Fingerprint Locks
Codelocks launches its KitLockNano, a redefined compact lock, engineered with a stronger build and smarter design. The upgraded lock delivers improved performance and functionality in the same ultra-small footprint as the original, while including a key override for complete control in any situation. Ideal for lockers, cabinets, and drawers, the KitLockNano addresses the growing demand for modern, reliable access control in environments like workplaces, sports facilities, and hotels. Ree...
Artificial Intelligence Technology Solutions, Inc, a global pioneer in AI-driven security and productivity solutions for enterprise clients, released insights from Steve Reinharz, CEO/CTO and founder of AITX and Robotic Assistance Devices, Inc. (RAD), highlighting his top five predictions for how artificial intelligence will reshape the security industry in 2026 and beyond. According to Reinharz, adoption of advanced AI security solutions is rapidly shifting from early adopters to mainstream ac...
A key characteristic of many successful companies is that good ideas come from everyone, not just specific departments or job titles. What one person sees as obvious may be questioned by someone else who is less familiar with the product or process. This simple interaction can spark a whole new, faster, and better approach. While valuing tradition is important, if someone uses the phrase “that’s how we’ve always done it,” it’s essential to analyse the process...
Allegion US, a pioneering provider of security solutions, technology and services, will showcase the seamless integration of Schlage XE360™ electronic locks with Zentra, a game-changing access control solution for property managers and facility executives, at Apartmentalize. Built on Allegion’s legacy of security excellence, Zentra offers a user-friendly experience based on insights from property managers and maintenance staff. Advantage of the latest technology This pow...
In the industrial landscape, ensuring security isn’t just about guarding entry points—it’s about securing processes, assets, and people with intelligence. That’s where the Advanced Access Control system steps in. For manufacturing plants, this system offers more than just card-based entry—they deliver operational safety, traceability, and compliance. Growth in the access control Markets and Data reveals significant growth in the global access control and authenti...
NEXT Biometrics has launched a new fingerprint sensor in response to customer requirements. The ‘L1 Slim’ is a new addition to its NEXT Basalt FAP 20 product series (formerly NEXT Access 300 series) and is the thinnest sensor of its kind, while maintaining the same security and performance. This optimises the integration process for identity verification module, point of sale terminal, tablet and other device makers. The sensor is also certified for use in India’s...
News
Digitalisation is high on the agenda, or well under-way, in all kinds of commercial environments. As part of this process, many businesses are discovering an additional ROI when they digitalise access management for offices, retail spaces, entertainment venues, warehouses and more. The challenges of securing these buildings are no secret. Staff and business security are a priority, including the resilience of operations and the maintenance of a company’s hard-earned reputation. Filtering access, however, should not erect barriers to accessibility. Buildings should be comfortable to use for all those who are authorised to enter them. Web management software Digital access makes this much easier to achieve, providing day-to-day benefits for each building stakeholder – employees and building managers, owners and the contractors who come and go through commercial building spaces every day. During use, when employees, contractors and visitors can come-and-go with ease, collaboration is simpler and administration for building managers is more streamlined. This functionality supports the broad contribution to business efficiency that digitalisation brings. This functionality supports the broad contribution to business efficiency that digitalisation brings There’s a device to lock almost any opening and a digital solution which can either extend existing access management capability or implement digital access from scratch without cabling or invasive installation. Mobile credentials stored on a smartphone can simplify and accelerate the process of issuing, amending and revoking access. Facility and security managers can benefit from web management software, including mobile access management, which enables remote monitoring and control from one convenient point, or even while off-site. Generating higher revenues According to digital transformation experts, digital access enhances operational agility, improves productivity, enhances security and encourages innovation. Deloitte research found evidence that businesses with greater ‘digital maturity’ generated higher revenues. “Access is an increasingly important part of a digital picture which incorporates both physical and cyber security measures,” says Joachim Mahlstedt, Director and CCO Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “Digitalising access quickly provides benefits which a business can turn into a competitive advantage. It puts powerful tools in the hands of a commercial building manager, as these four real projects demonstrated.” Multiple building technologies Example 1 – Office building Managing access manually and updating multiple systems in parallel can eat up a large amount of facilities staff time. There is a more efficient alternative: management of offices is more streamlined and errors are minimised when multiple building technologies, including access, are connected. There is a more efficient alternative: management of offices is more streamlined and errors are minimised At a new corporate headquarters for Canal+ near Paris, for example, various devices from ASSA ABLOY’s suite of connected Digital Access Solutions – including battery-powered Aperio® wireless handles with integrated readers and ABLOY electromechanical security locks – integrate with a Genetec system to filter access to and through all technical areas, for 1,200 employees plus visitors and contractors. This native integration adds control without adding management complexity. Aperio is not an ‘add-on’, no extra database is required. It becomes part of one streamlined system, controlled from a single interface. Programmable key-operated digital access Example 2 – Manufacturing site Digital access is also available for high security environments and/or locations where multiple different cylinder types must be used. In Germany, RheinfelsQuellen opted for ASSA ABLOY’s eCLIQ programmable key-operated digital access. At its Duisburg HQ and other locations around North Rhine–Westphalia, their new digital locking operates reliably both indoors and outside. The system is managed via the CLIQ Web Manager (CWM); system data may be accessed at any time, and from any location, via the CWM interface. The software's flexibility makes it especially suited to large access systems or for multiple locations which are geographically dispersed. “We would choose this secure and flexible locking solution time and time again,” says Marcus Schlötels, Project Manager at RheinfelsQuellen. Software-powered digital access solution Example 3 – Small retail ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer Petty theft from stockrooms and shop floors is a persistent problem for retailers. Yet in small premises, a software-powered digital access solution may not be appropriate. In Leuven, Belgium, upscale fashion boutique Patio sought an easy, low-cost deterrent. ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer. Door security is operated by a discreet PINpad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN. Flexible work environment Example 4 – Flexible workspace Modern workplace design needs access control that is powerful, flexible and aesthetically in tune with building users. At Plexal, an East London flexible work environment used by up to 800 entrepreneurs, ASSA ABLOY Aperio digital access achieves all three. Plexal offices are fitted with Aperio wireless digital locks which are integrated with DoorFlow, NetNodes’ online platform for managing and auditing access. These locks provide Plexal with physical security and transmit door status to DoorFlow in real time. Because they are battery- rather than mains-powered, Aperio locks also keep maintenance costs and energy consumption low. “Digitalisation presents huge challenges and opportunities for businesses of every size and type, in access management and beyond,” adds Joachim Mahlstedt. “Our expertise in access, established over decades, enables us to work with customers to truly get their access ready for what’s ahead. With ASSA ABLOY, they digitalise with confidence.”
Wavelynx, a pioneer in secure and interoperable access control solutions, announced the launch of the APEX Module - a solution designed to transform how manufacturers integrate access control technology into their products. Pre-FCC certified and mobile wallet-ready, the APEX Module empowers OEMs and device manufacturers to deliver smarter, more secure solutions without lengthy R&D cycles. Wavelynx’s reader technology APEX Module brings Wavelynx’s pioneering reader technology closer to device makers in a secure The APEX Module brings Wavelynx’s pioneering reader technology closer to device makers in a secure, easy-to-integrate form factor. It enables OEMs and hardware manufacturers to embed powerful RFID technology into a wide range of systems - including intercoms, elevators, turnstiles, smart locks, alarm panels, and biometric readers—reducing R&D costs, speeding development, and accelerating time to market for new product offerings. Next generation of smart access "The APEX Module isn't just a technology add-on—it's a growth catalyst that empowers our partners to enhance product capabilities, fast-track go-to-market efforts, and tap into new, high-value market opportunities," said Robert Lydic, President. “As building security moves toward integrated, mobile-first experiences, the APEX Module serves as the foundation for the next generation of smart access. Wavelynx’s commitment to interoperability ensures shared innovation and growth across our entire partner ecosystem.” One module. Modern credential tech. Unlimited possibilities The module helps OEMs transition from legacy Prox technology to a secure, future-ready solution Designed for flexibility, the APEX Module is compatible with legacy proximity cards, smart cards, and mobile credentials (NFC and Bluetooth). The module helps OEMs transition from legacy Prox technology to a secure, future-ready solution. The Module also features advanced encryption for secure communication and credential verification, all in a compact design. Advantages for manufacturers The APEX Module delivers significant advantages for manufacturers looking to accelerate growth by expanding into new segments or enhancing existing product lines: Accelerated R&D and Market Entry: The APEX Module eliminates the need to design separate devices for different frequency standards. By reducing development time and engineering effort, OEMs can focus on core strengths, expand their RFID offerings, and enter new markets faster. Ecosystem Expansion—Fast: Gain instant compatibility with mobile wallets (including Apple Wallet, Google Wallet, and Samsung Wallet), secure card formats, and legacy Prox credentials. Seamless integration and over-the-air updates ensure products evolve with industry standards. Access to the LEAF Community: Implementing the Module, a LEAF Community device, enables one LEAF Universal credential to work across other LEAF Community devices, opening access to a growing ecosystem of partners and unlocking new revenue opportunities with LEAF-compatible solutions. Mobile-ready access control "The APEX Module delivers our trusted RFID technology directly to OEMs and device manufacturers,” said Melissa Stenger, Chief Strategy Officer at Wavelynx. “It’s purpose-built for customers seeking a competitive edge through seamless integration of standards-based, mobile-ready access control—without the burden of traditional R&D investment."
To protect the important openings in their buildings, organisations need locks they can trust. This means more than just strength and attack resistance – although these are of course critical. They also need connectivity: efficient integration with existing systems to help facilities managers face challenges in the evolving physical and cyber-security landscape. Modern digital access system An electric lock is a core component of a modern digital access system. It provides seamless security and safety; data which businesses can use for monitoring and efficient building management; and smart access capabilities. The ABLOY brand has led innovation in the design and development of electric locks for over 40 years, continuously refining security, safety, reliability, and energy efficiency. An ABLOY electric lock, part of a suite of digital access solutions from ASSA ABLOY, delivers ROIs in terms of both security and convenience. It connects building access with more fine-grained management tools which help facilities managers to work smarter and audit movement effectively. Trusted worldwide, trusted for a reason: ABLOY electric locks ABLOY electric locks have been installed worldwide, in commercial and government buildings Electric locks from ABLOY bring a vast range of benefits to any organisation: not only security, but also confidence, compliance, convenience and more. In various installations, including some of the most challenging assignments any lock can be given, they have consistently proven to be durable, reliable and energy efficient – time and again. Over the decades, ABLOY electric locks have been installed worldwide, in commercial and government buildings, at critical infrastructure, protecting hospitals and many more premises. Building managers enjoy peace of mind when they choose ABLOY. Each electric lock is certified and compliant with security and safety standards, as well as building regulations. Security risks and operational inefficiency ABLOY electric locks also enhance the convenience of daily facilities management tasks. They are easy to use and to connect to an existing access system, which reduces the security risks and operational inefficiency of running multiple systems or protocols in parallel. Electric locks can be controlled remotely via a web connection, streamlining the management of people flow by making access smarter. When integrated with solutions which enable remote building control, for example, they ensure fast and secure lockdowns in a critical situation, enhancing the protection of people and property. Future challenges in security Electric locks also help businesses face future challenges in and beyond security Electric locks also help businesses face future challenges in and beyond security, including operational resilience. They generate indication data for real-time security insights. The locks themselves may contribute as part of an organisation’s overall sustainability strategy: they use power only when unlocking, minimising energy waste and supporting green building initiatives. ASSA ABLOY’s suite of digital access solutions “As part of ASSA ABLOY’s suite of connected digital access solutions, ABLOY electric locks provide the highest level of protection, seamless integration, and proven long-term reliability,” says Mika Savolainen, Director & Head of Product Line Management ELMECH PU at ASSA ABLOY Opening Solutions EMEIA. “By choosing an ABLOY electric lock, you ensure your building’s access is secure, smart, and ready for the future. With us, you digitalise with confidence.”
iDenfy, a RegTech pioneer in identity verification and fraud prevention solutions, announced a new partnership with iGaming Express, a trusted consultancy company specialising in high-risk industries with a strong focus on the iGaming sector. By integrating iDenfy’s AI-powered identity verification software, iGaming Express will help its clients improve their verification flows through better conversions and complete compliance with Know Your Customer (KYC) regulations on a global scale, no matter the industry or jurisdiction. Complexities of international regulations iGaming Express is a consultancy known for its deep expertise in helping clients iGaming Express is a consultancy known for its deep expertise in helping clients navigate the complexities of international regulations, especially in heavily regulated, high-risk industries, such as iGaming. The company offers a comprehensive suite of services, including licencing support, strategic business planning, and legal advisory on various compliance matters, including KYC regulations, all tailored to its clients’ industry specifics. Innovative and more precise technologies As businesses operating in highly regulated sectors face rising scrutiny from global regulators, identity verification has emerged as a crucial element in maintaining compliance and protecting against fraud. With the increasing shift of high-risk industries to digital platforms, iGaming Express team’s main goal is to strengthen client trust and compliance through innovative and more precise technologies. iDenfy’s cutting-edge identity verification software iGaming Express looked for a fully automated KYC solution to meet these challenges Due to this factor, and the need to scale on a global level while catering to different clients’ needs, the consultancy platform decided to integrate iDenfy’s identity verification solution and improve remote onboarding for its partners. iGaming Express looked for a fully automated KYC solution to meet these challenges without sacrificing customer experience. Currently, with iDenfy’s cutting-edge identity verification software, the company can provide its clients with real-time biometric authentication and document verification across more than 200 countries. This shift has enabled iGaming Express to onboard clients seamlessly and securely. ID verification solution According to Domantas Ciulde, the CEO of iDenfy, businesses that deal with high-risk clients, for example, fintech or crypto platforms, including other industries like iGaming and sports betting, need to have specific licences in line with their operating country and jurisdictional requirements. iDenfy has partners all around the world, with expertise in helping onboard such high-risk clients. “Our ID verification solution detects risks in real-time, preventing bad actors from accessing services in the very first step of the customer journey,” explained Domantas Ciulde. iDenfy’s AML screening iGaming Express plans to incorporate iDenfy’s AML screening and KYB tools to enhance further The integration of iDenfy’s verification technology into iGaming Express's digital infrastructure has already yielded significant improvements. The automated system validates user identities through secure facial recognition and cross-referenced document checks, helping eliminate the possibility of fraud through fake as well as duplicate identities. As part of their roadmap, iGaming Express plans to incorporate iDenfy’s AML screening and Know Your Business (KYB) tools to further enhance their due diligence processes. Level of assurance and efficiency “When one of my trusted partners recommended iDenfy, the decision was clear. Our operations are fully remote, and until now, verifying a client’s identity without face-to-face interaction was challenging." "iDenfy brings us a level of assurance and efficiency we couldn’t find elsewhere. It allows us to verify identities instantly, while reducing risk and ensuring we meet our regulatory obligations,” noted Alex Szilaghi, the CEO of iGaming Express. Collaboration with iGaming Express “At iDenfy, we understand the unique compliance and fraud prevention needs of high-risk industries. Our collaboration with iGaming Express ensures that they can remotely verify client identities with accuracy and speed." "This is about more than compliance; it’s about enabling safer digital interactions and protecting both the business and its customers,” added Domantas Ciulde, the CEO of iDenfy. Complex identity manipulation Fraud schemes can involve complex identity manipulation and cross-border financial crimes In industries like online gambling, where fraud schemes can involve complex identity manipulation and cross-border financial crimes, reliable identity verification becomes essential. According to industry research, identity fraud contributes significantly to global financial losses, with the projected cost of online fraud expected to surpass $100 billion by 2029. Regulatory bodies worldwide are mandating tighter controls, and businesses are under pressure to implement reliable onboarding processes that prevent misuse while maintaining a smooth user experience. iDenfy’s scalable RegTech solutions As more high-risk sectors digitise their operations, collaborations like this serve as an example of how identity verification technology can drive both operational efficiency and long-term trust. With iDenfy’s scalable RegTech solutions, iGaming Express is well-positioned to continue delivering compliant, secure, and client-focused services in the evolving digital age.
Aiphone, the pioneer in security communication and access control solutions, announced that its AC Nio™ access control management software is now available as a cloud-based solution. Leveraging cloud deployment flexibility and reliability, AC Nio now offers a complete, modern, and secure access management experience that is ready to make waves in the industry. Comprehensive security ecosystem "We know how challenging it can be for organisations to build and maintain a comprehensive security ecosystem, especially when managing multiple systems as they grow," said Sean Peterson, Director of Product, Marketing, and Support at Aiphone. "That's why our AC Nio stands out in the industry. The solution combines enterprise-grade capabilities with the intuitive usability you'd expect from consumer technology, ultimately giving our customers one less thing to worry about." An effortless access management experience AC Nio access control management software has a powerful, intuitive web interface for permissions AC Nio access control management software delivers a powerful, intuitive web interface for managing permissions, schedules, and reports with exceptional scalability. Users can customise dashboards to monitor priority information at a glance through an intuitive drag-and-drop interface for viewing and managing doors and devices in real-time. The software streamlines both routine and bulk operations, enabling easy configuration of fine-grained permissions and smart automations tailored to your experience. Future-ready scalability and reliability AC Nio scales with an organisation's physical security infrastructure, supporting enterprises and fast-growing small and medium businesses alike. Through AC Nio, organisations unify access control with core security systems, including intercoms, video management solutions, and electronic locks. The software’s third-party API integration and advanced Action Plan capabilities create a cohesive security ecosystem that is responsive to a variety of security needs and objectives. Flexible controller and credential options The AC Series PoE controllers are designed to minimise installation time and cost The AC Series PoE controllers are designed to minimise installation time and cost. The above-the-door module features a built-in motion sensor and eliminates excessive access cabling. The compact design simplifies installation, offers better aesthetics, and ensures long-term reliability. Organisations can select from various credentialing options, from physical credentials, Bluetooth technology to mobile apps, optimising convenience and flexibility for specific business requirements. Get AC Nio cloud deployment licence on AiphoneCloud AC Nio cloud-based deployment subscriptions are now available for purchase through AiphoneCloud. On-premises licences are available from authorised distributors and activated online.
Anviz, a pioneer in intelligent security solutions, proudly announces the launch of W2 Face, its latest hybrid biometric access control and attendance terminal. Designed to meet the evolving needs of modern enterprises, the W2 Face combines facial recognition, fingerprint authentication, and RFID capabilities in a compact, intelligent device built for dynamic workplaces. Responding to market evolution As the access control landscape shifts toward integrated multi-biometric solutions, businesses increasingly seek systems that enhance security and operational efficiency. Market analysis conducted by Anviz has revealed key trends driving this demand: A growing preference for contactless and hygienic technologies Small and medium-sized enterprises are prioritising cost-effective, reliable solutions An increased need for flexible authentication methods Rising expectations for stable, secure access to sensitive areas The W2 Face addresses these demands head-on, delivering a comprehensive, easy-to-deploy solution suited to various professional environments. W2 Face: Key features & innovations 1. Dual Biometric Authentication W2 Face integrates advanced facial recognition and fingerprint scanning, supported by liveness detection, to defend against spoofing via photos or video. This dual-layer security is ideal for high-traffic entry points. 2. Multi-Communication Flexibility With support for both Ethernet and Wi-Fi, the device can function in networked or standalone configurations. Integration with Anviz’s CrossChex Cloud enables remote management, simplifying operations across multiple locations. 3. Optimised for Small and Medium Enterprises 2.8-inch intuitive touchscreen display Capacity for 200 facial templates, 200 fingerprint records, and 200 RFID cards Stores up to 50,000 log entries for robust audit trails Slim design for seamless installation on standard door frames 4. Versatile Access Control Capabilities Customisable relay settings and doorbell integration make the W2 Face adaptable to various access scenarios, from open office environments to restricted zones. Why choose W2 Face? The W2 Face exemplifies Anviz’s ongoing innovation in secure access technology: Integrated Biometric Options: Supports user preferences with multiple authentication methods Enhanced Stability: Built on a proven platform with improved system reliability Modern, Functional Design: Sleek, professional aesthetic ideal for commercial interiors Broad Application Scope: Well-suited for distributed teams, temporary personnel, and multi-location operations Certified for global standards W2 Face complies with CE and FCC certifications, ensuring adherence to the highest international safety and performance standards. Its modular architecture allows for scalable updates, protecting customer investments over time.


Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Security beat
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at Scott County R-IV School District in Benton, Missouri, to mitigate gun-related violence. The deployment was facilitated by Freedom Security, a local security provider serving the greater Missouri Area. Robust security upgrades Located in a rural community near the borders of Illinois and Kentucky, Scott County R-IV School District consists of a single campus with three interconnected buildings serving students from pre-K through 12th grade. The district educates approximately 800 students annually and employs around 125 teachers and administrators. ZeroEyes is the newest addition to the district's robust security upgrades, which include window tints, HAVEN locks, integrations with CrisisGo, and more. Digital security cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administration as quickly as 3 to 5 seconds from detection. ZeroEyes safety strategy “ZeroEyes is not intrusive or invasive, and it does more than just detect; it alerts, responds, and continues to do so throughout any situation involving a potential threat,” said Dr. Bradley Kolwyck, Superintendent of Scott County R-IV School District. “This technology is the final piece we needed to ensure every layer of our safety strategy is connected, enabling us to provide the safest environment possible.” ZeroEyes deployment ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County R-IV District Office (4035 State Highway 77, Benton, MO). It will feature demonstrations and discussion sessions, including reflections from school pioneers on the district’s successful ZeroEyes deployment. The event is open to local schools, law enforcement, and media. ZeroEyes’ innovation and protection “I commend Scott County R-IV School District for taking the initiative to lean into innovation and proactively protect its students from gun-related violence,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “ZeroEyes’ ability to provide first responders and law enforcement with advance warning and situational awareness empowers them to act quickly and save lives.”
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions for enterprise clients, along with its subsidiary Robotic Assistance Devices (RAD), announced recent successes in St. Louis, Missouri, where the Downtown St. Louis Community Improvement District (CID) has embraced RAD’s solutions as part of its public safety initiatives. The CID has deployed multiple ROSA™ security devices, showcased RAD’s ROAMEO™ and RADDOG™ LE2 during the NCAA Frozen Four Championship, and is actively developing a citywide program that would introduce hundreds of RADCam™ units across St. Louis. RAD’s added layer of security RAD’s ROAMEO and RADDOG LE2 were actively deployed in St. Louis as part of the city’s public safety From April 10 to 12, RAD’s ROAMEO and RADDOG LE2 were actively deployed in downtown St. Louis as part of the city’s public safety and engagement efforts during the NCAA Frozen Four Championship. These high-visibility units provided an added layer of security, engaged with residents and visitors, and generated strong public interest. Steve Reinharz, CEO/CTO of AITX and RAD, was interviewed on-site by KSDK, the St. Louis NBC affiliate, where he discussed how RAD’s technologies enhance urban safety while fostering meaningful community interaction. RAD security solutions During the event, representatives from several local organisations, including casino operators, professional sports teams, and major property management firms, visited with RAD and the Downtown St. Louis CID to see firsthand how ROAMEO, ROSA, RADDOG LE2, and other RAD security solutions could be used to support safety and operational efficiency in real-world environments. Of particular interest to many of these organisations was RAD’s multiple SARA™ (Speaking Autonomous Responsive Agent) and ROSS™ (RAD Operations System Software) platforms. RAD’s analytics and automation capabilities Software solutions allow clients to reimagine the role of their existing security infrastructure These software solutions allow clients to reimagine the role of their existing security infrastructure by adding an intelligent, agentic AI layer to legacy hardware. By leveraging RAD’s analytics and automation capabilities, organisations can unlock powerful new functionality from their current systems, enhancing performance, accelerating incident response, and delivering significant cost savings without the need for full system replacement. RAD’s technology: public safety efforts “RAD’s technology has been an impactful addition to our public safety efforts,” said Kelli McCrary, Executive Director of the Downtown St. Louis CID. “The presence of ROSA, ROAMEO, and RADDOG has not only helped deter unwanted activity, but also brought positive attention and community engagement, especially during the excitement of the Frozen Four Championship. This kind of innovation supports our vision for a safer, more welcoming downtown experience.” RAD over traditional security solutions RAD secured deployments of ROSA and RIO units following a competitive review, with city leadership RAD’s momentum extends beyond St. Louis. In Cleveland, RAD partnered with Downtown Cleveland, Inc. to launch a smart security initiative in Public Square, featuring the RIO™ 360 tower with live video integration into the city’s crime centre. In Nashville, RAD secured deployments of ROSA and RIO units following a competitive review, with city leadership opting for RAD over traditional security solutions to enhance monitoring and deterrence in key public areas. How RAD’s solutions meet the evolving security needs As municipalities and CIDs search for scalable, cost-effective ways to secure public spaces, RAD has emerged as a trusted partner in redefining how cities approach safety. From high-traffic districts to major public events, RAD’s AI-powered devices provide 24/7 monitoring, advanced detection capabilities, and autonomous responses that relieve the burden on human personnel. The recent deployments in St. Louis, Cleveland, and Nashville illustrate how RAD’s solutions meet the evolving security needs of urban centres while reinforcing community confidence. RAD's effective security solutions “We’re seeing growing interest from CIDs and public sector organisations that are eager to rethink how they secure their communities,” said Reinharz. “RAD is executing a nationwide campaign to deliver meaningful, affordable, and effective security solutions to cities, towns, and districts across the country. Our technology gives these organisations the tools to protect public spaces, ease the strain on human resources, and deliver a stronger sense of safety for residents and visitors alike.” Outdated approaches and deployments RAD welcomes inquiries from municipalities, CIDs, BIDs, DDAs, and other organisations “It’s incredibly rewarding to see our devices actively supporting the safety goals of communities like St. Louis, Cleveland, Nashville, and others,” said Troy McCanna, Chief Security Officer at RAD. “These deployments represent a shift away from outdated approaches and a move toward intelligent, responsive technology that delivers results. We’re proud to be working hand-in-hand with local pioneers who are committed to creating safer urban environments through innovation.” How its AI-powered security solutions can support safety goals RAD welcomes inquiries from municipalities, Community Improvement Districts (CIDs), Business Improvement Districts (BIDs), Downtown Development Authorities (DDAs), and other organisations focused on public safety and urban revitalisation. The Company offers personalised consultations to explore how its AI-powered security solutions can support local safety goals, improve operational efficiency, and strengthen community trust. RAD's security guarding and monitoring model RAD solutions are precisely designed to provide cost savings to businesses of between 35%-80% AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD AI-based analytics and software platforms RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients, generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. Modern digital solution Modern digital solutions would provide better oversight of movement around the building All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management, they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorizations, even at the last minute. ASSA ABLOY’s smart key digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. eCLIQ system maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provides security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.


Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
Products


Videos
Fingerprint Locks: Manufacturers & Suppliers
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
