the creation and management of virtual perimeters and/or safe zones with pinpoint accuracy. A good example would be at level crossings where a high volume of vehicle and pedestrian traffic crosses the track when the barrier is raised, but it must be clear for rolling stock to pass safely. LiDAR sensors can be programmed to automatically switch on minutes before a train is scheduled to pass through the crossing and turned off after it has cleared the area. During this time, any movement detected with this ‘live zone’ would create an alert in the control room. Further layer of protection The addition of cameras would provide a real-time feed of the situation, enabling the control room operator to act. That could involve sending a message via a public address system to clear the area, alerting the approaching train driver to take appropriate action, and alerting emergency services and maintenance teams if there is a vehicle, animal or other blockage on the track. The investment many rail operators have made in PSIM and CAD (computer-aided dispatch) can add a further layer of protection. These systems provide the operator not only with guidance regarding the next best action but also automatically triggered responses to orchestrate the entire incident management process. Protecting critical infrastructure All of these pieces of rail infrastructure and the joint network stand to benefit from the use of LiDAR Level crossings are a good example of environments where it is not viable to have round-the-clock live surveillance, but monitoring is essential at key times. It is a similar case for stations late at night, bridges and depots, all of which are susceptible to acts of trespass, vandalism (particularly graffiti) and theft. All of these pieces of rail infrastructure and the collective network stand to benefit from the use of LiDAR, as incidents are prevented or their impact mitigated in terms of the effect on the timetable, negative publicity, fines and the costs of investigations. Latest Report on Railway Safety and Interoperability The latest Report on Railway Safety and Interoperability in the EU stated that “European railways remain among the safest in the world, with major accidents becoming rare and significant accidents decreasing in the last two decades.” This good news is heightened by the fact that more people than ever in Europe are choosing to let the ‘train take the strain’, with passenger numbers reaching record levels. However, whilst passengers may no longer be swinging open train doors and jumping from moving carriages just to get to work a few seconds earlier, the risks on the railways have evolved. With more rolling stock travelling at higher speeds on lines old and new, there is a need to revisit the traditional methods of safeguarding areas on the network, to deter, detect and protect against those seeking fame, infamy or gain.
In today’s fast-evolving aviation landscape, innovation isn’t optional — it’s essential. With passenger traffic in the Asia-Pacific continuing to surge, the region is facing a pivotal moment: adapt with scalable tech, or fall behind. In January 2025 alone, APAC carriers accounted for 56.6% of global passenger traffic growth. Airports are operating at near capacity, with a record-high Passenger Load Factor (PLF) of 82.1%, leading to pronounced congestion at check-in counters, security checkpoints, and boarding gates. Increasing passenger volumes As airports strive to manage increasing passenger volumes without resorting to costly and time-consuming infrastructure expansions, technology — particularly facial recognition and biometric automation — emerges as a viable solution. However, the full realisation of these innovations requires more than just installing new system However, the full realisation of these innovations requires more than just installing new systems. It’s about building the right ecosystem of partners, processes, and policies to ensure sustainable, secure, and scalable growth. Presenting physical documents According to their estimates, over 120 APAC airports have already deployed biometric solutions at key travel touchpoints, including check-in, bag drop, security, and boarding. Thailand exemplifies this shift, with facial recognition deployed at six major airports — Suvarnabhumi, Don Mueang, Chiang Mai, Chiang Rai, Phuket, and Hat Yai — dramatically reducing passenger processing times. These systems allow travelers to verify their identities seamlessly at multiple touchpoints, from check-in and security screening to boarding gates, without presenting physical documents. This case reflects the Airports of Thailand’s (AOT) commitment to leveraging technology to improve operational efficiency and passenger experience. Digital identity programs Biometric solutions also extend beyond the airport: digital identity programs enable travelers to verify their identities before arriving at the terminal, creating seamless journeys from curb to gate. In this environment, facial recognition is not merely a futuristic innovation; it has become an operational imperative. Airports that fail to adapt risk falling behind, unable to manage burgeoning passenger volumes or meet evolving traveller expectations. True operational efficiency Despite its transformative potential, biometric technology cannot be successfully deployed in isolation. Achieving true operational efficiency through facial recognition requires strategic collaboration among technology vendors, IT integrators, airports, airlines, and regulatory authorities. Several pillars underpin a successful biometric implementation: Interoperability: Biometric systems must integrate seamlessly with a wide array of airline platforms, security protocols, and airport infrastructure. Lack of interoperability can lead to fragmented systems that frustrate staff and passengers alike. Scalability: Passenger volumes are forecasted to continue rising. Biometric solutions must be designed to scale rapidly in response to demand surges and future security challenges. Data Privacy and Security: With growing public scrutiny over personal data usage, airports must implement robust security frameworks that prioritise privacy and transparency. Encryption, consent-based use, and strict access controls are critical to gaining and retaining passenger trust. Future security challenges BKI can achieve significant throughput gains without major construction disruptions A case study illustrates these points: Malaysia’s planned revamp of Kota Kinabalu International Airport (BKI) aims to boost capacity by 33% over the next few years. Rather than expanding physical infrastructure alone, authorities are exploring facial recognition solutions to increase efficiency within existing spaces. By integrating biometric checkpoints at key touchpoints, BKI can achieve significant throughput gains without major construction disruptions. Such outcomes are only possible through well-coordinated technology partnerships, where vendors, airports, and integrators work toward a shared vision of future-ready travel. AI-powered computer vision What’s Next: Fully Biometric-Enabled Travel Looking ahead, the pressure on APAC airports is set to intensify. Airports Council International projects 9.5 billion air travelers globally by the end of 2025, a volume traditional processing methods cannot manage effectively. In response, AI-powered computer vision and facial recognition will continue to refine biometric processes, delivering higher accuracy rates and faster verification. Future systems will leverage real-time liveness detection, predictive analytics for crowd management, and seamless integrations across all travel stages. A fully biometric-enabled journey is becoming reality: Check-in with a glance at a kiosk Drop bags without producing an ID or boarding pass Clear security with automated facial recognition portals Board flights through biometric-enabled gates — without ever presenting a physical document. Experiencing significant growth Seamless integration across touchpoints creates a unified, frictionless journey In this vision of the future, identity becomes the ticket. Seamless integration across touchpoints creates a unified, frictionless journey. For APAC airports experiencing significant growth, full biometric enablement is becoming increasingly important for maintaining efficiency and staying competitive. At the same time, such a future demands robust technology ecosystems, where ongoing innovation is supported by partnerships that align regulatory, operational, and technological goals. Expanding physical infrastructure Building the Smart Airports of Tomorrow: Join the Conversation The aviation sector in APAC stands at a critical crossroads. Passenger growth, operational challenges, and heightened security requirements are converging, creating an urgent need for innovation. Facial recognition and biometric automation offer a clear path forward, enabling airports to handle growing volumes, enhance security, and deliver superior passenger experiences without necessarily expanding physical infrastructure. Facial recognition solutions Yet, the success of these innovations hinges on strategic, trusted technology partnerships. Airports must collaborate with technology vendors, IT system integrators, airlines, and regulators to ensure interoperability, scalability, and data security. At RecFaces, they believe the future of APAC airports is fully biometric-enabled. To explore how tech collaborations and advanced facial recognition solutions can transform airport operations, they invite users to join their free online panel discussion on April 30: ‘Smart Airports Start With Smart Tech: Facial Biometrics for APAC Airports.’
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
Iveda®, a pioneer in AI-driven video surveillance and smart-city technologies, announced that Subic Sun Development, Inc. has chosen the IvedaAI™ platform as the video surveillance solution for the soon-to-open Subic Sun Resort, Convention & Casino. IvedaAI was selected early in the build-out to inform camera placement and ensure frictionless integration with future-ready, AI-powered analytics. Focus on safety and service Located on the former U.S. naval base in the Subic Bay Freeport Zone—a special economic hub that hosts thousands of international and local businesses—the resort will feature 500 guest rooms, a state-of-the-art convention centre, a luxury casino, and two Accor-brand hotels, Ibis Styles and Mercure, scheduled to open in December 2025. The decision comes as global resort operators sharpen their focus on safety, service and operational efficiency. The global resort market generated $347 billion in 2024 and is projected to reach nearly $945 billion by 2030, an 18.5% CAGR. IvedaAI’s AI-enabled video analytics IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster and unlock data-driven insights that boost both guest satisfaction and bottom-line performance. “Iveda being selected as a premier security and surveillance provider before the first Subic Sun Resort guest ever checks in is a powerful endorsement of our commitment to providing state-of- the-art monitoring technology,” said David Ly, CEO and Founder of Iveda. IvedaAI’s real-time analytics Ly added: “By designing camera layouts around IvedaAI’s real-time analytics, Subic Sun can optimise coverage, reduce blind spots, and deliver safer, smoother guest experiences—without a costly equipment overhaul. We expect more ground-up projects to follow this blueprint.” Iveda Philippines—Iveda’s joint venture focused on nationwide smart-city deployment—secured the Subic Sun contract and will oversee the on-site rollout. The win represents the team’s first major hospitality project and advances its plan to generate US$ 3 million in smart-city revenue by FY 2026, building on the broader initiative it announced last year.
Clever video management and AI-driven analytics has led to significant improvements in traffic flow, public safety, and operational efficiency in one of the U.S. Midwest’s most forward-thinking cities. Milestone Systems, a world-pioneering provider of open platform video management software (VMS), collaborated with the City of Dubuque, Iowa, to enhance traffic management – a project powered by Milestone’s XProtect VMS and Vaidio’s Vision AI platform. Data-driven video technology insights Dubuque has deployed a smart traffic insights solution that integrates real-time video analytics Dubuque, known for its innovative approach to city management, sought to maximise the value of its expansive video network—over 1,300 cameras citywide. While these cameras provided extensive coverage, city officials wanted to go beyond basic monitoring to extract actionable intelligence that could improve traffic management and public safety. Through the collaboration with Milestone Systems and Vaidio, Dubuque has deployed a smart traffic insights solution that integrates real-time video analytics with traffic signal systems. The platform enables automated traffic monitoring and incident detection, allowing the city to make data-driven decisions that enhance mobility and efficiency. Milestone’s open platform video technology “We wanted to leverage our existing investments in video infrastructure to not only improve traffic flow but also enhance public safety and emergency response,” said Dave Ness, Traffic Engineering Manager for the City of Dubuque. “Milestone’s open platform video technology has allowed us to integrate cutting-edge analytics and create a truly intelligent traffic management system.” Full potential of video technology Dubuque unlock the full potential of video technology to create smarter, safer CEO of Milestone Systems Thomas Jensen stresses that the company is committed to helping cities like Dubuque unlock the full potential of video technology to create smarter, safer, and more efficient urban environments. “Our collaboration with the City of Dubuque demonstrates how intelligent video solutions can transform traffic management and enhance quality of life for residents,” he said. Enhanced traffic flow, safety, and sustainability The implementation of this technology has already delivered measurable benefits to Dubuque’s residents: Reduced Travel Times: Optimised traffic signals and real-time monitoring have led to smoother traffic flow, cutting down commute times and reducing congestion. Improved Public Safety: Faster emergency response times and enhanced incident detection have contributed to a safer urban environment. Increased Operational Efficiency: Automated processes free up city personnel to focus on high-value tasks, ensuring resources are used effectively. Environmental Benefits: Reduced idling times lead to lower fuel consumption and emissions, supporting Dubuque’s sustainability initiatives. Advanced AI-powered analytics in action By integrating Vaidio’s Vision AI platform with Milestone’s XProtect VMS, the City of Dubuque has enhanced its traffic management system with advanced video analytics. The solution enables real-time traffic monitoring, counting vehicle volumes, analysing turn movements, and refining signal timing for optimised flow. Automated anomaly detection helps identify wrong-way vehicles, accidents, and other hazards, allowing for quicker response. Variety of analytics functions Vaidio works with any camera and allows a wide variety of analytics functions to be performed Additionally, the system tracks pedestrians and cyclists, supporting the city's broader transportation and safety initiatives. Because Vaidio works with any camera and allows a wide variety of analytics functions to be performed on each camera, even switching between functions as needed, the City of Dubuque was able to leverage existing hardware and minimise the total cost of ownership. How cities leverage video analytics for transportation “Working together with Milestone and Dubuque allowed us to tailor our AI models to address the city's unique traffic challenges,” said David Jenkins, VP of Software Architecture at Vaidio. “This collaboration has driven real-world improvements in how cities leverage video analytics for transportation.” The Dubuque project has also been part of the foundation for Milestone’s Project Hafnia which was announced together with NVIDIA in March. Milestone’s broader innovation initiatives Dubuque project has also been part of the foundation for Milestone’s Project Hafnia "The City of Dubuque’s use of AI-powered video analytics for traffic management aligns with Milestone’s broader innovation initiatives, including Project Hafnia,” said Thomas Jensen. “Project Hafnia leverages NVIDIA Nemo Curator, aiming to build next-generation AI models for transportation by curating and training on high-quality, compliant video data. Insights from deployments like Dubuque’s smart traffic system contribute valuable real-world data that can help enhance future AI-driven urban mobility solutions." Integrating intelligent video analytics Dubuque’s success in integrating intelligent video analytics serves as an example for other municipalities looking to enhance traffic management through technology. Milestone Systems remains dedicated to supporting smart city initiatives worldwide, providing municipalities with powerful video technology solutions that drive innovation, efficiency, and safety.
Honeywell has been selected as the building automation provider for LG Energy Solution’s cylindrical EV battery manufacturing facility being built in Queen Creek, near Phoenix, Arizona. Set for completion in 2026, this state-of-the-art project represents a critical milestone in LG Energy Solution’s strategy to lead EV battery innovation in North America, and it also supports Honeywell’s alignment of its portfolio to three compelling megatrends, including automation and the energy transition. New standard for operational efficiency Deployment of Honeywell’s building automation technologies at the Queen Creek facility Global battery demand is projected to quadruple by 2030 according to Bain, and the deployment of Honeywell’s building automation technologies at the Queen Creek facility will help set a new standard for operational efficiency in high-tech manufacturing environments. This 1.3-million-square-foot standalone facility will integrate a suite of Honeywell technologies to help optimise performance, enhance safety and support sustainability outcomes. Future of automation “By developing and delivering solutions that blend cutting-edge technology and energy management, we are driving the future of automation," said Billal Hammoud, president and CEO of Honeywell Building Automation. "Honeywell’s collaboration with LG Energy Solution demonstrates how advanced building automation can help empower companies to achieve operational excellence in their facilities while also accelerating the shift to a more secure energy future.” Honeywell’s innovative solutions Honeywell’s innovative solutions will provide the Queen Creek facility with the following: Unified Systems Integration: Honeywell’s Enterprise Buildings Integrator platform will help enable seamless control of building management and safety systems via integration into Honeywell Forge, which provides advanced monitoring and analytics. Honeywell Forge, an IoT platform, enables condition-based maintenance to improve the resiliency of critical systems around the clock, helping to reduce unplanned reactive work and help lower energy costs. Its machine learning capabilities will continuously study a building's energy consumption patterns, which will enable LG Energy Solution to automatically adjust the facility to optimal energy-saving settings. Comprehensive Fire and Safety Solutions: Honeywell’s VESDA smoke detection and advanced self-testing fire alarm system offers automated and continuous air sampling enabling early warning of an impending fire hazard, often even before heavy smoke or flames are detected. VESDA and the networked fire alarm solution will be integrated into the facility’s building management system to allow coordinated and near-instant responses from the HVAC system if smoke is detected. Mission Critical Control and Advanced Cybersecurity: The QronoX Programmable Logic Controller will enable LG Energy Solution to enhance operational performance and resilience by providing advanced cybersecurity for its facility. The Honeywell technology will also help ensure asset security and compliance while reducing downtime for critical systems. Honeywell’s scalable solutions are designed to support the future expansion of the project as well, reinforcing its role as a key collaborator in this transformative industrial sector.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced that its solution has been deployed by Ki Charter to safeguard students, faculty and staff against gun-related threats. It is the first charter school in Texas to adopt the industry-pioneering proactive gun detection and intelligent situational awareness technology. Adopted multiple technologies Ki Charter has adopted multiple technologies and de-escalation techniques to ensure the safety Serving a unique population of behaviourally challenged students, Ki Charter has adopted multiple technologies and de-escalation techniques to ensure the safety of its students and personnel. Its Safety and Security Committee assesses and refines policies and safety measures, while the Campus Safety and Threat Assessment teams work closely with law enforcement and mental health resources to prevent and mitigate potential threats. Deployment of ZeroEyes’ AI technology The deployment of ZeroEyes’ AI technology further strengthens this comprehensive security strategy by providing real-time gun detection capabilities. “We serve a student population that requires an exceptional level of care and security, and I was initially skeptical of ZeroEyes,” said Jerry Lager, Superintendent of Ki Charter. “But after seeing the technology in action, I knew we needed it. Our largest campus spans 65 open acres, making security a complex challenge. ZeroEyes provides that extra layer of protection, ensuring our students and staff are in a safe environment.” Ki Charter reduces learning gaps Ki Charter is the premier educational provider for students who reside in residential facilities Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school has campuses in San Marcos, Liberty Hill, Austin, Temple, Arlington, Fort Worth, Denton, and Kingwood, and serves over 6,500 students annually (500% mobility rate) with a dedicated team of more than 120 educators and staff. With small class sizes and engaging curriculum, Ki Charter reduces learning gaps to help students learn behavioural management strategies and improve their communication skills. ZeroEyes’ AI gun detection ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. Local law enforcement and school security as quickly as 3 to 5 seconds from detection If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. AI gun detection technology “At ZeroEyes, we understand the complexities of protecting students in specialized environments like Ki Charter,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We’re proud to offer our AI gun detection technology as an additional layer of security to help protect students, faculty, and staff in this unique setting.”
iCard, a pioneering European e-money institution, has successfully upgraded its customer checks with Regula’s advanced biometric and document verification technologies. By integrating Regula Face SDK and Regula Document Reader SDK with its KYC (Know Your Customer) and risk assessment systems, iCard has moved to speedy, automated verification with improved fraud detection, and enhanced the overall experience for customers in 30+ countries. Implementing Regula’s solutions As a licenced fintech organisation, iCard must comply with strict European KYC regulations while maintaining a robust risk assessment system alongside low-effort customer experience. iCard complies with strict European KYC rules while keeping a robust risk review system Prior to implementing Regula’s solutions, manual verification processes led to inefficiencies, longer wait times, increased fraud, and potential friction for users. Customers often had to re-upload photos or wait for manual reviews, causing delays—especially outside business hours. Additionally, iCard needed a more comprehensive document verification system that was capable of recognising a broader range of ID types. The Regula solution: Fast and fraud-free identity verification To modernise and automate its verification process, iCard selected Regula’s complete solution for document and biometric verification for its industry-leading accuracy, ease of integration, and ability to meet the company’s specific requirements. Regula Face SDK: Integrated into the iCard Digital Wallet app (Android and iOS), it provides fast and reliable biometric verification when a user logs in or performs a money transaction. The solution conducts instant liveness detection and face matching, preventing fraud attempts, including presentation attacks, deepfakes, or injected videos. Regula Document Reader SDK: Deployed in iCard’s back-office system, it automatically authenticates ID cards, passports, and residence permits, including previously unsupported paper-based IDs. Regula’s solution reads and authenticates data from multiple document zones, including MRZs (machine-readable zones), RFID chips, and barcodes, and cross-validates the information to detect any inconsistencies that may indicate fraud. Tangible business benefits The project was completed in just one month, and the impact has been immediate: Instant identity verification: Customers can now authenticate their identity in under a minute. Reduced operational costs: Automated verification processes have minimised manual reviews. Enhanced fraud prevention: Advanced biometric and document verification strengthen security measures. Increased conversion rates: Faster verification leads to a smoother onboarding experience and reduced drop-off rates. Fast and secure identity verification “Implementing Regula Face SDK and Regula Document Reader SDK has optimised our internal processes while ensuring a seamless experience for iCard Digital Wallet customers." "The integration was completed in a short period, resulting in fast and secure identity verification, improved operational efficiency, and reduced fraud risks—all while boosting customer satisfaction,” says Gabriela Anastasova, Chief Product Officer at iCard. Balancing security and user convenience “In today’s fintech landscape, balancing security and user convenience is critical. Customers expect seamless access, while businesses must comply with strict regulations and defend against sophisticated fraud. We are proud to support iCard in finding that perfect balance." "Our solutions ensure that every identity check is robust, automated, and frictionless, allowing fintech innovators like iCard to scale securely and efficiently,” comments Ihar Kliashchou, Chief Technology Officer at Regula.
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over a two-year period by specialist security installer, Scottish Communications Group. HID Mobile Access licences University has purchased 10,000 HID Mobile Access licences to offer its academic community In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. “We wanted a modern system which is safe, secure and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. HID solution: future-proof equipment Stebbing added: “Complying with forthcoming legislation was also another important project requirement. With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we have a duty to protect to ensure everyone is safe." "The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” Ambitious development plans University of Dundee is a research institute in Scotland, noted for its academic merit in dentistry The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. New HID Signo readers The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP (Open Supervised Device Protocol) and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers, thereby speeding up the rollout. RFID cards access buildings The university used to print and issue plastic RFID cards so staff and students could access buildings Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enrol. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Origo management software Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, validating or revoking of IDs – all of which is now done virtually and remotely. Improve the mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Integrate with digital campus cards While the strategy and aspiration are for the university population to shift wholesale to mobile access While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach now is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO range of ID card printers Given that RFID cards are still required now, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. HID’s reputation University of Dundee utilises its FARGO DTC4500e printers to back up this shift to digital change “HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications and authentication standards. Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” MOTORTRBO Ion smart radios In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems and CriticalArc Safezone® App, security staff need carry only a single device to fulfil their duties.


Products


Round table discussion
In the past, security installers and integrators were used almost exclusively to install hardware. However, the role is changing and expanding along with the technologies used in the physical security industry. Nowadays, an installer or systems integrator is much more likely to use a strategic, IT-centric, and data-driven approach. To gain additional insights, we asked our Expert Panel Roundtable: How is the role of the security installer/integrator changing?
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits, and drawbacks, of using artificial intelligence (AI) in physical security?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
White papers
A guide to specifying RFID readers
Download
Attention OEMs: 5 ways RFID readers can secure your markets
Download
5 reasons to integrate mobile technology into your security solution
Download
Automatic vehicle identification: State of the industry 2020
Download
11 considerations for embedded system RFID readers
Download
RFID and smartphone readers in physical access control
Download
Is your access control as effective as you think?
DownloadWhat are the security technology needs of the hotel sector?
Download
9 Opportunities To Upgrade Your Access Control Technology
Download

Videos
Radio frequency Identification: Manufacturers & Suppliers
- CIVINTEC Radio frequency Identification
- ELATEC Radio frequency Identification
- Anviz Radio frequency Identification
- ASSA ABLOY - Aperio® Radio frequency Identification
- HID Radio frequency Identification
- MOBOTIX Radio frequency Identification
- ASSA ABLOY Radio frequency Identification
- Suprema Radio frequency Identification
- SALTO Radio frequency Identification
- Climax Technology Radio frequency Identification
- Codelocks Radio frequency Identification
- Brivo Systems Radio frequency Identification
- Dahua Technology Radio frequency Identification
- Bosch Radio frequency Identification
- Paxton Access Radio frequency Identification
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
