Artificial intelligence (AI)
News
Videonetics, the pioneer in True AI-powered video analytics and unified video computing platforms, reaffirmed its commitment to shaping the future of intelligent video technologies at Videonetics Partner Connect 2025, held on December 5 in Mumbai. The gathering brought together partners, system integrators, and customers across the government and enterprise landscape, serving as a strategic platform for deepening collaboration and accelerating the adoption of AI-driven video intelligence across India. Raw video data into meaningful insights As a company built on 17+ years of R&D, 20+ patented technologies, and deployments across more than 150 cities and critical infrastructure sectors worldwide, Videonetics used the forum to outline its continued mission: transforming raw video data into meaningful insights that enhance safety, improve operational efficiency, and empower organisations to make smarter decisions. With its unified video computing platform at the core, Videonetics reiterated its commitment to developing scalable, indigenous, and globally benchmarked solutions engineered for real-world environments. Importance of video data Addressing the audience, Bhardwaj Naik, Senior Vice President & Chief Revenue Officer at Videonetics, said, “Our partners are critical to the transformation we are driving across sectors. As the volume, complexity, and importance of video data continue to grow, Videonetics remains steadfast in its commitment to deliver trusted, scalable, and future-ready AI solutions." "Videonetics Partner Connect 2025 is a reaffirmation of our long-term vision, to combine deep technology innovation with strong partnerships, ensuring that organisations can unlock the full value of video intelligence across every environment.” Videonetics’ focus on strengthening The platform also emphasised Videonetics’ focus on strengthening its partner ecosystem, which is instrumental in delivering the company’s mission at scale. Through dialogues led by the leadership team, attendees explored how Videonetics’ innovations in True AI, video management, analytics, traffic intelligence, and cloud-based video services are addressing growing national and industry needs from urban safety and governance to enterprise security and operational intelligence. AI-powered innovation Naresh B. Wadhwa, Vice-Chairman & Managing Director of Videonetics, said, “Videonetics remains deeply committed to advancing India’s leadership in AI-powered innovation. Our goal is not just to build world-class technology but to create meaningful impact enabling safer cities, smarter enterprises, and more resilient infrastructure." "Videonetics Partner Connect 2025 reflects our belief that collaboration is central to shaping this future. Together with our partners, we are driving a new era of video intelligence built in India for the world.” Advancing breakthrough innovations in AI With its foundational philosophy of “looking deeper to simplify the world,” Videonetics continues to lead India’s evolution toward safer, smarter, and more connected environments. Recognized by OMDIA for seven consecutive years as India’s No. 1 Video Management System provider and among the top 10 in Asia, the company remains focused on advancing breakthrough innovations in AI, strengthening its partner ecosystem, and expanding its impact across global markets.
Checkmarx, the pioneer in agentic application security, announces its acquisition of Tromzo, a pioneer in AI-native autonomous security agents. The deal marks a major leap forward in autonomous AppSec, accelerating the delivery of AI agents that understand real enterprise risk, reason across complex software ecosystems, and remediate continuously with precision. Tromzo’s technology and world-class engineering team will enhance the Checkmarx One platform and expand the Checkmarx Assist family of AI agents. Governance policies for AI usage Tromzo founders Harshil Parikh and Harshit Chitalia, along with their entire AI engineering team, will join Checkmarx’s product and engineering organisation. Tromzo’s capabilities are designed to reduce risk while dramatically increasing productivity by helping developers fix security issues with automated remediation and giving engineering managers and AppSec pioneers full visibility without slowing down delivery. AI has fundamentally reshaped software development. According to Checkmarx research, 60% of code is now AI-generated, and 98% of organisations have experienced breaches tied to vulnerable code, even though only 18% report having formal governance policies for AI usage. Manual gating processes cannot keep pace, creating bottlenecks that slow prioritisation and remediation and leaving a growing volume of issues to identify and resolve. AI-powered virtual security “This acquisition propels Checkmarx forward on our path to redefine AppSec through agentic AI that transforms how enterprises secure all of their code, whether it is existing, human-created, or produced through AI-driven development,” said Sandeep Johri, CEO of Checkmarx. “By acquiring Tromzo, we are integrating the only platform built on a true cognitive architecture capable of enterprise-grade reasoning. We’re offering an AI-powered virtual security assistant to every developer that understands real risk and automates remediation, moving us closer to a world where code is continuously protected and AI becomes an intelligent partner in security.” Checkmarx released the first of these agents Built on a cognitive architecture, Tromzo’s agents analyse code, deployment artifacts, and business context to drive high-confidence triage and remediation aligned to enterprise risk models. These capabilities will become a core intelligence layer across Checkmarx One and the Checkmarx Assist family of agents. Earlier this year, Checkmarx released the first of these agents, Developer Assist, which provides developers with real-time, context-aware guidance as developers code in pioneering IDEs such as Windsurf by Cognition, Cursor, and GitHub Copilot. Key acquisition highlights Autonomous AppSec: The combined capabilities of Checkmarx’s market-pioneering platform and Tromzo’s reasoning-based agents accelerate the shift toward autonomous application security. Talent & Leadership: Tromzo founders and AppSec AI pioneers Harshil Parikh and Harshit Chitalia, along with their engineering team, join Checkmarx to drive the future of agentic AI in AppSec. Expanded Checkmarx Assist: Tromzo’s reasoning engine will power new Assist agents beginning in early 2026, advancing enterprise-grade AI-powered security. Agentic AI security solutions “We built Tromzo with a singular mission: accelerate remediation of the risks that truly matter,” said Harshil Parikh, co-founder of Tromzo. “Joining Checkmarx, the undisputed pioneer in enterprise AppSec, is the perfect acceleration of that mission. By combining our deep reasoning agents with Checkmarx’s reach, scale, and market leadership, we’re delivering the only solution that lets enterprise security teams move fast with enterprise-grade control.” Together, Checkmarx and Tromzo will empower enterprises to adopt AI coding tools with confidence, backed by agentic AI security solutions that safeguard every line of code from creation through deployment. Visit the Checkmarx blog to learn more.
HackerOne, a pioneer in Continuous Threat Exposure Management (CTEM), now announced two strategic executive appointments to accelerate the company’s next phase of growth and innovation in the rapidly expanding threat exposure management category. Stephanie Furfaro joins as Chief Revenue Officer and Stacy Leidwinger as Chief Marketing Officer, bringing deep go-to-market expertise to scale HackerOne’s impact across enterprises worldwide. Together, they will strengthen execution across sales, customer success, partnerships, and marketing to help organisations stay ahead of an increasingly autonomous and AI-driven threat landscape. Prior roles of Furfaro Furfaro will lead all global revenue-generating functions, spanning sales, customer success, and partnerships, to accelerate growth and deliver greater value for customers worldwide. Leidwinger will oversee global marketing functions, including brand, product marketing, growth marketing, channel and field marketing, and sales development, unifying HackerOne’s storytelling and demand engine to support the company’s expanding market presence. Furfaro brings more than 25 years of experience scaling high-growth software companies and transforming global go-to-market strategies. She is known for building enduring customer relationships and high-impact channel partnerships that drive measurable business outcomes. Previously, Furfaro served as Chief Business Officer at Rapid7, where she led teams across sales, customer success, channel partnerships, support, and operations, helping the company achieve significant, sustained growth. Most recently, she served as General Manager at DigitalOcean and has held senior leadership roles at Allaire, Macromedia, and Adobe, where she built global programs that strengthened customer engagement and partner enablement. Prior roles of Leidwinger Leidwinger joins HackerOne with extensive experience leading cybersecurity marketing teams and scaling global software businesses. Most recently, she served as Chief Marketing Officer at Secureworks, where she oversaw all marketing and led the shift from a managed service provider to a software platform company. In addition to her cybersecurity leadership, she brings deep industry expertise in large language models and AI, grounded in her work on IBM’s Big Data team. She brings a strong customer and partner focus, ensuring marketing sharpens value messaging and drives measurable performance across the demand engine. AI-led cyber threats “HackerOne is redefining how organisations stay secure in an increasingly autonomous, AI-driven threat landscape,” said Furfaro. “I’m excited to join a company that pairs deep human expertise with cutting-edge AI to deliver meaningful customer impact. Building on HackerOne’s strong partner ecosystem will be central to expanding our reach and empowering more organisations to proactively manage their risk.” “HackerOne is entering a new stage of growth as AI-led cyber threats reshape the landscape,” said Leidwinger. “Security pioneers need to secure faster, prove risk reduction, and adapt to an increasingly autonomous threat environment. I’m energised to elevate HackerOne’s customer and partner value message and show why Continuous Threat Exposure Management (CTEM), paired with the unique combination of AI and human adversarial expertise, drives stronger results than anything else on the market today.” Threat landscape and modern defence “Stephanie and Stacy join HackerOne at a pivotal moment for our company and the cybersecurity industry,” said Kara Sprague, CEO of HackerOne. “As AI reshapes the threat landscape and modern defence, Stephanie’s experience scaling global revenue organisations and Stacy’s leadership in brand and growth marketing will strengthen every part of our go-to-market engine. Together, they will accelerate growth by delivering our full Continuous Threat Exposure Management (CTEM) value proposition to more enterprise customers.” HackerOne’s in-platform suite of AI agents These new appointments follow a year of strong growth and product innovation for HackerOne. In October, HackerOne announced the evolution of Hai, its AI platform, from copilot into an agentic AI system, along with the general availability of HackerOne Code, its AI-native code security product. With 90% of customers now leveraging Hai, HackerOne’s in-platform suite of AI agents, to accelerate vulnerability discovery and response, HackerOne is helping organisations stay ahead of threats. HackerOne bug bounty programs collectively paid out $81 million, a 13% increase from last year, underscoring the unmatched impact of its global researcher community. The company also launched its Technology Alliance Program to unite leading technology providers with its AI-powered platform.
Wachter Inc., a pioneering technology solutions integrator and innovator, is pleased to provide the Loss Prevention Research Council (LPRC) with a state-of-the-art Proto LUMA hologram unit to enhance retail education and innovation efforts. This advanced technology will serve as an immersive platform to educate the retail community on loss prevention, history, and ongoing trends, while also offering dynamic marketing and engagement opportunities. Proto LUMA unit The Proto LUMA unit, a fully integrated holographic experience platform, employs cutting-edge IoT, AI, voice activation, facial recognition, and 4K visuals to deliver life-like, interactive digital content. Through this contribution, LPRC will utilise the technology to develop realistic avatars, including a digital version of Dr. Read Hayes, Executive Director of LPRC, who will be available as a life-like avatar to interact with visitors, answer questions, and share vital insights. “By providing access to this innovative holographic technology, we aim to foster greater understanding and collaboration within the retail loss prevention community,” said Matt Tyler, Vice President of Strategic Innovation at Wachter. “This support will enable LPRC to showcase the latest in retail tech and promote education in reducing loss and enhancing safety measures.” Wachter’s involvement Dr. Read Hayes, a renowned expert in retail loss prevention with over 30 years of industry experience, expressed enthusiasm about the initiative. “This hologram unit offers a unique platform to connect, educate, and engage the retail community in a new digital format,” he stated. “We look forward to leveraging this technology to share knowledge about loss prevention and showcase the vital work of LPRC.” Wachter’s involvement also includes ongoing assistance with installation, support, and management through its help desk, ensuring seamless operation of the unit. Enabled via the Proto cloud platform, the hologram will support live streaming capabilities, allowing Dr. Hayes or other experts to engage remotely from anywhere in the world. Proto LUMA hologram “This is more than a project support effort; it’s a commitment to advancing retail education and technology,” added Tyler. “Innovative experiences like this are poised to become essential tools for education, marketing, and industry advancement.” The Proto LUMA hologram unit will be installed at LPRC’s facilities and serve as a model for future digital engagement initiatives within the industry.
Expert commentary
Artificial intelligence (AI) creates efficiencies throughout various industries, from managing teams to operating businesses. Key outcomes include faster investigations, fewer false alerts, automated operational checks, and quicker support experiences. These advancements free up valuable time for users, allowing them to focus on high-impact priorities that drive greater ROI. When it comes to surveillance, AI is most visibly powering a new generation of vision language-powered video analytics, a technology that has adapted systems meant solely for security into solutions capable of identifying actionable insights and streamlining workflows. Fast-moving AI landscape When choosing a surveillance system powered by AI, it’s vital to select an open platform. To stay ahead in the fast-moving AI landscape, it’s more important than ever for businesses to choose an open platform that empowers them to adapt and innovate. In contrast to closed systems, an open platform enables flexible integration with existing security and business systems. This offers businesses a greater return on their initial security investment while still providing an adaptable model built for the innovations of tomorrow. Below, we’ll look at the benefits provided by an open system in the age of AI, and how it can give you the strongest foundation to meet your goals. Supercharge your existing system An open platform also gives businesses the flexibility to scale security systems and add devices as needs evolve Having to invest in entirely new security infrastructure while simultaneously deploying AI technology presents a variety of problems and risks for businesses. Your team will have to manage both rollouts for your teams at the same time, driving up higher costs and more issues with training. By selecting an open platform, businesses can apply their newfound AI capabilities to existing cameras that weren’t built with analytics originally. Instead of having to completely replace your entire system, which can involve multiple weeks, months, or years of ripping out cabling and video security infrastructure, businesses can leverage analytics on the server itself to save valuable time while reducing deployment costs. This gives cameras a new lifespan by unlocking all the advantages video analytics brings, including basics like person and vehicle detection and line crossing analytics, to provide additional power to system alerts and visual search capabilities. An open platform also gives businesses the flexibility to scale security systems and add devices as needs evolve. This approach enables organisations to upgrade at a more optimal pace, bringing in new devices when it best fits the budget and operational priorities. Choose the solution that works best for you With an open platform, businesses have the ability to find and select the AI solutions that work best for them. This gives organisations greater flexibility when implementing a video analytics solution. AI-enabled devices can be added in the timeframe that works best for your business or according to your needs. For example, if a business needs a camera with edge-based slip-and-fall analytics for just one area of their facilities, an open platform enables integration with the best solution for that specific need without having to replace the entire system. This approach ensures you get maximum value from your investment while gaining the targeted benefits of video analytics. They can also bring onboard several analytic-enabled cameras while keeping the majority of their existing system, test different analytics offerings, or slowly phase out their old system. This is all possible thanks to the open platform which gives businesses the freedom of choice to find the best solutions for their business needs. Stay ready for what’s next AI is a refined, intelligent technological triumph, and today is the lower level of skill it will ever produce Finally, an open platform is inherently ready for future innovations, allowing businesses to stay ready for what’s next. AI is an advanced, intelligent technological achievement, and today is the lowest level of performance it will ever produce. The system investment you make today will need to be capable of taking advantage of the unknown but, undoubtedly, compelling features in five years' time. As new technologies continue to emerge, businesses can expand their ecosystem through an open platform, allowing them to integrate the applications that matter most to their business without being constrained by a single proprietary solution. This reduces the risk businesses may feel by committing to a single platform. Instead, they can leverage existing technology, including hardware, lowering the overall cost up front and providing an opportunity to adopt and integrate future solutions down the road. This also helps keep your surveillance current and up to date while mitigating timeline issues with the rollout of new AI features and helping you get the most out of your investment. It also provides a way to test new solutions and continue optimising your system for your business. Combining AI and an open platform The open video platform is one of the best ways to ensure your business is getting the most out of the exciting advancements in AI. With as many data points as there are provided by a modern security system, having a way to bring that information together in an integrated place is key. Thanks to AI, that information can be parsed more efficiently for proactive insights into potential optimizations and visibility during critical events. When finding the right video surveillance system for your business, be sure to select one that is not only AI-capable but also open. This will provide your organization with all of the benefits discussed above, including: Integrated Solutions: Thanks to the open platform, your business can still leverage existing hardware while using advanced video analytics on the recorder itself. Freedom of Choice: There’s no need to choose one system when it isn’t the best fit for your company. The open platform offers freedom of choice to leverage the best AI-powered technologies for your work. Futureproofed: As new innovations arise, you’ll be able to quickly integrate these cutting-edge technologies into your existing system without having to continually reinvent your system architecture.
In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishing and automated vulnerability discovery, the nature of threats is evolving rapidly, and no industry can afford to neglect them. As our industry has moved from mainly mechanical to increasingly digital solutions, we have long recognised the importance of constantly monitoring and assessing the risks we face. This means not only meeting mandatory regulations but also voluntarily adopting international standards such as ISO 27001, which protects data and systems through a structured and independently audited framework. Today’s fast-changing risk environment is also why the EU introduced the Network and Information Security Directive 2 (NIS2) – to raise the bar for cybersecurity across Europe. But what do measures like NIS2 and the Cyber Resilience Act (CRA) mean in practice? How does the rise of AI fit in? And most importantly, what should our industry be doing to stay secure in such an unpredictable digital landscape? The new regulations Compliance is not just about meeting regulations, it is also a competitive advantage NIS2 is reshaping cybersecurity expectations by setting higher standards to reduce risk, improve transparency, and protect data and services. Alongside it, the CRA introduces mandatory requirements for products with digital components. This makes “secure by design,” regular updates, and compliance checks essential before products can enter the EU market. For companies in our industry, responsibilities now extend well beyond internal systems. Organisations must also ensure that suppliers and service providers comply, with regular risk assessments forming a central part of the process. The consequences of falling short are severe, ranging from significant fines and audits to the potential withdrawal of products from the market. For our customers, the message is clear: security must be built in from the start. Compliance is not just about meeting regulations, it is also a competitive advantage. At ASSA ABLOY Opening Solutions EMEIA, security is part of our DNA. We embed these standards into everything we do, giving customers solutions they can trust to be compliant and resilient. The rise of AI Artificial intelligence is transforming the digital security landscape and it cannot be separated from the regulatory framework shaping our industry. With AI advancing rapidly and new regulations coming into force, we have established a digital compliance framework to stay ahead of the curve and use AI as an enabler for improving security and achieving compliance. On one hand, AI brings powerful benefits, including more intelligent monitoring, faster anomaly detection, and smarter tools for operational efficiency. These capabilities directly support NIS2 and the CRA, particularly in the areas of proactive risk management and incident response. AI and building cybersecurity standards On the other hand, AI introduces new risks. The attack surface is expanding and threats such as deepfakes and smarter phishing create serious threats that regulators are determined to address. Both NIS2 and the CRA emphasise continuous monitoring, transparency and accountability, principles that must now also guide the responsible use of AI. At ASSA ABLOY Opening Solutions EMEIA, we see AI not just as a risk to mitigate, but as a capability to strengthen resilience and trust. That is why we are embedding strong governance practices around AI and building cybersecurity standards into every stage of product development. By doing so, we help our customers align with new regulations while ensuring AI serves as a tool for greater security and confidence. Trust and compliance Beyond our own operations, we are also committed to supporting customers on their compliance journey At ASSA ABLOY Opening Solutions EMEIA, we are taking NIS2, the CRA and the rise of cyber-threats seriously, ensuring compliance and enhancing trust with all our customers. We have reinforced supplier oversight, streamlined incident reporting, and embedded cybersecurity into every stage of product development and lifecycle management. Our teams also conduct ongoing risk assessments and post-incident reviews, ensuring that lessons are learned and improvements are made. By taking these steps, we not only meet regulatory requirements but strengthen the resilience of our supply chain and the trust customers place in us. Beyond our own operations, we are also committed to supporting customers on their compliance journey. Initiatives such as our recently released whitepaper “Enhancing Cyber–Physical Resilience with Digital Access Solutions” and a detailed NIS2 whitepaper developed in Germany last year provide clear, practical guidance. By showing what these regulations mean in practice and how intelligent access solutions can directly support compliance, we aim to make the path forward less complex and more achievable for our customers. Looking ahead The days when security threats to businesses and products were only physical are long passed. Today, we find ourselves in a world where the digital realm poses even more serious and constantly evolving challenges. It is therefore crucial that, as an industry, we take the necessary steps to meet the directives of NIS2 and the CRA and also constantly monitor the rise of AI. Only by doing so can we protect our customers, preserve our reputations, and build the trust that defines true leadership in security.
The Internet of Things is growing quickly. It has moved far beyond a few smart gadgets at home. Today, connected technology is in homes, factories, hospitals, farms, and cities. Experts expect the global market for IoT devices to rise from about $70 billion in 2024 to more than $181 billion by 2030. This means more devices, more data, and more opportunities for industries everywhere. This growth comes from several advances working together. 5G connections make it possible to send and receive data faster. Edge computing processes information close to where it is created, which helps with quick decisions. Analytics allow organisations to understand and act on the data they collect. Together, these improvements are opening the door to new ways of working, producing, and communicating. IoT: The next generation As devices become more advanced, they use more energy and send more data. Think about high-quality security cameras, detailed environmental sensors, or systems in vehicles that send constant updates. All of these devices require a strong supply of power and a steady connection. In 2024, sensors made up more than 32 percent of all IoT device sales. Sensors are essential, yet the next wave of devices will do even more. They will process information themselves, use artificial intelligence, and include many features in one unit. This progress depends on networks that deliver both the energy and the bandwidth to support them. Into the future Devices and applications keep improving, so networks need the flexibility to handle what comes next Setting up IoT systems is about more than meeting today’s needs. Devices and applications keep improving, so networks need the flexibility to handle what comes next. A future-ready design provides extra capacity in both power and data flow. This way, when it’s time to add new devices or upgrade existing ones, the system is prepared without requiring major changes. One smart approach is to use modular equipment. For example, a network switch might deliver more power than devices currently use, while allowing room to connect more advanced devices later. This helps keep the system ready for growth. Built for all IoT devices often operate in challenging places. Factories, power plants, rail lines, and shipping ports face extreme temperatures, dust, vibration, and other difficult conditions. Network equipment in these locations needs the strength to keep working through heat, cold, and constant use. Industrial-grade gear is designed for these environments. It can run in a wide range of temperatures, handle physical impacts, and resist interference. Features such as port security, which keep a connection safe if a cable is removed, help protect both the equipment and the data it carries. Systems with backup power inputs continue to run even when one power source goes offline. Plug into PoE Power over Ethernet (PoE) sends both energy and data through the same cable Power over Ethernet (PoE) sends both energy and data through the same cable. This makes installation simpler and allows flexibility in where devices are placed. And as devices become more capable, they often need more power to operate. The latest innovation for PoE can deliver up to 90 watts on each port. This is enough to support advanced devices like AI-enabled cameras or multi-sensor units. When every port on a switch can supply that much power at the same time, adding more devices is straightforward and performance stays strong. Protecting the network Every connected device is part of a larger network. Protecting this network means securing data from the moment it leaves the device until it reaches its planned destination. Built-in security features in network equipment — such as secure architecture, encryption support, and physical safeguards — help keep information safe. They also help meet industry and government requirements for equipment sourcing and design. A clear path Organisations leading in IoT think ahead. They prepare for the next stage of technology by building networks with flexibility, durability, and protection in mind. These networks supply extra power, allow more bandwidth, and keep data secure while adapting as the system grows. The focus is on creating a foundation that supports innovation year after year. This means planning for devices that are faster, more capable, and more connected, while making sure the infrastructure grows right along with them. Looking ahead Strong, adaptable, and secure networks will allow connected devices to reach their full potential The IoT of the future will touch nearly every part of daily life. It will help farmers grow food more efficiently, guide self-driving vehicles, improve medical care, and keep cities running smoothly. As devices multiply and gain new abilities, the networks powering them need to grow in step. Strong, adaptable, and secure networks will allow connected devices to reach their full potential. By planning for both today’s needs and tomorrow’s possibilities, organisations can make the most of the opportunities IoT brings—and keep those opportunities expanding for years to come. Key takeaways: Preparing for the future of IoT The IoT market is growing fast The global market for connected devices is expected to grow from $70 billion in 2024 to more than $181 billion by 2030. This means more devices in more industries, from farming to healthcare to transportation. Devices are using more power and data Newer devices have more features — such as high-quality video, built-in AI, and multiple sensors — and these require stronger power supplies and faster connections. Future-ready networks are essential Infrastructure should allow extra capacity for both power and data. This ensures new devices can be added without major changes or delays. Environments vary, so equipment should match the setting Industrial areas, outdoor spaces, and transportation hubs need rugged, reliable equipment that works in extreme conditions and stays secure. Security starts at the network level Built-in protections — like secure architecture, encryption, and physical safeguards — help keep information safe and meet important industry requirements.
Security beat
Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones fill the gaps, providing a missing mobile layer, offering unmatched speed, broad aerial visibility, and proactive coverage that elevates security from reactive to truly responsive and deterrent. As an added element in security systems, drones complement fixed cameras, access control, and licence plate recognition (LPR) systems by serving as dynamic, rapid-response assets that reach areas other technologies cannot. Integrated with existing alarms and sensors, drones can auto-launch on triggers to deliver near-instant, real-time aerial video for accurate threat verification, giving security teams critical information before taking action. Drones as first responders Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies “Drones are a natural fit for physical security because they provide teams with fast, flexible visibility that fixed cameras and human patrols cannot always deliver, especially on large properties,” says Keith Kauffman, Senior Director of DFR Strategy at Flock Safety. Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies, which includes LPR, video surveillance, and gunshot detection systems. “Drones act as a force multiplier, improving coverage without increasing head count,” says Keith Kauffman, adding “Scaling is easy with the ability for one pilot to control multiple drones stationed at multiple locations.” Drones as a force multiplier Drones reduce manpower needs by offering wide-area coverage that would normally require several guards or patrol vehicles. Drones boost security team productivity and safety by automating the most dangerous and tedious tasks, such as alarm verification. Acting as a first responder, a drone can clear a significant portion of false alarms, allowing human guards to concentrate on high-priority roles, complex issues, or confirmed intrusions with real-time aerial intelligence. This improves personnel deployment and cuts down workload, risk, and costly overtime. Drones also significantly improve efficiency and safety for security personnel, says Kauffman. A drone system delivers real-time aerial intelligence in seconds, enabling guards to respond wisely and safely. Initial threat verification Some drone systems' yearly costs are similar to a single mid-level guard's salary Some drone systems' yearly costs are similar to a single mid-level guard's salary, but they can cover up to 38 square miles. This investment provides ROI by reducing large-scale losses and allowing human guards to focus on high-touch roles, while the drone handles initial threat verification. Flock Safety entered the drone space after acquiring Aerodome DFR in October 2024, with their private-sector drone as automated security (DAS) system rolling out in Q3 2025. And because the drones plug directly into FlockOS and work alongside other tools like licence plate recognition (LPR) and gunshot detection, they can launch automatically on alerts, creating a smarter, faster response workflow. Immediate intelligence to combat false alarms Drones fundamentally change false alarm management by providing security teams with immediate, real-time aerial intelligence. When an alarm triggers, the drone can be dispatched to the exact location in seconds, allowing operators to verify instantly the threat's legitimacy via a live HD or thermal video feed. This capability enables staff to safely clear or ignore false alarms remotely, preventing guards from wasting time and resources on unnecessary, lengthy, or potentially dangerous physical checks. This process can significantly reduce alarm fatigue and allow personnel to reallocate their time to genuine security threats. Emerging drone use cases enhance security operations Emerging drone use cases enhance security operations by integrating with existing systems and enabling novel applications. One key area is Post-Storm Damage Assessment, where drones provide rapid, safe aerial visuals of expansive sites, documenting damage for insurance claims far faster than ground inspections. Another area is Ecosystem Integration via platforms such as FlockOS, where the drone automatically launches in response to alerts from other security sensors (LPR, gunshot detection). This creates a powerful, automated workflow that unifies responses, enabling quicker incident interruption, better evidence capture, and a proactive security posture without increasing the number of human patrol staff. Evolving regulations expanding drone usage Evolving FAA regulations and corporate airspace policies impact the usage of drones Evolving Federal Aviation Administration (FAA) regulations and corporate airspace policies impact the usage of drones. Today, operating drones beyond the visual line of sight (BVLOS), at night, and over-people/roadway operations requires special FAA waivers. However, the trend — Remote ID, expanded FAA Part 107 allowances, and growing BVLOS exemptions proven in drones as first responders (DFR) — reduces overhead and allows more automation. Combined with enterprise standard operating procedures (SOPs), geofencing, and data governance, drone adopters can standardise flights, minimise risk, and integrate with other technologies. “In practice, that means automated dock-based dispatch on verified alerts, scheduled perimeter sweeps, and incident-to-incident coverage without on-site pilots,” says Kauffman. “The results are faster detection-to-dispatch, stronger evidentiary chains, and lower costs per incident — unlocking 24/7 remote operations across campuses, logistics, and sites.” Winning over public acceptance Public perception plays an important role in how communities embrace drone technology, which is why transparency and clear policy are essential. When employees and community members understand the drone’s purpose — responding to alarms, patrolling after hours, and deterring crime — they tend to view it much as they do security cameras or access control: a safety tool, not surveillance. Flock’s system is event-driven, privacy-minded, and used only by authorised personnel, and every flight is logged, documented, and fully audit-traceable for accountability. “With clear communication and responsible use, drones become a reassuring layer of protection rather than a cause for concern,” says Kauffman. Drones are extremely safe, actually reducing human risk by acting as a first responder to scout ahead of personnel. They come with layers of protection, such as geofencing, obstacle avoidance, precision landing, autonomous deconfliction with aircraft, and automated safety modes. Smartest approach For security teams considering adding drones, the smartest approach is to choose a system built specifically for 24/7 security operations. That usually means the drone provider handles FAA paperwork, writes clear procedures, develops sound policy, and trains customers’ staff so everything runs smoothly. “With the right partner, drones become a safe, compliant, and incredibly helpful part of your security toolkit,” says Kauffman. Flock ramps up drone production Flock Safety’s immediate focus is ramping production of its U.S.-designed and assembled Flock Alpha hardware, which is already NDAA-compliant and built to meet the growing demand for American-made drone solutions. At the same time, the next six to 12 months will centre on releasing key software updates, such as automated scheduled patrols. Together, increased hardware production and these software advancements will move the DAS product line toward full capability and broader commercial availability. Flock DAS Flock DAS essentially provides a guard’s vantage point from above, with the ability to instantly fly to any corner of a property. “And it doesn’t sleep on duty or call in sick,” says Kauffman. “Picture your traditional security measures: cameras are your static sentries; guards are your roaming patrollers. Now add Flock DAS: it’s your mobile, flying camera that can respond anywhere, anytime.” Just as a dispatcher coordinates police calls, Flock DAS serves as an aerial dispatcher for the security team, triaging alerts and providing eyes on the scene before anyone sets foot into potential danger. It gives the security team immediate, property-wide awareness so they can make safer, more informed decisions during any incident.
There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis. Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localised threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Centre in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernising security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system Eagle Eye Networks says they are focused on helping integrators "organise the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarisation, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditised tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Centre SaaS has had a fast and successful launch. It enables cloud-based systems with local storage. Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratise evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app centre” enables additional features to enhance XProtect without involving integration. Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernisation and open integration Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernisation, enabling security professionals to better utilise new technology. Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernisation," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favourable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond licence plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Centre (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Centre to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernisation roadmaps, suggests a security ecosystem built for agility and future growth. These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Case studies
EnGenius Technologies Inc., a pioneer in advanced connectivity and cloud-managed networking solutions, today announced that Crossroads Church in Rowlett, Texas, has completed a comprehensive security and network modernisation project using EnGenius AI cameras, multigigabit switches, and Wi-Fi 7 access points. The upgrade delivers complete visibility across the church’s 30,000-square-foot facility and 15-acre campus, providing staff, volunteers, and families with unprecedented peace of mind. Rapid growth drives need for enhanced safety Serving more than 1,200 members and hosting daily activities including worship services, youth programs, daycare, and community outreach, Crossroads Church faced increasing challenges with its aging surveillance system. The church’s legacy NVR-based surveillance system left numerous blind spots and lacked the clarity, storage, and analytics needed to support a large, active campus. “With ministry happening every day and families trusting us with their children, we needed to be sure we could clearly monitor every part of our campus,” said the church’s Executive Pastor. “Our previous system simply couldn’t keep up.” A unified EnGenius solution Crossroads Church partnered with Smart Technology Solutions to implement a full-scale modernisation built on EnGenius cloud-managed technology. The deployment includes: 57 EnGenius ECC100 AI surveillance cameras for complete indoor, outdoor, and parking-lot coverage Multi-gig EnGenius ECS2552FP and ECS2528FP switches supporting high-capacity video, livestreaming, and campus-wide traffic 12 EnGenius ECW536 Wi-Fi 7 access points providing fast and reliable wireless connectivity for staff, classrooms, and production teams A single-pane-of-glass cloud dashboard delivering centralised management, real-time monitoring, and instant event review “For the first time, we have total visibility,” said the Lead Pastor. “If something happens anywhere on our property, we can see it, isolate it, and respond immediately. That level of clarity is invaluable.” AI features unlock the future of campus security The church has begun using contextual AI analytics, including event detection, vehicle tracking, and customisable alerts. Over time, leadership plans to expand their use of EnGenius AI capabilities to detect human activity, interpret complex scenarios, analyse movement trends, and enhance after-hours oversight — further improving campus safety. Meet the AI that turns video into insight Ever spent hours scrubbing through video just to find one five-second moment? With EnGenius Cloud AI, those days are over. It eliminates the biggest headaches of traditional surveillance—false alerts, slow investigations, and endless manual review—by delivering real-time intelligence and natural language search. Instead of generic motion notifications, the system interprets what it sees, recognising behaviours with context so the team receives fewer false alarms and earlier warnings when something seems off. And when it’s time to find footage, there’s no need to dig through timelines—simply enter a description like “person in a red hoodie with a black backpack,” and the system instantly retrieves the precise clips from any camera or location. This smarter, context-aware approach helps staff work faster, respond with confidence, and stay focused on what matters most. More than a camera system, it’s a smart security assistant that makes investigations faster, simpler, and far more effective. Key camera features 5MP HDR Clarity: Sony Starvis sensor ensures clear day-and-night visuals. Ultra-Wide Coverage: 132° view and 20m IR distance for versatile environments. 8GB eMMC Flash Storage + 4GB DDR4 Memory: Delivers reliable onboard flash storage and efficient multitasking for smooth, stable performance. Built-in Storage, No NVR Needed: ECC100 includes 256GB of reliable onboard storage, supporting continuous and event recording 24/7 for immediate footage access. Durable Build: IP67 weatherproof and IK10 vandal-resistant design. Cloud Access & Mobile Monitoring: Manage cameras anytime, anywhere. The next era of intelligent surveillance With the launch of its AI Cloud Surveillance Solution and ECC100 AI Camera, EnGenius once again sets a new benchmark for intelligent security—empowering businesses to stay one step ahead with smarter, faster, and more reliable protection. “What truly sets our system apart is its ability to analyse contextual sequences rather than just single-frame images, enabling preventive alerts before incidents occur,” said Roger Liu, Executive Vice President at EnGenius Technologies. “Whether it’s spotting loitering before theft, flagging escalating conflicts, or identifying fatigued workers on a factory floor, our system helps businesses act before incidents escalate.” Availability The ECC100 is available from EnGenius authorised resellers and distribution partners.
VIVOTEK, the pioneering security solution provider, actively integrates corporate social responsibility into its operations. This year marks the fifth “Safety Map” corporate sustainability event. For the first time, the team extended its efforts beyond urban communities to the natural environment of Zhonggua River in Guoxing Township, Nantou, Taiwan. Collaborating with the National Chung Hsing University’s (NCHU) University Social Responsibility (USR) team on “Environmental Resilience and Sustainability” and the precision AI agriculture partner DATAYOO, the team launched the “Zhonggua River Ecological Restoration Safety Map” project. VIVOTEK deployed its security solutions to monitor the ecosystem, successfully capturing rare footage of the endangered crab-eating mongoose in its natural habitat. Employees also helped remove invasive species, restore native plants, and construct ecological ponds, embedding sustainability into the company’s core security expertise – extending protection from human safety to habitats and biodiversity. “Returning land to the river:” Reviving the ecosystem After a typhoon in 2004, Zhonggua River’s banks were fortified with high walls and riverbed structures for flood control, which disrupted the ecosystem. Over time, cracks formed, foundations eroded, and exposed steel reinforced the risk. In 2018, Professors Chiou-Rong Sheue and Peter Chesson from NCHU’s Department of Life Sciences began living by the river and advocated a subtraction approach: dismantling walls to “return the land to the river,” balancing flood control with conservation. This effort culminated in 2023 with Taiwan’s first community-initiated river restoration project. Today, the USR team led by Professor Hsu continues ecological monitoring and habitat maintenance, while VIVOTEK contributes technology and manpower through the “Safety Map” initiative, jointly safeguarding the reborn river. Security technology supports restoration through action and care “VIVOTEK uses ‘Concern for Others’ Cares’ as a brand catalyst. During the 2010 Chile mining disaster, our cameras were deployed deep inside the mine to monitor the vital signs of trapped miners, transmitting real-time footage to rescue teams and contributing to the miraculous rescue efforts. In Parks Victoria, Australia, we applied AI solutions to observe seal habitats in Port Phillip Bay, monitoring potential threats such as fishing lines and ropes." "VIVOTEK partnered with the NCHU’s USR team to transform our original commitment to care and social safety into active conservation of the river ecosystem and wildlife, turning technology into a bridge for harmonious coexistence between humans and nature,” said Alex Liao, President of VIVOTEK. Building safe habitats, restoring nature’s vitality Under the guidance of the NCHU’s USR team, VIVOTEK employees observed aquatic insects, native plants, and changes in the river ecosystem, gaining insight into the impact of removing cement embankments on local wildlife. To accelerate ecological restoration, they split into teams to construct ecological ponds and build new homes for the Ayers’ tree frogs using bamboo tubes. At the same time, invasive plant species such as Mimosa pudica, fragrant orchids, and elephant grass were removed, while native species including reed orchids, wild peonies, honeysuckles, purple bead trees, Taiwan mountain laurels, and orange osmanthus were replanted to stabilise the soil and restore riparian vegetation. “Being able to personally contribute to ecological restoration and give back to nature is a source of pride as a VIVOTEKer,” shared Ben, an engineer who has participated in the Safety Map event for five consecutive years. Leveraging big data monitoring to deepen corporate impact “The Safety Map event has extended from neighbourhoods, care facilities, schools, and historic settlements to Zhonggua River, engaging hundreds of employees in inspecting sites and proposing safety solutions. Through these efforts, we have expanded the definition of ‘safety’ from simply protecting people to also safeguarding wildlife and habitats, revealing the multidimensional nature of security." "Moving forward, we will continue to promote cross-industry collaboration, using our security expertise as a foundation to amplify social impact and create more inclusive safety values and practices,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the CorpComm & Sustainability Office. This year, VIVOTEK further leveraged the expertise of DATAYOO, using its FarmiSpace PRO monitoring service and AI crop monitoring system to analyse various crop indices derived from satellite spectral data. These insights provide the NCHU’s USR team with a scientific basis for their ecological research at Zhonggua River, enabling a data-driven approach to natural habitat restoration and making technology a powerful tool for conservation. Industry and academia join forces to set a benchmark “VIVOTEK Proactively proposed initiatives and involving company employees in hands-on participation are the most powerful ways to implement ecological restoration. Through VIVOTEK’s security expertise, volunteer engagement, and AI-driven long-term ecological monitoring, we have accelerated the restoration of Zhonggua River’s ecosystem, allowing more people to witness the harmony between humans and nature,” said Chiou-Rong Sheue. The habitat restoration efforts have already shown tangible results, with the ecological ponds built by VIVOTEK employees quickly attracting creatures such as pond frogs, dragonflies, water striders, and damselflies. VIVOTEK has emerged as a key driver of environmental restoration through its security technology, demonstrating that safety is not only about protection but also stewardship and shared responsibility, and continues to foster a Safety Map where humans and nature coexist.
Xtract One Technologies announced its SmartGateway has been selected by Nova Scotia Health to strengthen security measures and provide AI-powered weapons detection across facilities province-wide, with an initial order of 25 systems. Nova Scotia Health, in tandem with its nurses’ union, is working to modernise and strengthen security across its facilities to ensure a safe environment for all patients, visitors, and staff. Adopting and deploying advanced technologies like SmartGateway is an important step toward achieving that goal. Safe and secure health care By helping to limit the number of potentially dangerous items entering their hospitals, this technology supports its commitment to providing safe and secure health care. Xtract One was selected for its proven efficacy to accurately detect knives, a top priority for the organisation. Previously tested in Truro, Nova Scotia, over a 12-day trial period, SmartGateway successfully scanned 7,400 individuals entering the facility and detected 49 prohibited items during that period, mostly pocket knives and box cutters. Deploying SmartGateway “Violence against healthcare workers is a challenge that persists and demands addressing. By deploying SmartGateway, Nova Scotia Health is setting an important example for what it means to take meaningful action to protect frontline healthcare workers, patients, and visitors,” said Peter Evans, CEO of Xtract One. “This installation marks another key step in our expanding work with Canadian healthcare organisations, having deployed in Manitoba earlier this year. We look forward to continuing to deliver effective threat detection as more providers take proactive measures to prioritise security and peace of mind for their teams.” Overall approach to security “Our goal is to deliver first class healthcare, and ensuring the safety of all who enter our facilities is a critical step in providing that service,” said Dean Stienburg, Director of Security for Nova Scotia Health. “With SmartGateway, we’re making tangible strides in bolstering our overall approach to security. We were impressed by the system’s effectiveness during the trial period and are looking forward to the deployment helping us mitigate and respond to the threats of today’s environment.” Maximising security screening outcomes SmartGateway delivers fast, discreet, and accurate individual screening, utilising AI-powered sensors to unobtrusively scan for weapons and other prohibited items upon entry. This technology replaces intimidating, traditional metal detectors and mitigates the need for individuals to remove personal items. This prioritises individual privacy and comfort, all while maximising security screening outcomes. SmartGateway is designed to enable seamless passage through checkpoints and promote the uninterrupted flow of movement.
Colt Technology Services (Colt), the global digital infrastructure company, released the key enterprise technology and market trends it expects to dominate the CIO agenda in 2026. Based on customer insights, market intelligence and its own proprietary research, Colt anticipates AI Inference, the evolution of NaaS to ‘NaaS 2.0’ and quantum-safe security to shape the technology landscape over the next 12 months. Ever-changing regulatory environment “CIOs will continue to face headwinds in 2026 as they balance complex business transformation programs at scale – often centered around AI – with ongoing cost-reduction programs in an ever-changing regulatory environment,” said Buddy Bayer, chief operating officer, Colt Technology Services. “But there’s huge opportunity too: AI programs are beginning to mature, digital infrastructure has greater capacity than ever before, and we’re seeing an evolution of solutions like NaaS which are reshaping our digital experiences. It’s an exciting time and, at Colt, we’re leading the way for our customers.” New ways to generate ROI from AI Businesses continue to drive major investments in AI, but ROI, value creation and monetisation are proving elusive. Colt’s research finds one in five global firms spend US$750,000 annually on AI while 95% of the respondents in a recent MIT report study see no return on their investments. This misalignment between spending and measurable returns will shrink in 2026, as AI projects mature and begin to generate ROI, and as businesses find new ways to create value from AI. More vendors will build in AI maturity assessments and structured ROI models to help businesses define, track and quantify value across their AI tools. AI inference and Agentic AI 2026 will see AI inferencing reaching the next level of maturity, shifting from experimentation to integration into the enterprise IT environment, extracting insight, making predictions, and enabling smarter, context-aware decisions in real-time. McKinsey expects AI inference to account for a majority of AI workloads by 2030. This won’t just be limited to enterprises: Agentic AI, driven by inference, will be the force behind the automation and digitalisation of day-to-day consumer tasks from privacy management and healthcare to scheduling assistance and management of household chores, according to research from the IEEE. AI Wide Area Networking (WAN) Many of Colt’s conversations with customers centre around digital infrastructure’s ability to manage and optimise the performance, latency and security needed for AI workloads. AI WAN moves the conversation towards software-driven wide area networks, built for AI workloads, which dynamically manage AI traffic for peak performance and ensure application-level security of critical data. Innovation in sustainable networking technologies Similarly, AI workloads transmitted over transatlantic cables will grow in 2026 and are projected to surge from just 8% of total capacity in 2025 to 30% by 20351, placing additional strain on global network routes. Innovative tech trials and global partnerships are pioneering technologies which boost performance without increasing energy consumption or carbon emissions. Sovereign AI As nations grow their AI investments and regulations around AI governance come into force across many of the world’s major economies, sovereign AI is gaining momentum. It will rise up the CIO’s agenda as countries and organisations build and run their own AI systems using their own data, infrastructure, people, and rules. Sovereign AI is becoming more prevalent and increasingly important as nations look to stay in control of their technology, protect their data, and stay resilient in a world increasingly shaped by AI. NaaS 2.0 The NaaS market continues to grow, driven by a number of factors from AI, edge computing and cloud adoption to enterprises’ need to build in flexibility as they navigate dynamic global markets. Colt research found 58% of the 1500 CIOs it questioned said they were increasing their use of NaaS features due to growing AI demands. In 2026 and beyond, people will see NaaS evolve to meet the demands of the AI era, moving beyond its traditional role in supporting digital experiences. The next generation of NaaS will be intelligent, automated, and outcome-focused, designed to deliver real-time performance, adaptability, and autonomy for AI-driven enterprises. Quantum security Rise in quantum security investment as Q Day gets nearer CIOs are under constant pressure to protect their data and infrastructure from emerging risk, and as governments and businesses develop a deeper understanding of quantum’s power and potential, attention and investment turn to quantum security. In its 2026 Technology and Security Predictions report2, Forrester forecasts that quantum security spending will exceed 5% of enterprises’ overall IT budget next year, while a report from The Quantum Insider estimates the quantum security market to grow at over 50% CAGR to 2030, reaching $10 billion. Traditional data cryptography methods are at risk of being deciphered by quantum computers. The point at when this happens is known as Q Day, and latest estimates suggest it could come as soon as 2030. Technologies such as post-quantum cryptography (PQC) and quantum key distribution (QKD) protect traffic from this risk as it travels across a network. 2026 will bring developments, trials and innovation in protecting data from quantum risk. Low Earth Orbit technologies – and quantum 2026 is set to be a breakthrough year for Low Earth Orbit satellites, with organisations launching new satellites and new services. These services are a vital part of global telecoms infrastructure, providing connectivity in underserved or rural areas, and providing resiliency to businesses looking for back-up options for their enterprise infrastructure. Colt is looking to trial low earth orbit satellite connectivity for quantum key distribution: this will enable secure and protected exchange of symmetric encryption keys using quantum technology, while overcoming the distance limitations of terrestrial connectivity. 2026 will see Colt and partners trialing space-based and subsea techniques which extend quantum security to global networks. Hybrid cloud computing models 2026 will see multi cloud models becoming the default, as enterprises look for more ways to build in flexibility and resilience to their infrastructure and move beyond single-provider strategies. Increasingly, APIs and secure interconnects between providers and hyperscalers are streamlined, complementary and competitive in pricing terms and accessible through aggregators. Edge computing will continue to grow through 2026 and beyond, driven by factors such as AI inference expansion, the rise in real-time analytics, and increasing data sovereignty requirements. Next-generation cloud providers Next-generation cloud providers are prioritising deployment of infrastructure at the edge, processing data closer to where it’s generated, while hyperscalers focus on scale and compute power in centralised locations. Both strategies are needed and complementary: Edge requires highly distributed, localised infrastructure which complements centralised cloud, used for heavy compute and storage. As demand for Edge grows in 2026 and beyond – one forecast estimates a CAGR of 33.0% from 2025 to 2033 - expect rising demand for distributed architectures across new geographies. Tighter regulatory frameworks In 2026, expect to see a slew of reporting obligations, regulations, strategies and guidelines impacting CIOs, particularly in AI and cybersecurity. Most of the obligations under the EU AI Act will apply from 2 August 2026, while implementation of certain requirements for high-risk AI systems may be postponed. Reporting obligations for the EU Cyber Resilience Act are expected from September 2026, with phased obligations continuing from September 2026 onward under the EU Data Act. Cyber Security and Resilience Bill Peolpe also see the ISO/IEC 42001:2023 global standard for AI governance, which will lead CIOs and CAIOs to integrate AI governance into enterprise architecture and procurement decisions, as well as operational impacts for the Digital Services Act and the Digital Markets Act. In the UK, all eyes will be on the Cyber Security and Resilience Bill, while across Asia, Japan will see the impact of its AI Promotion Act and major initiatives following Singapore’s National AI Strategy 2.0 (NAIS 2.0) are also expected to come into effect in 2026.
Round table discussion
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Ethics can impact a company's reputation, profitability, and overall sustainability. Ethics extend beyond the law to encompass doing the "right thing" even when it is not legally mandated. As technologies such as artificial intelligence and data sharing continue to impact the physical security industry, a focus on ethics today is timelier than ever. A commitment to moral principles is critical to build a successful, sustainable, and respected industry. We asked our Expert Panel Roundtable: What is the role of ethics when deploying emerging technologies in physical security?
In the past, security installers and integrators were used almost exclusively to install hardware. However, the role is changing and expanding along with the technologies used in the physical security industry. Nowadays, an installer or systems integrator is much more likely to use a strategic, IT-centric, and data-driven approach. To gain additional insights, we asked our Expert Panel Roundtable: How is the role of the security installer/integrator changing?
Products


White papers
Elevating security through multi-sensing solutions and large-scale AI
Download
The 4 pillars of AI in managing high-stakes critical events
Download
How biometrics are reshaping security in a connected world
Download
Using artificial intelligence (AI) to automate physical security systems
Download
2025 Trends in video surveillance
Download
The role of artificial intelligence to transform video imaging
Download
Total cost of ownership for video surveillance
Download
5 surprising findings from OT vulnerability assessments
Download
Guide for HAAS: New choice of SMB security system
Download
Integrating IT & physical security teams
Download
Top 7 trends to watch in the physical security industry
Download
2024 trends in video surveillance
Download
How intelligent video is transforming banking and financial institutions
Download
Securing data centres: Varied technologies and exacting demands
Download
The real cost of an outdated Video Security System
Download

Artificial intelligence (AI): Manufacturers & Suppliers
- Dahua Technology Artificial intelligence (AI)
- WD Artificial intelligence (AI)
- Hikvision Artificial intelligence (AI)
- Anviz Artificial intelligence (AI)
- Avigilon Artificial intelligence (AI)
- Vicon Artificial intelligence (AI)
- Hanwha Vision Artificial intelligence (AI)
- Illustra Artificial intelligence (AI)
