Access control software News
Verkada, a pioneer in AI-powered physical security technology, announced it has achieved Federal Risk and Authorisation Management Program (FedRAMP) ‘In Process’ designation for Verkada Command in AWS GovCloud. Together with Verkada’s federal agency sponsor, accredited Third-Party Assessment Organisation (3PAO) Fortreum will conduct a detailed security assessment in the second half of 2025. As federal agencies and their partners look to replace outdated, siloed systems and ad...
Appdome, the pioneer in protecting mobile businesses, announced here at Black Hat 2025 the integration of its IDAnchor’s Customer Identity Protection suite into MobileBOT Defence, Appdome’s bot defence offering. This powerful combination enables mobile brands and businesses to build a virtual Mobile API Gateway on top of any standard backend infrastructure, preventing unauthorised API access, stopping brute-force bot attacks, and eliminating point products for API Protection a...
Abnormal AI, the pioneer in AI-native human behaviour security, announced its updated Security Posture Management product, bringing AI-driven protection, automated prioritisation, and remediation guidance to customers’ Microsoft 365 environments. As Microsoft 365 environments become more complex, accidental misconfigurations are now a major cause of cloud email vulnerabilities. The growing number of applications, layered settings, and fragmented ownership create blind spots and acci...
Zimperium, the global pioneer in mobile security, issued a stark warning to organisations worldwide: mobile-based credential theft is accelerating, and the wave is far from over. Looking back over the past year, Zimperium’s global telemetry revealed more than 2,400 variants of mobile malware specifically engineered to steal login credentials and intercept multi-factor authentication (MFA) codes. These attacks are powered by mishing (mobile focused phishing) campaigns and sideloaded...
DigiCert, a global pioneer in digital trust, announced the open-source release of its TrustCore SDK, a production-proven cryptographic library for embedded and IoT devices. Now available under the AGPL v3 licence on GitHub, TrustCore SDK gives developers the tools to design security into their products from the start by enabling them to evaluate, integrate, and customise trusted cryptographic capabilities with full transparency. By offering both an open-source option and a commercially-...
Keysight Technologies, Inc. announces that Fortinet chose the Keysight BreakingPoint QuickTest network application and security test tool to validate SSL deep packet inspection performance capabilities and security efficacy of its FortiGate 700G series next-generation firewall (NGFW). BreakingPoint QuickTest is Keysight’s turn-key performance and security validation solution with self-stabilising, goal-seeking algorithms that quickly assess the performance and security efficacy of a vari...
Syrenis, a pioneer in advanced consent and preference management solutions, is pleased to announce its strategic partnership with The Data Privacy Group (DPG), a premier provider of privacy programme consultancy and implementation expertise. This collaboration marks a powerful union of cutting-edge technology and elite privacy consulting to empower organisations in managing compliance and building trust in the digital era. Syrenis' flagship platform Syrenis' flagship platform, Cassie, offers...
Claroty, the cyber-physical systems (CPS) protection company, announced a new strategic collaboration with Google Security Operations that brings greater threat detection and response capabilities to organisations looking to bridge the gap between IT and operational technology (OT) in order to secure mission-critical infrastructure. This integration will enhance security by feeding high-fidelity, context-rich alerts and vulnerability data from SaaS-powered Claroty xDome or on-premise Claroty C...
Arctic Wolf, a global pioneer in security operations, announced enhancements to the Arctic Wolf Aurora Platform through new integrations with Microsoft, Oracle, OneLogin, and CyberArk. As one of the industry’s first open security operations platforms, Aurora is uniquely designed to offer a flexible approach to both data ingestion and core functionality, empowering customers to build and customise their ideal security stack. These new integrations expand the platform’s o...
HID, a worldwide pioneer in trusted identity and access management solutions, has announced a new line of FIDO-certified credentials—now powered by the new Enterprise Passkey Management (EPM) solution— designed to help organisations deploy and manage passkeys at the enterprise scale. New research from FIDO Alliance shows that while 87% of enterprises are adopting passkeys, nearly half of those that are yet to deploy cite complexity and cost concerns as primary barriers. HID’s...
AMAG Technology is proud to unveil Symmetry Access Control V10, the first release in a transformative new direction for AMAG Technology's product platform. This milestone isn't just a version change; it's the first step toward a strategic evolution of their product vision, designed to streamline deployments, accelerate innovation, and elevate the customer experience. Unified security ecosystem Symmetry Access Control V10 introduces two major enhancements designed to improve system vis...
Major technology solutions partner, Advania UK, completed its integration of CCS Media and Servium. This milestone solidifies Advania’s position as a dominant force in the UK technology market. The integration of these two acquisitions propels Advania UK's combined turnover to a record £452 million, a 3.3x increase from the previous year. In addition, it has quadrupled its client base to approaching 10,000, and the expanded entity now boasts over 1,500 employees across more...
Alibaba has released Wan2.2, the industry’s first open-source large video generation models incorporating the MoE (Mixture-of-Experts) architecture, that will significantly elevate the ability of creators and developers to produce cinematic-style videos with a single click. The Wan2.2 series features a text-to-video model, Wan2.2-T2V-A14B, an image-to-video model, Wan2.2-I2V-A14B, and Wan2.2-TI2V-5B, a hybrid model that supports both text-to-video and image-to-video generation tasks with...
In a world where safety and security are of the utmost importance, it’s crucial to stay updated with the latest technologies that can provide advanced protection. One such innovation that is leading the way in modern security is biometric access control. This groundbreaking technology is transforming the way businesses and individuals safeguard their premises and data. Biometric access control Biometric access control utilises unique physical or behavioural attributes of individuals, su...
PCI Pal, a premier SaaS provider of secure payments, has partnered with Telesign, a Proximus Global company, to launch a Fraud Management Suite for global enterprises that uses AI to spot fraudulent payments before they happen. The solution is designed to stop one of the most costly types of payment fraud – Card-Not-Present (CNP). CNP attacks are easy to execute, but hard to spot before it is too late. In these attacks, the criminal doesn’t need to steal a physical payment card. Th...
Corsha, the first and only Machine Identity Provider (mIDP) purpose-built to secure machine-to-machine (M2M) communication across operational systems and critical infrastructure, announced an investment from Cybernetix Ventures, a pioneering early-stage VC firm at the forefront of robotics, automation, and physical AI. The funds will accelerate Corsha’s mission to secure every machine connection across robotics and industrial autonomous systems. Secure identity and access management Cor...
Illumio, the breach containment company, announced the general availability of Illumio Insights, a powerful new product within the Illumio Platform. As the only platform that delivers a complete approach to reducing lateral movement risk, Illumio now combines AI-powered detection, real-time risk insights, and one-click containment with strategic segmentation for proactive protection. Built on an AI security graph, Illumio Insights transforms how security teams detect, prioritise, and contain t...
artius.iD, the global pioneer in decentralised identity management solutions, has signed a deal with real estate investment platform Tirios to bring its ultra-secure, passwordless ID verification technology to the platform’s users. Once the implementation is complete, Tirios users will be able to seamlessly access their investment accounts using artius.iD’s identity verification technology, without the need for passwords, multi-factor authentication, or verification codes. This wil...
Nutanix, a pioneer in hybrid multicloud computing, announced it has been positioned as a pioneer in The Forrester Wave: Multicloud Container Platforms, Q3 2025. This is Nutanix’s first appearance in the report following last year’s unveiling of the Nutanix Kubernetes Platform (NKP) at Nutanix’s NEXT conference. The launch of NKP followed Nutanix’s acquisition of D2iQ, Inc.’s Kubernetes Platform, enabling the company to provide customers with a comprehensive so...
NAKIVO Inc., a fast-growing software company specialising in protecting virtual, physical, cloud, and SaaS environments, announced strong results for Q2 2025. The company reported growth in financial performance, customer acquisition, partner expansion, and cloud channel adoption, with revenue in the Americas up 40% compared to the same period in 2024. Revenue growth The Americas led all regions with a 40% year-over-year revenue increase followed by EMEA In Q2 2025, the company recorde...
Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud, announced its intent to acquire Satori Cyber Ltd (Satori), a data and AI security company. Enterprises are facing a perfect storm of AI adoption, data growth and sprawl, and regulatory pressures globally. The need to manage these challenges across hybrid and multi-cloud environments is paramount for security, IT, and business pioneers, as well as boards. Control access to sensitive data By...
iDenfy, a Lithuania-based identity verification and fraud prevention software provider, has announced the integration of BankID, Sweden’s most widely used electronic identification system, into its multi-feature Know Your Customer (KYC) platform. This update enables a secure, government-compliant verification method that accepts electronic identities (eIDs). The new integration is particularly valuable for strictly regulated sectors, such as fintech, banking, and other online financial s...
Motorola Solutions announced it is introducing ‘AI nutrition labels’ to provide clear, concise information about how artificial intelligence (AI) is used across its safety and security technologies. The initiative is a first for public safety and enterprise security products, helping people understand a product’s core AI “ingredients,” just as food nutrition labels were born from a desire to understand dietary intake. Safety and security “It is our unwaveri...
Siren, the all-in-one investigation company, and Flashpoint, the pioneer in threat data and intelligence, announced a strategic partnership to deliver a unified environment to streamline end-to-end investigations, surface hidden connections, and drive timely, intelligence-led decisions for security and intelligence teams. As geopolitical tensions rise, and hybrid threats, combining cyber, physical, and informational tactics, impact both private and public sectors, organisations face increasing...
FireMon, the major network security and firewall policy management company, releases powerful new findings from its AI-powered analytics platform, FireMon Insights: 60% of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34% falling short at critical levels. These aren’t just technical oversights; they’re signs of deeper governance issues that can lead to audit failures, operational downtime, and increased exposure to threats. Fire...
A 2022 report from the Office for National Statistics, the most comprehensive on phishing to date, has revealed that half of all adults residing in the UK have reported receiving a phishing message. In the last year, 85% of UK businesses and 86% of charities faced at least one phishing attack, with 32% of phishing emails being AI-generated, leveraging scraped social media or dark web data and real-time language tweaking. Advance fee fraud The average loss for businesses from phishing attacks...
iDenfy, an identity verification and fraud prevention service provider, partnered with Okazio, a digital wealth management platform specialising in secure cryptocurrency investment opportunities. This partnership showcases iDenfy’s Know Your Customer (KYC) and Anti-Money Laundering (AML) services that will now be used to onboard Okazio’s users and support the latest compliance requirements with the EU’s new Crypto-Assets (MiCA) regulations while helping reduce fraud risks in t...
Cequence Security, a pioneer in application security, unveiled the Cequence AI Gateway, a powerful new solution enabling enterprises to take full advantage of the productivity gains promised by agentic AI. Bridging the gap between AI agents and enterprise applications, the AI Gateway enables instant connectivity with the guardrails enterprises need to stay in control. Power of artificial intelligence Enterprises, eager to embrace the power of a...
Kaseya, the globally renowned provider of AI-powered IT management and cybersecurity software, launched an innovative AI-workflow generator within its VSA 10 platform. Using generative AI, technicians can describe a desired outcome in simple language, and Cooper Copilot builds the entire automation workflow, with no specialised product knowledge or previous scripting experience required. AI-powered workflows “Creating workflows with AI isn’t just easier — it’s signific...
AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its Enterprise Security Test 2025 (March to June). This is the most extensive public evaluation to date of enterprise endpoint protection platforms (EPP), endpoint detection and response (EDR), and extended detection and response (XDR) solutions. Seventeen high-performing enterprise-grade cybersecurity products were rigorously evaluated using real-world attack simulations and scientifically so...
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Featured products
Browse security news
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download