Identity management
As 2026 approaches, cybersecurity threats are evolving at an unprecedented speed. Small and medium-sized enterprises (SMEs) face rising exposure as perpetrators adopt advanced AI, expand commercialised cybercrime platforms, and intensify nation-state activity. Recent intelligence, including the CrowdStrike 2025 European Threat Landscape Report, highlights how attackers are becoming faster, more capable, and more varied in their methods, raising the stakes across the UK’s interconnected su...
Zimperium, the world's pioneer in mobile security, now announced that Alistaire Davidson has joined the company as Chief Financial Officer, reporting directly to CEO Shridhar Mittal. Alistaire brings more than 20 years of finance leadership experience across private equity–backed and public software companies. Alistaire most recently served as Regional CFO, Americas at The Access Group, where he led the post-acquisition integration of two strategic business units. Prior to The Access Grou...
Teleport is excited to announce it has been named the winner of Rising Star Partner of the Year, recognising Teleport as a top Amazon Web Services (AWS) Partner that has seen significant YoY growth in its technology business. Announced during the Partner Awards Gala at AWS re:Invent 2025, the Geographic and Global AWS Partner Awards recognise a wide range of AWS Partners that have embraced specialisation, innovation, and cooperation over the past year. Geo and Global AWS Partner Awards recognis...
ServiceNow, the AI control tower for business reinvention, announced its intent to acquire Veza, a pioneer in identity security. The acquisition will extend the capabilities of ServiceNow’s Security and Risk portfolios into one of cybersecurity’s most important areas that is at the forefront of every breach now – Identity Security. This will enable organisations to understand and control who and what has access to their critical data, applications, systems, and AI artifacts. A...
Salto, a pioneer in smart access technology, proudly celebrates its 25th anniversary in 2025. Marking a quarter century of transformative innovation, Salto continues to lead the industry by redefining how people experience access and secure spaces worldwide. Founded in 2000, Salto began with a bold vision to create universal, wire-free, and networked smart locking systems. From its early days as a small startup in northern Spain, Salto has grown into SALTO WECOSYSTEM – a global force unit...
As AI-generated phishing attacks flood inboxes with more realistic and personalised scams, DigiCert, a pioneer in intelligent trust, today released new research revealing that consumers are turning to verified brand identities in email for reassurance--especially during Cyber Week. The study, conducted by independent research firm Vitreous World, surveyed 5,000 consumers across the U.S., U.K., Australia, and New Zealand to understand how verified logos and sender authentication will...
News
Genetec Inc., the global pioneer in enterprise physical security software, shared its top predictions for the physical security industry in 2026. In 2026, the conversation around cloud adoption will continue to mature. Organisations will prioritize solutions that offer deployment flexibility and scalability. Rather than committing to a single deployment model, enterprises will evaluate each workload based on performance, cost, and data residency requirements. They will then choose the environment that best supports their operational needs, whether it’s on-premises, in the cloud, or a hybrid approach. Open architecture solutions Open architecture solutions will give end users the freedom to choose the devices and applications that best support their operations. This approach will extend the life of existing infrastructure while allowing teams to adopt cloud services where they add the most value. Vendors that offer full-range deployment options and strong interoperability across environments will be best positioned to meet these expectations. In contrast to proprietary systems that limit choice and create lock-in, open solutions provide a more adaptable path that supports long-term flexibility and control. AI moves from hype to intelligent automation In 2026, the conversation will shift from AI and LLM hype to practical, outcome-driven Intelligent Automation (IA) solutions that streamline workflows, improve accuracy, and enable faster, smarter decisions. IA will increasingly automate repetitive tasks, enhance monitoring precision, support predictive maintenance, and extract meaningful insights from growing data volumes. Rather than adopting technology for its own sake, users will focus on features that genuinely improve daily operations, such as intelligent search to accelerate investigations, reduce false alarms, and strengthen situational awareness. By optimizing response and reducing manual overhead, IA allows operators to focus their time and energy on important work and decision-making that requires human judgment. Prioritizing cybersecurity As the market matures, expectations around transparency and responsible implementation will rise. Users will demand clarity on how AI is used, how systems are built, and how data is collected, processed, and protected. They will also expect vendors to prioritize cybersecurity and ensure that IA features are deployed in a safe, controlled, and accountable way. Organisations will move away from innovation for its own sake to delivering measurable, trustworthy, and meaningful outcomes powered by intelligent automation. Access control modernization Access control will remain a top priority as organisations modernize legacy systems and focus on maximizing ROI. The value of access control is expanding well beyond locking and unlocking doors to deliver measurable business outcomes, such as energy efficiency, occupancy management, and operational insights. Access Control as a Service (ACaaS) adoption will accelerate as organisations prioritize easier maintenance, greater scalability, and predictable operating costs. Enterprises will favor hybrid deployments that combine on-premises and cloud capabilities. Unifying ACaaS and Video Surveillance as a Service (VSaaS) will further enhance visibility and streamline management across sites. Mobile credentials and biometrics will continue to transform identity management, offering greater convenience and security while decentralising ownership of identity data. As mobile wallets and ultra-wideband technologies become mainstream, users will gain more ease and flexibility in how they authenticate and interact with secured environments and facilities. Unified security and operations platforms Over the next year, the number of connected devices will continue to surge as organisations integrate IoT sensors, building systems, and smart devices into unified security and operations platforms. Bringing this information together in one place will give teams a clearer view of what is happening across their facilities and help them respond faster and with greater confidence. The convergence of IT, operational technology, and physical security will accelerate, enabling real-time data sharing and smarter decision-making across facilities. End users will expect open, scalable platforms that connect diverse devices securely and deliver both operational and security value. As the landscape grows more complex, organisations will seek guidance on how to deploy the right technologies and manage them effectively. The pioneers in this space will be those who unify diverse devices securely, offer cloud-native and hybrid options, and embed cybersecurity and data residency into their design.
iDenfy, a pioneering global RegTech service provider, best known for its identity verification and fraud prevention solutions, designed to help regulated businesses comply with evolving compliance requirements, is noticing new threats in the music industry. From iDenfy’s successful launch in 2017, AI and the convenience of online services have opened a door for bad actors to misuse online platforms, including in more niche sectors like streaming and music distribution. Last year, approximately 15.3% of all internet users were individuals who fall into the category of ages 18 and 24, meaning they're the most likely to download pirated music for free. Compliance, music monetization education, and financial security tools are essential for understanding in order to prevent the unlawful distribution and monetization of copyrighted music. Identity verification in the music distribution sector Recently, iDenfy’s team discussed the importance of identity verification in the music distribution sector with Domantas Ciulde, the CEO, touching on topics like how platforms, artists, and listeners can all contribute toward a more ethical online music use. In the greatest century currently, artists have more tools than ever before to safeguard their own works, but piracy is also more common than ever. The first line of defence against threats is still copyright registration, but digital technologies are where the real improvements are. Unauthorised use can be automatically traced by fingerprinting and/or watermarking systems. Blockchain is also a hot topic right now because it can be used to distribute royalties to creators and confirm ownership. People share the same goal at iDenfy. Whether they are uploading, licensing, or sharing content, iDenfy guarantee that only authentic and verified users take part in the digital economy. Musicians should also monitor the online presence of their work. Today, AI-based content tracking can catch leaks or duplicates early. When combined with secure distribution channels, piracy can be reduced significantly. Preventing piracy In terms of preventing piracy, streaming services have a significant amount of responsibility. They function as gatekeepers for the majority of music in the world. Platforms should consider putting in place content identification systems that demand rigorous user verification when a song is uploaded, such as Spotify's and YouTube's Content ID. Anonymous accounts distributing copyrighted content are frequently the first step in piracy. It would be much more difficult for pirates to hide themselves behind false identities if each uploader had to go through a Know Your Customer (KYC) procedure. At iDenfy, the KYC platform allows platforms to identify and analyse users globally. It verifies over 3,000+ types of official documents from more than 200 nations across the entire world. This assures that whoever is selling or uploading digital content is exactly who they claim to be. Anti-Money Laundering (AML) and KYC checks Piracy and profit are frequently linked. Via advertisements, subscriptions, or resale, unauthorised vendors and website owners make money from stolen music. Anti-Money Laundering (AML) and KYC checks can be enforced with assistance from financial institutions and payment processors. Eventually, it will be more difficult for criminals to transfer or cash out their illegal song earnings when each financial transaction is linked to a verified identity. Domantas notes that iDenfy’s verification system supports such transparency. “Our solution doesn’t just check documents. It uses biometric verification, 3D liveness detection, and a global screening database to flag suspicious behaviour. When combined with payment monitoring, this forms an informative data source against those trying to profit from piracy,” said Domantas Ciulde. Damage from piracy The most efficient instrument is awareness. The damage that piracy causes is still often undervalued. Every single illegal download takes away from artists another source of revenue and cuts into the platform's ability to support young talent. Supporting musicians on trustworthy platforms, even those with advertisements, helps to maintain the creative marketplace. Customers should be more mindful of where they get the information they have access to. There are some exceptions; for instance, when a new DJ mixes his playlist and the artist releases a song for free with the condition that credit be given if it is used for performances or media creation. It can be achieved by making sure that musicians are fairly compensated and that listeners stay safe from malware and fraud attacks that often include pirated files that, after clicking, can cause serious computer damage identity verification and artificial intelligence Viktor Vostrikov, CMO at iDenfy, says that identity verification and artificial intelligence will be very important. "AI is becoming more proficient at quickly and accurately identifying pirated content. The human touch is still important. At iDenfy, they combine automated checks with human review accuracy to catch deepfakes, manipulated IDs, and even fraud that machines alone might miss." iDenfy predict that the safest digital ecosystems by 2026 are those that have both content and identity protection tools. Piracy can barely flourish in these communities, composed of verified creators only, advanced identity verification tools, and clear revenue streams. Combating music piracy with technology, law, and finance is necessary, as it grows to be a very complex international issue for music fans, distributors, and even the entire creative industries. Preserving music in the digital age is more than preventing downloads, but also securing trust among users. “Transactions are secured and transparent when users have been verified. Our goal is to establish an environment that will encourage and protect creativity,’’ said Domantas Ciulde, the CEO of iDenfy.
HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organisations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink Beernink brings more than 25 years of international leadership experience in the technology and security industries to HID. His career spans sales, go-to-market and general management roles at companies including Atari, Tech Data, Samsung Electronics, Honeywell Security & Fire, Genetec and Milestone Systems (part of Canon Group). “HID is the pioneer in secure identity and access solutions, with products and technologies that touch almost every part of modern life,” said Beernink. “It’s inspiring to join a company that combines such strong innovation with a clear, forward-looking vision. HID’s scale, expertise and technology make it uniquely positioned to help customers navigate the digital transformation of access control - from mobile and cloud-connected systems to the next generation biometric authentication methods.” Educational background of Beernink Since joining HID, Beernink has been focused on strengthening HID’s European presence through closer alignment with channel partners, increased support for enterprise end-users, expansion of HID’s sales and engineering teams and continued investment in strategic growth verticals including data centres, critical infrastructure, healthcare, government and smart buildings. Beernink holds a business degree in Commercial Economics, studied Business Administration in the Netherlands, and has completed executive programs at Harvard Business School, INSEAD, and Nyenrode University, where he published a paper on strengthening boardroom preparedness for cyber risks. European leadership team Outside of work, Beernink is a licensed private pilot, dedicated runner and an active board member of his local Lions International chapter, combining his enthusiasm for technology, travel and community service. “Jos brings a wealth of experience and a truly international perspective to our European leadership team,” said Gerald Grattoni, HID’s Vice President & Head of Mature Markets. “His deep understanding of the security landscape, coupled with a strong customer-first mindset, will be instrumental in driving our continued growth and innovation across the region.”
HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorisation Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrative burden. TX-RAMP certification The TX-RAMP certification validates that HID PKIaaS meets the State of Texas' strict rigorous cybersecurity standards for handling sensitive government data, helping to eliminate the need for individual agencies to conduct their own lengthy security assessments. This approval removes procurement barriers for Texas agencies, municipalities, school districts and other public sector entities seeking to modernise and protect their digital identity infrastructure with automated, cloud-based certificate management. Why compliant certificate management matters Digital certificates are the foundation of secure communication on the Internet, enabling TLS/SSL encryption that protects websites, online transactions and sensitive data. However, managing these protocols manually is challenging, as an expired certificate can cause outages, expose vulnerabilities, and ultimately lead to financial loss and damaged public trust. HID’s PKIaaS solution automates digital certificate management (issuance, renewal and revocation), ensuring continuous compliance and uptime, while maintaining the robust security controls required by government entities handling citizens’ sensitive data. As a globally trusted Certificate Authority, HID also enables seamless automated management of IdenTrust certificates within PKIaaS. Certificates from a globally trusted authority provide instant trust and interoperability across major platforms and devices, simplifying the experience for users.
DigiCert, a global pioneer in intelligent trust, announced that it has joined the F5 Application Delivery and Security Platform (ADSP) Partner Program as a Select Partner. As part of this programme, DigiCert is working with F5 to deliver integrated solutions that enhance security, improve operational efficiency, and simplify multicloud operations for enterprise customers. DigiCert brings automated certificate lifecycle management, centralised visibility, and policy-driven cryptographic governance through DigiCert Trust Lifecycle Manager into the F5 ADSP ecosystem to provide enterprise customers with seamless, end-to-end certificate automation, stronger identity assurance, and simplified compliance across distributed and multicloud environments. The collaboration between F5 and DigiCert aligns with a shared mission to support enterprises with the tools they need to innovate securely and thrive in a multicloud-connected world. Collaboration with F5 “As enterprises continue to scale across hybrid and multicloud environments, the need for unified visibility, automation, and cryptographic governance has never been greater,” said Anthony Ricci, VP of Global Solutions Engineering at DigiCert. “Our collaboration with F5 brings DigiCert Trust Lifecycle Manager into the F5 ADSP ecosystem, giving customers a seamless way to automate certificate management, strengthen identity assurance, and simplify compliance, ultimately helping them build and deliver applications with greater speed, security, and confidence.” F5 ADSP Partner Program The F5 ADSP Partner Program is designed to cultivate a sophisticated ecosystem of technology partners that extend the capabilities of the F5 platform. In today’s fast-evolving IT environments, organisations grapple with the complexity of adopting and integrating innovative solutions across hybrid and multicloud architectures. Through the F5 ADSP and its ecosystem of technology allies, enterprises gain access to validated solutions that fill gaps, simplify buying decisions, and accelerate business outcomes. Fostering collaboration “F5 customers rely on us to provide simplified, scalable, and robust application delivery and security in increasingly complex IT environments,” said John Maddison, Chief Marketing Officer at F5. “The F5 ADSP Partner Program strengthens this foundation by introducing validated solutions that seamlessly integrate with the F5 ADSP. By fostering collaboration within this ecosystem, we’re enabling customers to achieve faster adoption, enhanced security, and unrivaled operational efficiency while driving their digital transformation forward.”
Accredit Solutions, a pioneer in accreditation, credentialing, and access-management technology for major sporting, entertainment, and government events and venues, has announced the establishment of a new local entity in Saudi Arabia, reinforcing its long-standing commitment to the region and its alignment with the Kingdom’s Vision 2030. Accredit Solutions has supported major projects in Saudi Arabia since 2019, working with NEOM on the NEOM Beach Games (2019–2024) and providing accreditation systems for landmark events including MDL Beast, Riyadh Season, Winter Wonderland Diriyah, the Copa Cup, and the Spanish Super Cup. Delivering accreditation technology The Kingdom’s Vision 2030 has positioned Saudi Arabia at the forefront of global investment in sports, entertainment, and venue infrastructure, creating some of the most advanced, innovative, and inclusive facilities in the world. With decades of delivering accreditation technology for the world’s biggest and most high-profile events, Accredit Solutions is a trusted partner for this next stage of development, bringing proven capability to Saudi Arabia’s vision for secure, world-class events. Identity verification and background checks The company’s platform manages the full accreditation lifecycle - from identity verification and background checks to badge production, access control, and live-site monitoring - enabling organisers to manage large-scale operations with complete control, safety, and compliance. The launch of a dedicated Saudi entity marks a significant step in strengthening local operations to support the Kingdom’s rapidly expanding sports, entertainment, and major-events sectors. Supporting Vision 2030 with local investment and innovation “This is an incredibly proud moment for Accredit Solutions,” said Peder Berg, CEO of Accredit Solutions. “Saudi Arabia has become one of the most dynamic live-event markets in the world. We’ve been privileged to support some of the Kingdom’s landmark sporting and cultural projects over the past six years, and establishing a permanent presence here demonstrates our deep commitment to helping Saudi’s events industry grow safely, efficiently, and in full alignment with Vision 2030.” Nicola Greenaway-Fuller, COO of Accredit Solutions, added: “Having a local entity allows us to better serve our Saudi and regional clients - delivering faster implementation, on-the-ground support, and solutions tailored to local regulations and operational needs. Our goal is to empower every organiser with the tools and confidence to deliver secure, world-class events that bring people together.” Trusted technology, global experience Accredit Solutions’ secure, cloud-based platform has processed over 5 million credentials worldwide, helping event organisers streamline every stage of accreditation - from online applications and ID verification to real-time access management and reporting dashboards. By integrating with venue security systems, ticketing platforms, and government compliance processes, Accredit Solutions ensures that only authorised personnel, athletes, media, and VIPs are granted access - enhancing safety, efficiency, and accountability across complex event operations. Latest expansion underscores Accredit Solutions’ position In the GCC, Accredit Solutions has supported flagship projects such as Expo 2020 Dubai, the Dubai Sevens, and COP28, alongside global clients including the NFL, Premier League, and pioneering sports governing bodies and government agencies. This latest expansion underscores Accredit Solutions’ position as a trusted partner for major events, leagues, and venues seeking to strengthen operational control, improve security, and deliver exceptional live experiences.


Expert commentary
In the ever-evolving struggle between cyber offence and defence, attackers have almost always moved first. In the emerging domain of artificial intelligence, this pattern appears to be repeating itself. Yet, global cybersecurity pioneers appear disconcertingly disengaged. Just over half even agree that AI-driven attacks are set to become dramatically more complex and widespread. Equally concerning is the widespread apathy regarding AI’s role in expanding an already sprawling corporate attack surface. This is no small oversight. A recent global Trend Micro study showed that 73 percent of organisations have already suffered cybersecurity incidents due to unknown or unmanaged assets. In an era where digital blind spots are both common and consequential, hesitation is a risk few can afford. Security has to shift from reactive protection to proactive risk exposure management. The opportunity and the risk of AI Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT The potential for AI to transform enterprise operations is enormous, but so is the risk. The warnings have been loud and clear. As early as the first quarter of 2024, the UK’s National Cyber Security Centre (NCSC) stated that AI would “almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years.” Their prediction is proving accurate. Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT, freely traded as services on the dark web, as well as malicious models like FraudGPT, built on open-source large language models (LLMs). These tools are no longer just about automating tasks; they are turbocharging the entire attack lifecycle. From more convincing phishing emails and precise target selection, to sophisticated malware creation and lateral movement within breached systems, AI is driving a step-change in threat actor capability. Integrating open-source models However, this is only one side of the coin. The other, often overlooked, is AI’s impact on the corporate attack surface. Even well-meaning employees can unintentionally expand organisational risk. The widespread use of AI-as-a-service tools like ChatGPT introduces significant shadow IT concerns, especially when sensitive business information is input without proper oversight. Data processing and storage practices for many of these services remain opaque, raising additional compliance concerns under regulations like the UK GDPR and the EU’s AI Act. For those organisations that choose to build or customise their own LLMs, the risks multiply. Integrating open-source models may expose businesses to vulnerabilities, misconfigurations and flawed dependencies. Each new tool and environment adds to the complexity of an attack surface already strained by remote work setups, sprawling cloud deployments, IoT ecosystems, and accelerating digital transformation programmes. Managing the expanding risk landscape Many have already shared security incidents where a lack of asset visibility was the root cause Many security pioneers do understand what is at stake. Nine in ten agree that effective attack surface management is tied directly to business risk. They cite a long list of potential consequences, disruptions to operations, reputational damage, declining competitiveness, strained supplier relationships, financial losses and reduced staff productivity. Many have already experienced security incidents where a lack of asset visibility was the root cause. Despite this recognition, however, the response remains largely inadequate. Fewer than half of global organisations use dedicated tools to monitor their attack surface proactively. On average, only a quarter of cybersecurity budgets are allocated to managing cyber risk exposure. Third-party risk management is similarly neglected: fewer than half of firms actively monitor their vendors for vulnerabilities. This inertia creates an obvious contradiction. Security pioneers understand the business implications of unmanaged risk, but they are not equipping themselves with the tools or processes to respond. That needs to change—and fast. How AI can help defenders take the lead There is good news: AI is not only a weapon for cybercriminals. It can also be a powerful ally for defenders, particularly in the field of Cyber Risk Exposure Management (CREM). The best tools in this category use AI to continuously scan an organisation’s entire digital footprint. They can automatically detect vulnerabilities, spot misconfigurations, identify rogue or shadow assets, and provide prioritised remediation recommendations. CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats Intelligent algorithms can also analyse network behaviour to identify anomalies that could signal a breach in progress. Unlike traditional tools, which often drown analysts in noise, CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats. For overburdened security teams, this enables a far more focused and effective response. However, the keyword here is “continuous.” The nature of today’s IT environments, especially in the cloud, is dynamic and fast-moving. Assets appear and disappear within minutes. Static, point-in-time assessments are no longer sufficient. Yet more than half of organisations still lack continuous scanning processes. This leaves them exposed to risks that might persist undetected for weeks or months. Overcoming barriers to adoption So what is holding organisations back? In many cases, it’s not the technology itself but the internal politics of investment. Security pioneers interested in CREM tools often prioritise real-time alerting, clear dashboards, and seamless integration with their existing environments. All of this is now achievable. The challenge lies in securing board-level support. Many security teams still work in silos, disconnected from the broader business Boards are often cautious when it comes to cybersecurity investment, particularly when immediate ROI is not clear. To gain their trust, security pioneers must learn to speak the language of business risk, not technical threat. They must frame cyber exposure in terms of reputational impact, regulatory liability, operational continuity, and investor confidence. There is also a cultural component. Many security teams still work in silos, disconnected from the broader business. This limits their influence and makes it harder to embed security as a strategic enabler. In the AI era, this divide must be bridged. Cybersecurity must become a board-level concern, and risk exposure must be treated as a fundamental operational issue. Time to act We are at a critical inflection point. The AI revolution is not on the horizon, it is already here. Threat actors are moving rapidly to exploit it, leveraging tools and techniques that were unthinkable just a few years ago. Meanwhile, organisations remain slow to respond. Too few are investing in the tools, processes, and people needed to manage their risk exposure effectively. AI can be used not only to attack but to defend. CREM tools powered by AI offer a powerful way to regain visibility, restore control, and build lasting resilience. They enable proactive rather than reactive security. And they help organisations align their cybersecurity strategy with their broader business objectives. Security teams have to elevate the conversation. They must advocate not just for new tools, but for a new mindset, one that treats cyber risk as an enterprise risk, and one that prioritises continuous visibility as a prerequisite for resilience.
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organisations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for security access management specialist, Parking Facilities. Here, he examines the pitfalls in relying upon human intervention in critical national infrastructure (CNI) settings, and the future of biometrics to keep assets, information and personnel safe. Recent Verizon report 74 percent of corps are saying that insider threats are becoming more of a concern for them As with any workplace initiative, be it a simple recycling policy or a corporate password protection directive, technology is only as good as those who implement or operate it. Whilst technology can be fallible and gremlins do arise, it’s never as flawed as us mere humans with our unreliable ‘on/off’ switch. Likewise, we carry the ability to reason, to override procedures, or ignore policy, should we wish. Or as it happens, just make mistakes. In fact, according to a recent Verizon report, two out of three insider attacks happen as a result of negligence, and 74 percent of organisations are saying that insider threats are becoming more of a concern for them. Fundamental security practices Security breaches aren’t limited to external threats either, whether intentionally or not, they can come from within. Humans can, and do, ‘go rogue’, whether that’s pre-meditated criminal or malicious intent, or just by taking shortcuts. While data breaches court most news headlines in this digital era, some of the most significant security risks are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. Employee negligence and insider threats Insider negligence remains one of the pioneering causes of security breaches Insider negligence remains one of the pioneering causes of security breaches. Employees who share passwords or access cards may do so out of convenience, ignorance, or a misplaced sense of trust. Unfortunately, this creates vulnerabilities that are left open to exploitation. When multiple employees share credentials, it becomes difficult to trace actions to a single individual. This lack of accountability can complicate incident investigations and allows malicious activities to go undetected. Emergency services resources Furthermore, the sharing of passwords or access cards means inaccurate accounting of personnel, and in the event of an evacuation or major incident, central IT systems will hold misleading information of employees’ locations which could have a huge impact upon safety and potentially emergency services resources. Employees with malicious intent can exploit shared credentials to carry out unauthorised activities while shifting blame to others, increasing the risk of deliberate sabotage or theft of sensitive data. Even when there is no malicious intent, employees who share access credentials risk unintentionally exposing them to unauthorised individuals, such as contractors, visitors, or external attackers. What happens when employees compromise security? Access cards are designed to limit entry to restricted physical locations. When shared, unauthorised personnel could enter secure areas such as control rooms, rail lines, large construction sites, data centres, power plants or indeed any site meant to be kept secure. This creates opportunities for sabotage, theft, or corporate espionage. Sensitive data held within critical sites, such as blueprints, system controls, and customer records Likewise, shared passwords can lead to unauthorised entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon a company’s bottom line, operations, and ultimately its reputation. Eliminating the human burden One way to prevent human error, or to thwart malpractice is to reduce the burden upon employees to be compliant, and eliminate our flaws by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now, despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but an instant recognition of persons of interest cross referenced against a database of known suspects. Our car parks are governed by automatic number plate recognition (ANPR) to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend. The UK Home Office is even accelerating its transition to digital border management, using biometric technology to improve efficiencies, safety, and to track and capture known or illegal persons. What of the CNI sites? But what of the corporate world? What of the CNI sites, our airports, our national construction developments such as HS2 or our high-rise office spaces? We always ask this very question, and also ‘can you afford a security breach’ in whatever environment you’re in? Because the smart, cloud-based technology being used by governments, law enforcement authorities and Border Force have cascaded down through the civil and corporate worlds. Immediate safety and security Security-conscious corps are diligently removing human error, by eliminating the human burden Security-conscious organisations are now diligently removing human error, by eliminating the human burden. With cloud-managed software not only are access points managed through biometric integration, but it also overcomes the issues mentioned earlier around accountability - in that the cloud will always register who has passed through an access point, or out of it. This is critical for both immediate safety and security but also for matters arising from a crisis, or emergency situation. It’s also less admin-heavy, more cost-effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Implement robust access management systems Simple acts of negligence, such as sharing passwords or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of CNI, national security risks. To mitigate this, organisations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves, I see even more robust biometrics coming to the fore, until such time we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet.
Security beat
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and healthcare uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate, retail and healthcare environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Stratas is a UK-based specialist in document automation, finance automation, and intelligent document processing (IDP). Its solutions help organisations automate processes underpinned by documents and improve control across finance and operations. Stratas needed a new, secure, and scalable data storage solution after notification that its remote storage provider planned to discontinue services. Richard Webb, the company’s Professional Services Technical Consultant, explains: “We weren’t confident that the physical servers were being properly maintained. Our provider was using older machines and running Windows Server 2012, which presented us with reliability and security challenges. If we had continued with our arrangement, things would have had to change.” Solution After considering several options, Richard and his team selected Node4’s Virtual Data Centre (VDC) offering – the company’s managed, hosted Infrastructure as a Service platform. As the first step in deployment, Node4 set up a bespoke landing zone to assist Richard with data migration from his organisation’s legacy servers. Node4 also configured VDC access via a secure, high-speed VPN. Public cloud solution “We told Node4 from the outset that we wanted a managed, hosted environment. We’re a lean business with no physical premises and didn’t want the overheads and complications of managing physical servers,” Richard comments. “On paper, a public cloud solution might have seemed logical. But we run several niche applications with specialised workflow and process requirements. Node4’s VDC was a better fit – we got the scalability and flexibility of public cloud without the complexity and administration headaches. But we also benefit from Node4’s support and expertise. It’s the best of both worlds.” Node4’s data centre “We also wanted our data to remain in the UK on servers owned by a UK company,” he acknowledges. “That’s important for GDPR compliance and data sovereignty." "It was also a bonus that Node4’s data centre is just down the road from us, so we’re hyperlocal, I guess. It all adds to the feeling that we’re not dealing with some faceless conglomerate – that there are real people on hand with a genuine interest in helping our business to thrive.” Results Stress-free migration With the landing zone operational and VPN connectivity established, Richard and his team began migrating applications and clients to their new Virtual Data Centre. “Clients using our invoicing and accounting service can’t be offline for a long time – especially around month-end. So, although it was slower for us, we migrated one customer at a time at a rate of about five per week,” he explains. “Node4’s landing zone also allowed us to test migrations to ensure everything worked as expected before going live. This kept downtime to an absolute minimum and reduced many of the risks associated with migration to hosted environments.” Enhanced backup, recovery and resiliency Richard and his team immediately benefited from switching to Node4’s virtual data centre. “Our previous provider offered only basic backups, and their infrastructure lacked resiliency,” he recalls. “We could start work on a Monday and, without any prior warning, find half our servers were down. Switching to Node4’s virtual data centre with modern, resilient servers – alongside built-in comprehensive backup and disaster recovery – improved our day-to-day operations and customer experience right from the outset.” Richard admits that the connectivity and reliability improvements far exceeded anything he’d hoped for. “It’s amazing! Even basics like logging in are easier. On our old system, it would take several attempts, and there was always a chance you’d get kicked out after a couple of hours. Getting online first time probably saves each of us around ten minutes a day. That may not sound much, but it quickly adds up as the weeks and months go by.” Advanced, integrated security Richard also notes that the VDC offers a range of security benefits, including firewall defences, DDoS protection and secured instances. “We’re planning to introduce multi-factor authentication to access our VPN. It’s a vital identity management tool for all businesses,” he comments. “But especially ones like ours with a 100% remote workforce.” Consumption-based model: Pay for used compute, network and storage Richard is also keen to highlight the advantages of a consumption-based model. “The VDC is fully self-service. We can adjust compute, network, storage, and services on demand with just a few clicks – giving us complete control over our environment and costs." "This is important right now and also helps us plan ahead; for example, we can now see a pathway to rolling out AI and advanced automation in the coming years.” Transparent pricing “I like the fact that VDC pricing is transparent,” Richard admits. “We did our due diligence and looked at a few other companies. Their project and operational costs seemed lower. But there were lots of gotchas – like fixed data charges and data limits – hidden in the small print. So, when we weighed it all up, Node4, with its consumption-based pricing, was far better value and a much better organisational fit.” He concludes: “What does that mean on a day-to-day basis? Currently, we’ve scaled requirements as we’re carrying out some server consolidation work. But all that extra capacity is still there for us. And while we’re waiting, we’re not being charged for it. That’s a huge benefit. It helps us remain competitive and responsive to changing market and economic conditions.”
How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch. How powerful of a concept “The whole idea of people navigating around our facilities globally — it just brings a smile to your face,” said Ken Damstrom, Global Head of Corporate Security at BNY. “But it really brings a smile to their face because when they come to work they come with their iPhone they don’t necessarily need to come with their (physical) ID badge and how powerful of a concept is that?” Getting started with the right team To put everything in motion, BNY engaged connected access network provider SwiftConnect and mobile access provider, HID. Selecting experienced and reputable partners was important for BNY, along with the technologies that they brought to the table. For this project, those technologies included employee badge in Apple Wallet alongside HID’s mobile-enabled Signo readers and the reliability of the SwiftConnect connected access network. How does the technology work? Two key components of BNY’s initiative were essential to its success. Employee badge in Apple Wallet, paired with HID’s mobile-enabled Signo readers gives employees and their guests easy and secure access to corporate spaces using only their iPhone or Apple Watch. Users can simply hold their device near a reader to access doors, turnstiles, elevators, spaces and more. SwiftConnect unifies identity and physical access into one effortless experience, connecting systems and spaces into a unified network. It supports on-demand access via mobile credentials and optimises existing methods like fobs and cards for secure, consistent access — replacing friction with fluidity at every interaction. “What we learned by partnering with SwiftConnect and HID was employee badge in Apple Wallet was absolutely ready for prime time,” said Ken Damstrom. “We’ve had nothing but confidence in rolling it out in our organisation.” Making mobile access technology a reality With full support from their partners, BNY launched their new mobile access solution at their headquarters in New York City, then expanded to other offices in Boston, London and India, as well as others. They’ll continue until every BNY office worldwide is using the technology — at 110 locations in 35 countries. Regardless of which country the technology is implemented, employee badge in Apple Wallet will work the same across BNY’s facilities. That’s important because their employees can seamlessly and securely enter and move around multiple locations. Also, with Express Mode, employees do not need to unlock their device to use their employee badge in Apple Wallet. Even if the phone needs to be charged, the device can still be used to access spaces with Power Reserve mode. Advantage of privacy and security When an employee has an employee badge in Apple Wallet, their data is never shared with Apple or stored on Apple servers. If their iPhone or Apple Watch is misplaced, the owner of the device can promptly use the Find My app to lock the device and help locate it. Employee badges in Apple Wallet are stored on personal devices and take full advantage of the privacy and security built into iPhone and Apple Watch. “We wanted consistency across our real estate portfolio, so whether you’re in New York, Lake Mary or London, you know how to access the site because you know how to use employee badge in Apple Wallet,” said Dafna Alsheh, Global Head of Workplace Experience & Design, BNY. Combination of technologies The combination of these technologies is now helping BNY create that convenient, quick access experience for employees — while ensuring a secure workplace. “One of the things that makes employee badge in Apple Wallet really impactful is that it works the same at work as it does when they’re at the store or on the subway because you don’t have to teach people how to use it,” said Dafna Alsheh. “We’ve had people who are like, ‘wow this just works.’ But when they realise they can use their Apple Watch, then they’re like, ‘this is magic.’”
International guests arriving at South Korea’s largest foreigner-only casino, INSPIRE Entertainment Resort, now enjoy a significantly faster and more seamless check-in experience. Customer onboarding times have noticeably improved following the integration of Regula’s advanced identity verification technology. Regula Document Reader SDK, the most comprehensive ID verification solution in the world, integrates with the resort’s anti-money laundering (AML) procedures, boosting operational efficiency and compliance. Operational efficiency Following vendor evaluations, INSPIRE selected Regula Document Reader SDK Seeking to enhance operational efficiency and meet evolving AML requirements, INSPIRE Entertainment Resort sought a faster and more accurate solution. The resort, which features a high-volume casino catering exclusively to foreign guests, needed a system capable of recognising passports from around the globe with minimal friction. Following vendor evaluations, INSPIRE selected Regula Document Reader SDK for its superior document reading speed, intuitive interface, and unmatched global ID coverage. Regula’s solution is powered by the company’s proprietary ID template database—the world’s largest—covering 15,000+ document templates across 254 countries and territories. Critical ID data Deployed across six entrance stations, Regula Document Reader SDK enables real-time extraction and validation of critical ID data, such as name, date of birth, nationality, and passport number. This data is then passed directly to INSPIRE’s AML system, which in turn performs automated screening against external compliance and watchlist databases. Since deploying Regula Document Reader SDK, INSPIRE Entertainment Resort casino has experienced: Faster document processing and guest entry. Significant reduction in manual rescans and staff workload. Consistently smooth onboarding, even during peak entry hours. Passport scanning “As the team responsible for passport scanning at the casino, we’re very satisfied with the improvements Regula has brought,” says Dr. Ilnam Lee, IT Director at INSPIRE Entertainment Resort. “The speed of document processing has noticeably increased, and guest entry has become much smoother. It’s a reliable solution that has elevated the efficiency of our daily operations.” Secure guest onboarding experience “In industries like hospitality, every second counts. We’re happy to support INSPIRE Entertainment Resort in creating a faster and more secure guest onboarding experience while meeting strict AML requirements.” “Our focus is to make accurate identity verification seamless, even in complex international scenarios, and this project is a great example of that in action,” says Ihar Kliashchou, Chief Technology Officer at Regula.
HID, the pioneer in trusted identity solutions, announced that Chester Race Company, owner of the world’s oldest racecourse still in operation, has adopted Near Field Communication (NFC)-based ticketing technology – the first major sports venue in the UK to adopt an end-to-end solution provided by HID. Leveraging HID’s Event Management Platform (EMP) and Janam’s rugged XT3 handheld scanners, the organisation has revolutionised its guest admissions process, offering a seamless and efficient entry experience at Chester Racecourse. Oldest operational racecourse The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering Founded in 1539 during the reign of King Henry VIII, Chester Racecourse holds the Guinness World Record as the oldest operational racecourse. Operated by Chester Race Company, the venue welcomes over 200,000 guests annually to its 15-race season, including the renowned Boodles May Festival, which features the Chester Cup. The company also manages Bangor-on-Dee and Musselburgh racecourses, alongside diverse catering, hospitality, hotel and recruitment businesses. HID’s NFC ticketing technology “Admissions are our first touch point with our guests on a race day, so delivering an excellent customer experience is critical,” said Gareth Simpson, Head of Racecourse Operations at Chester Race Company. “By adopting HID’s NFC ticketing technology, we’ve transformed the entry process, offering guests the ease of smartphone-based tickets in their Apple or Google Wallets. It’s just like downloading a mobile boarding pass for an airline flight.” Chester Racecourse’s new system streamlines Chester Racecourse’s new system streamlines the ticketing process from purchase to entry Chester Racecourse’s new system streamlines the ticketing process from purchase to entry. Guests now receive encrypted e-tickets within seconds, downloadable directly to their smartphones, along with guidance about dress code, race program and directions. On race day, reminders appear on guests’ devices as they approach the venue, further enhancing convenience. Key to the implementation is the purchase of 45 Janam XT3 rugged mobile computers which enable offline ticket validation for continuity of service. This is important as the racecourse is in a low-lying area in Chester where the mobile signal strength is poor. Upgrade its network infrastructure Preloaded ticket data on each device eliminates reliance on Wi-Fi connections, enabling swift and accurate access even during peak times. With a scan time of less than a second, the Janam XT3 units significantly reduce congestion and wait times and work well in poor light conditions. To support the NFC ticketing solution, Chester Race Company has made significant financial investments to upgrade its network infrastructure, deploying Wi-Fi 7 access points along with new routers, switches and robust 10-gigabit Ethernet connections to the Internet. Access control solution in real-time HID's EMP integrates with a ticket sales platform from SeatGeek, with a bespoke API recently written to integrate the two systems to enable ticket purchases to be updated automatically in the access control solution in real-time, thereby removing a cumbersome manual process adopted in the past. “We’ve addressed all our entrance issues,” added Simpson. “From faster entry to real-time visibility of guest attendance, HID’s solution has been transformational.” Terms of enclosure and stands NFC-based system offers more benefits as Chester Racecourse knows exactly the number of people The NFC-based system offers additional benefits as Chester Racecourse knows exactly the number of people who have entered (out of the tickets sold) and where people are in terms of enclosure and stands. This helps it meet its compliance with capacity obligations, along with consideration for forthcoming legislation such as Martyn's Law. It also reduces ticket fraud by eliminating barcode sharing or resale opportunities by touts. Additional features within HID's EMP Looking ahead, Chester Race Company plans to expand NFC ticketing across its portfolio and explore additional features within HID’s EMP, such as accreditation management for staff and contractors, as well as loyalty program integration. “We’re the oldest racecourse in the world using pioneering-edge technology,” concluded Simpson. “HID’s solutions are enabling us to create modern, memorable experiences for our guests by streamlining admissions totally using a tool that everyone has in their pocket – a smartphone.”
