SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Mercury MP controllers at GSX 2025: A new era of access control

3 Oct 2025

Mercury MP controllers at GSX 2025: A new era of access control
Contact company
Contact Mercury Security, part of HID Global
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Mercury MP Controllers debut embedded app environment at GSX 2025, promoting access control innovation.
  • Real-time edge decision-making enhances system responsiveness, reducing network dependency and integration issues.
  • Mercury's layered security principles protect network edges, supporting compliance and secure innovation.

Mercury Security, the pioneer in open architecture access control hardware, is putting the spotlight on its embedded application environment for Mercury MP Controllers at GSX 2025. First previewed at ISC West earlier this year, the platform is gaining strong traction, with dozens of partners already developing certified apps in preparation for its official launch later this year.

“Since we first introduced the Embedded Application Environment, our focus has been on working closely with dozens of partners to set them up for success,” said René Schimmer, Senior Product Manager for Controller Apps at Mercury Security, adding “The level of interest we’ve seen from the industry has been tremendous, and we’re preparing for a successful launch later this year.”

Advanced operational capabilities

Unlike traditional access controllers that depend on server-based logic, the embedded environment drives real-time decision-making directly at the edge. The result: improved responsiveness, reduced network dependency and advanced operational capabilities. It also simplifies integration across the ecosystem — seamlessly connecting controllers, IoT devices, elevators, readers and locks into one intelligent framework.

The embedded application environment is designed with Mercury’s layered security principles

As physical and cyber infrastructures converge, protecting access control at the network edge has never been more critical. The embedded application environment is designed with Mercury’s layered security principles, bringing encrypted communication and certificate management into the controller and supporting real-time monitoring through embedded applications.

This strengthens protection against tampering and data compromise, while supporting compliance requirements and enabling partners to innovate securely at the edge.

Customisable foundation for innovation

For access control and IoT stakeholders, the embedded environment delivers a secure, scalable and customisable foundation for innovation. By supporting third-party app integration and enabling custom business logic, Mercury MP Controllers have evolved from simply managing doors to acting as powerful hubs of intelligence.

“We are excited to show customers how the embedded application environment running on Mercury MP Intelligent Controllers enables partners to unlock new levels of system intelligence at the edge,” said Steve Lucas, Vice President of Sales at Mercury Security.

At GSX, Mercury is showcasing the broad capabilities of its embedded application environment in collaboration with key launch partners and their certified apps: 

  • h.e.s. ASSA ABLOY HES KS210 Lock: With the Mercury KS210 device app, OEMs can now quickly and easily add support for up to 32 KS210 OSDP server cabinet locks without the need to build custom integrations.
  • HID pivCLASS: The application enables pivCLASS support on Mercury MP Intelligent Controllers, adding PKI-based authentication at the door to meet security standards required in government facilities and other regulated industries.
  • SecuriThings: Redefining the way organisations manage and secure physical security devices at scale, the SecuriThings platform provides real-time security and operational efficiency to improve system availability, organisational compliance and cyber protection — while reducing costs and streamlining future planning.
  • Viakoo: This SaaS application maintains system health across CPS environments, such as physical security. System reliability and compliance is ensured with real-time monitoring, vulnerability identification, lifecycle data and other critical details. Viakoo takes action to remediate cyber vulnerabilities with firmware updates, password rotations and certificate management.

Future-proofing investments

Launched in June 2024, Mercury MP Controllers quickly set a new standard, enabling software providers and integrators to seamlessly combine access control technologies, elevator control, building automation, IoT applications and third-party solutions into a unified, centralised infrastructure.

This approach eliminates vendor lock-in and provides freedom to choose the right solution for specific customer requirements while future-proofing investments.

Mercury Security, an HID company, has pioneered flexible hardware solutions that empower OEMs and integrators to create best-in-class systems for over 30 years. Mercury MP Controllers support a wide range of consistent standards, including OSDP, MQTT and TLS, ensuring interoperability across access control, building automation and IoT applications.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical security
  • Security access systems
  • Electronic access control
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Internet of Things (IoT)
  • OSDP
  • Related links
  • Global Security Exchange (GSX) 2025
  • Mercury Security Access control controllers
  • ANPR Software CCTV software
  • Biometric Access control systems & kits
  • Card Swipe Access control systems & kits
  • Control Software CCTV software
  • Standalone / Networked Access control systems & kits
  • Detection Software CCTV software
  • Standalone/Networkable Access control controllers
  • Proximity Access control systems & kits
  • Smart Card Access control systems & kits
  • IP Surveillance Software CCTV software
  • Contact Access control systems & kits
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
  • Access control controllers
  • Access control systems & kits
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Events news
About this page

Discover Mercury MP Controllers and their innovative embedded application environment at GSX 2025. Unlock real-time edge control for better access security and seamless app integration.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec