SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

HID's innovations debut at ISC West 2025

28 Mar 2025

HID's innovations debut at ISC West 2025
Contact company
Contact HID
icon Add as a preferred source Download PDF version

HID, a pioneer in trusted identity and access control solutions, debuts its latest innovations at ISC West 2025.

As the industry accelerates its shift toward mobile-first and seamless security integrations, HID has been working on solutions to create smoother and more secure access across touchpoints—from entryways to internal systems—optimising workflows and minimising disruptions.

Integrated security ecosystems

“HID is at the forefront of driving a world of seamless security, combining our deep expertise with continuous innovation to meet the evolving needs of modern access control and identification,” said Ramesh Songukrishnasamy, senior vice president and chief technology officer at HID.

“As organisations embrace mobile-first solutions and integrated security ecosystems, HID remains committed to delivering cutting-edge technologies that streamline access, enhance user experiences, and reinforce security and secure identity at every touchpoint.”

Future of secure identity and access control

Visit HID at booth #8053 and Mercury™ at booth #27109, where attendees will have the opportunity to experience this shift firsthand, and see the future of secure identity and access control in action:

HID Signo™ Readers: Versatile, Secure, and Future-Ready

Reader, a multi-factor authentication key meeting FIPS-201 compliance and NIST 800-116 guidelines

The flagship HID Signo Readers offer unparalleled versatility, supporting a broad range of credential technologies—including cards, fobs, digital wallets, and government-issued credentials like PIV, CAC, and TWIC. 

Designed for modern workplaces and high-security environments, the portfolio now includes the new HID Signo PIV Contact Reader, a multi-factor authentication solution meeting FIPS-201 compliance and NIST 800-116 guidelines. When integrated with Mercury MP4502 controllers, it delivers high-assurance security for U.S. Federal Government entities and organisations managing single facilities or global networks.

New! Mercury Embedded Application Environment: Scalable, Interoperable, and Empowering 

The Mercury embedded application environment is an open platform that enables OEMs and technology partners to develop and deploy custom applications directly on Mercury MP Controllers.

Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge, reducing latency, increasing availability and enhancing system redundancy. 

New! HID Integration Service: Streamlined Connectivity and Enhanced Interoperability

This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators, and software vendors to seamlessly and rapidly integrate essential physical security solutions, solving the industry-wide struggle with managing third-party integrations.

New! OMNIKEY SE Plug Reader 

OMNIKEY SE Plug supports passkeys and other MFA methods for enhanced security

Revolutionise logical access with a cable-free reader that provides secure, passwordless authentication for mobile professionals. Ideal for hybrid workplaces (like healthcare, retail, law enforcement and other enterprise environments), it ensures your workforce has seamless access to corporate resources from any location – whether in the field, while working remote or when travelling. 

This versatile reader offers multi-device compatibility — working effortlessly with smartphones, tablets and laptops using a USB-C interface. OMNIKEY SE Plug supports passkeys and other multi-factor authentication (MFA) methods for enhanced security against phishing and credential theft.

HID Mobile Access: The Future of Secure, Contactless Authentication

HID Mobile Access solutions leverage smartphones and wearables for secure, convenient and touchless authentication, making them ideal for any environment where access control is needed, including workplaces, universities, commercial real estate, financial institutions and more.

Streamline management with the HID Origo™ portal, centralising user management and integrating seamlessly with access control systems. Reduce the need for physical encoding, printing, and returns, and embrace a future where access control is simple and efficient.

HID Linq™: Smart Device Management and Real-Time Insights

HID Linq tool provides real-time device state reporting and remote configuration

HID will demonstrate the powerful HID Linq tool platform, designed for seamless device management through Mercury controllers and HID Signo readers. 

The HID Linq tool provides real-time device state reporting, remote configuration and adjustments capability, as well as seamless firmware updates.

HID FARGO HPD5000e printer: High-quality, Personalised Retransfer Technology

Making its ISC West debut, the printer was engineered for universities, medium-to-large businesses, healthcare facilities and government agencies who need retransfer printing technology to effectively personalise contactless cards and for any organisation looking to switch from a higher-end, direct-to-card printer to a retransfer printing solution for improved image quality.

HID four speaking sessions

Additionally, HID will showcase its industry leadership through participation in four speaking sessions, highlighting the expertise of its thought pioneers:

  • The Impact of Identity on the Physical and Digital Access Landscape – April 1, 10 a.m. PST
  • Security Women Actively Supporting Women – How to Develop and Enhance Employee Resource Groups Focused on Women – April 2, 2:15 p.m. PST
  • Retrospective/Future: What Does the Security Experience for Today’s Younger Generation Mean for the Future? April 2, 11:15 a.m. PST
  • Optimising the Future of Workplace Experience – April 1, 1 p.m. PST

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail security systems
  • Shop security systems
  • Physical security
  • Remote security
  • Mall security
  • Healthcare security
  • Security devices
  • Store security
  • Store surveillance
  • Retail security
  • Green security
  • Mobile access
  • ISC West
  • Touchless Security
  • Related links
  • ISC West 2025
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Storage
  • Barriers
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Events news
About this page

Discover HID's groundbreaking access control innovations at ISC West 2025. Enhance security and streamline processes with mobile-first solutions and integrated ecosystems. Visit booth #8053 for demonstrations and insights.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec