Allegion (UK) Ltd - Experts & Thought Leaders

Latest Allegion (UK) Ltd news & announcements

Schlage's new finishes: Elevate interior style

Schlage, America’s Most Trusted Lock Brand and pioneer in door hardware innovation for over a century, now announced the latest limited release from Pin & Tumbler™ A Studio by Schlage — the Refined Finishes Collection. Designed to elevate everyday spaces with subtle sophistication, the collection introduces three new finishes that embody quiet elegance and refined design. Design innovation “Design innovation is not always about bold statements — it’s also about harmony and balance,” shared Heather Jacobson, Product Manager, Pin & Tumbler Studio, adding “With the Refined Finishes Collection, we set out to capture the kind of understated beauty that completes a space. Each finish is thoughtfully crafted to complement standout design elements while introducing its own sense of calm and character.” Three elevated hues Designed with smooth, understated surfaces that offer subtle visual depth, the Refined Finishes Collection was thoughtfully developed to suit a wide range of interior aesthetics, making each finish feel like a natural extension of the individual style, not just a functional detail. Available in three elevated hues — Matte White, Forest Shadow and Golden Bronze — each finish was curated to complement Schlage’s modern design forms featured in the Collins trim and Latitude lever for a cohesive, elevated look. Matte White – Ideal for bright, streamlined spaces; this finish offers a clean, minimalist appeal that complements contemporary interiors. Forest Shadow – A soft, calming neutral, Forest Shadow layers effortlessly with statement pieces, creating a tranquil and relaxed atmosphere. Golden Bronze – Rich, timeless gold tones deliver soft radiance and warmth, balancing versatility with refined sophistication. Schlage’s innovative combined interior platform Built on Schlage’s innovative combined interior platform, the Refined Finishes Collection delivers versatile functionality with a sleek, elevated design. Each product in the collection seamlessly transitions between a non-locking function for hall or closet doors and locking function for bedroom and bathroom privacy, offering homeowners flexible solutions to suit their spaces.  Installation is quick and straightforward, making it an ideal upgrade for those seeking refined style and enhanced utility without the need for professional tools or expertise. The Refined Finishes Collection is available exclusively through Pin & Tumbler™ A Studio by Schlage.

Celebrating excellence: Allegion UK at GAI Awards

Allegion UK is proud to return as sponsor for this year’s Diploma in Scheduling award at the Guild of Architectural Ironmongers (GAI) Education Awards, taking place at London’s Grand Connaught Rooms on Thursday, 20th November, 2025. This year’s ceremony marks the 45th GAI Education Awards, which is recognised as a flagship event in the annual architectural ironmongery calendar and for the second year running, Allegion UK is sponsoring this award to celebrate the outstanding achievements of the rising stars of the industry. Ongoing support of the GAI Speaking on Allegion’s returning role as sponsor, Pete Hancox, Country Manager at Allegion UK commented: “Allegion has long been a champion of professional development within the architectural ironmongery industry, and our ongoing support of the GAI Education Programme reflects our commitment to elevating standards, encouraging education and fostering new talent." "The GAI Education Awards is a prestigious industry event, and in continuing our role as sponsor we aim to support and nurture the next generation of industry pioneers. DipGAI is recognised worldwide, and we are incredibly proud to celebrate both the exceptional individual achievement this award represents, and most importantly, the pivotal role the Guild plays in our industry.”

Allegion's Overtur OnSite App enhances inspections

Allegion US, a pioneering provider of security solutions, technology and services, announced the launch of Overtur™ OnSite App, a major upgrade to its cloud-based collaboration platform for door and opening management. The release introduces the new Inspection Suite—including Fire & Egress and General Inspection tools—alongside significant mobile performance enhancements designed to save time, improve accuracy and streamline field workflows. New Overtur OnSite App The new Overtur OnSite App delivers a faster, more intuitive experience for building owners Built on direct feedback from customers, the new Overtur OnSite App delivers a faster, more intuitive experience for building owners, consultants and life safety professionals.  The app's redesigned architecture supports seamless data syncing, offline capabilities and real-time team collaboration—empowering users to capture field conditions, resolve flagged issues and generate actionable reports with efficiency. Mobile performance upgrades "The new Overtur OnSite App goes beyond a simple update—it offers a refreshed approach to handling inspections and opening management in the field," said Holly O'Haver, general manager at Allegion. "By combining guided and simplified inspection workflows, powerful mobile performance upgrades and an updated web experience, we're giving our customers the tools they need to work smarter, faster and with greater confidence." Fire & Egress Inspection tool The Fire & Egress Inspection tool offers both a quick, guided experience for certified inspectors The Fire & Egress Inspection tool offers both a quick, guided experience for certified inspectors and a comprehensive mode for proactive building owners and consultants, supporting national life safety guidance from NFPA 80.  The General Inspection tool provides a flexible, user-friendly solution for any type of opening assessment—from specialty application doors to basic mechanical maintenance—complete with historical tracking and call-to-action reporting. With Overtur OnSite App, users can: Conduct inspections with guided or simplified workflows tailored to their needs Generate time-saving reports to address opening needs and improve transparency Sync data instantly to the Overtur web platform for centralised project visibility Access a notes library to reduce repetitive entry and speed up reporting Shortly after launch, users will also be able to: Collaborate in real time with team members in the field Transition effortlessly between devices without losing progress Customised inspection tools "Our customers asked for faster performance, better collaboration and more adaptable inspection tools—and we delivered," said Rachael Blondin, Overtur product manager. "Overtur OnSite App is built for the way field teams actually work." The launch also includes an updated Activities interface (formerly "Sessions"), background processing for improved speed, and a scalable foundation for future enhancements—positioning Overtur to quickly deliver new capabilities, such as customised inspection tools for specific market needs. The Overtur OnSite App is available starting Sept. 25, 2025, for iOS and Android devices.

Insights & Opinions from thought leaders at Allegion (UK) Ltd

Energetic ISC West reflects industry on the cusp of accelerated change

ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas.  Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing.  Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.”  Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds.  Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec.  Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer  ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server.  Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health.  Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.

Effective school security requires a comprehensive and systematic approach

Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats.  Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans  While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures.  Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning.  Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny:  Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security  Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations.  “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns.  “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”

Upgrading the built environment: A retrofit project

Redevelopment, restoration, retrofit. No longer are these terms modestly viewed as construction buzzwords. Across the world, there’s an increasing appreciation and a budding culture that maintaining older buildings is the way forward for the planet and its people. Globally, cities are said to be responsible for 78% of the energy consumption, of which, buildings account for around a third of the total. And when users consider that up to 80% of the current buildings are expected to still be in use by the year 2050, it’s evident why so many are pushing for a conscientious approach. Unlocking the potential of retrofitting  "Across the UK, the built environment also contributes 40% to the country’s total carbon emissions, with its 28 million homes, by most assessments, constituting the least energy efficient in Europe." "With so many of our current buildings set to exist 30 years into the future and beyond, why should so much focus fall on new-build projects? Output must be improved now, and the real substance of the challenge is retrofitting, we need only unlock its potential," says Karen Trigg of Allegion UK. Building efficiency  A retrofit is often described as the addition of new components or features to older systems" “Despite its many applications, in the context of the built environment, a retrofit is often described as the addition of new components or features to older systems." "The process is designed to make a building perform better, and because of its benefits both economically and environmentally speaking retrofitting has emerged as a popular solution for advancing the efficiency of buildings." Energy consumption “On an environmental level, it’s widely understood that the construction industry must strive to do better. In many developed countries, four out of the five buildings set to stand in 2050 already exist, meaning the onus of addressing energy consumption lies upon us now." "Accordingly, decision makers are obliged, and actively encouraged, to prioritise activities such as retrofitting to meet the energy-saving targets as outlined in the Paris Agreement." Modern housebuilders and homeowners can look towards retrofitting Cost savings  “In terms of cost savings, the process of adding better functioning components to our buildings will benefit many. Retrofitting is an attractive proposition for most large or aging structures as it provides decision-makers the ability to improve upon key problem areas without having to consider large-scale reconstruction or demolition - saving on time, resources and costs." "Modern housebuilders and homeowners can look towards retrofitting, too, improving their footprints and putting money back in their pockets, as they seek to combat the significant rise in energy costs.” Understanding retrofit Investment in retrofit projects could have a seismic effect on the construction industry, acting as a catalyst Investment in retrofit projects could have a seismic effect on the construction industry, acting as a catalyst to the economy and improving various areas of our building network. And while its proper retrofit can play an important role, consequences can arise when a project isn’t approached correctly. Karen Trigg continues, “Naturally, modern technology developments and legislation changes will continue to drive product enhancements. Take door hardware, for example, a crucial component of a building’s fire safety, security, and everyday operation. There will always be a responsibility to ensure the hardware in older buildings remains up to standards and that we are meeting the latest in safety and sustainability regulations." Door and the fire safety “As time passes, hardware experiences wear and damage and the replacement of aged components becomes necessary. And in some cases, new products will emerge as an improvement on previous applications." "With that, an effective retrofit could significantly enhance the functionality of a door and the fire safety and security of a building - not to mention the environmental benefits associated with installing better, long-serving products." Effective retrofit projects can safeguard the quality of our buildings in the future Fire safety  “Effective retrofit projects can safeguard the quality of our buildings in the future, making crucial improvements to cost, safety and functionality. Although, without a proper understanding of the subject, mistakes will readily undo the good work that many are aiming towards." "A poorly specified or incorrectly installed retrofit could prove costly in terms of money and time and even present a danger to the integrity of a building’s fire safety." Professional guidance  The first step of the retrofit installation is to ensure the selected hardware replacement is suitable for the application “A retrofit must be completed consciously and professionally, with reliable replacements. Failing to do so could be a breach of the Regulatory Reform (Fire Safety) Order." "Whether an environmental or safety-conscious choice, the first step of any retrofit installation is to ensure the selected hardware replacement is suitable for the application, and decision-makers must understand the reasons behind their choices or seek professional guidance." UKCA and CE certifications “For door hardware specifically, retrofit projects must also be compliant under UKCA and CE certifications and be fitted to the manufacturer’s instructions, by BS EN 1154." "Decision makers can refer to the Code for Construction Product Information (CCPI) for clear, accurate, up-to-date and accessible product information in line with the Building Safety Bill’s regulatory framework known as the Golden Thread of Information." Doors testing certification “While the benefits are clear, all retrofit projects must comply with the doors testing certification. Consequences often result from retrofits that are not properly thought out, especially when the selection of appropriate alternatives is flawed." "Generally, to improve understanding of what is required, education on the subject must be developed further. Because with a long-term, large-scale strategy, retrofit projects could provide wide-reaching returns for all involved.”