Ecuador’s border control authorities have significantly enhanced their identity verification capabilities by deploying a suite of advanced document examination devices from Regula. The nationwide upgrade, supported by the International Organisation for Migration (IOM) and local partner INSETK, brings automation, precision, and speed to the country’s border checkpoints, which collectively process nearly 1.5 million travellers annually. Regula’s advanced forensic devices The project is a major step in Ecuador’s mission to modernise all land, air, and maritime entry points The project is a major step in Ecuador’s mission to modernise all land, air, and maritime entry points, including key international airports in Quito and Guayaquil, as well as northern and southern border crossings. These strategic locations now benefit from Regula’s advanced forensic devices, which enable fast and reliable detection of fraudulent documents—critical in the fight against identity-related crime. Closing the gap with a set of forensic devices Previously, document checks at Ecuador border crossings were largely manual and supported by outdated equipment, often handled by just two officers per site. This made the process slow, error-prone, and vulnerable to sophisticated fraud. To address this, Ecuador’s border checkpoints were equipped with the following Regula solutions: Regula 4308 at Quito International Airport: Ideal for high-traffic airports, this dual-video spectral comparator supports the full spectrum of light sources and optical filters. It also offers high-quality image capture capabilities thanks to its up to 320x optical zoom and up to 140,000 ppi resolution. As a result, border officers can thoroughly inspect all of the ID security features, including printing techniques, holograms, optically variable inks, and more. Regula 4306 at Guayaquil International Airport and major land borders: A space-saving device with an 8 MP high-resolution camera and over 40 LED light sources for analysing document authenticity, just like its counterpart, the Regula 4308. Regula 4205D at frontline checkpoints: A multi-functional device tailored for primary control zones. It includes 12 light sources, automated cross-checks, and up to 30x on-screen magnification for thorough document authentication. Regula 8333M at mobile checkpoints: Designed for remote or non-standard border control situations, such as processing charter flights or cruise ship passengers, this compact mobile document reader ensures that ID checks remain reliable and consistent outside traditional migration offices. Regula’s Information Reference System Regula’s video spectral comparators are controlled via Regula Forensic Studio (RFS), a cross-platform software solution for advanced document checks. It enables precise measurements, image comparison, report generation, and scripted workflows for faster, consistent inspections. With RFS, officers can also verify MRZs, RFID chips, barcodes, and IPI—all without extra tools. For deeper document examination, border control officers have real-time access to Regula’s Information Reference System (IRS), which provides synchronised reference images and lighting presets for fast, precise comparison of travel documents. Data cross-verification and robust authenticity checks RFS also integrates with Regula Document Reader SDK to automate travel document verification RFS also integrates with Regula Document Reader SDK to automate travel document verification and prevent fraud through data cross-verification and robust authenticity checks. Importantly, Regula’s software is backed by its proprietary identity document template database—the world’s largest—featuring over 15,000 templates from 252 countries and territories, ensuring reliable validation at border checkpoints. Trusted results, faster than ever Since implementing Regula’s solutions, Ecuadorian border control authorities have noticed notable improvements: Document authentication now takes minutes instead of hours. Detection of forged documents has significantly increased. Automation reduces human error and increases operational efficiency. Officers have more time to focus on complex cases and decision-making. Technology upgrade and fraud detection “Apart from the technology upgrade and fraud detection improvement at the border crossings, our collaboration with Regula demonstrated another success." "The project was fulfilled very smoothly. From the beginning, we’ve received full support from Regula’s team—they were always ready to help with any issue, even those caused by users on the ground. It’s definitely a level of service that makes a real difference,” says Diego Calderon, Chief Executive Officer at INSETK. How technology can turn critical inspection tasks “Border security is where precision, speed, and trust must converge. We're proud to support Ecuador in modernising its checkpoints with tools that meet forensic standards while being easy to use in the field." "This project shows how technology can turn critical inspection tasks from time-consuming to streamlined, without compromising security,” comments Arif Mamedov, CEO at Regula Forensics, Inc.
With a vast portfolio of smart locks, lock management systems, and connected readers, ensuring strong authentication, data integrity, and compliance with global regulations is essential. To meet these challenges, ASSA ABLOY is leveraging the long-time IoT expertise of HID to implement HID PKI-as-a-Service. This strategic deployment is not just about protecting millions of connected devices but also about future-proofing ASSA ABLOY’s security infrastructure for years to come. Cryptographic assurance: Securing every lock, inside and out ASSA ABLOY boosts trust in its devices, preventing unauthorised clones or counterfeit products A crucial aspect of this solution provides Genuine ASSA ABLOY products — an assurance that every smart lock, reader, and system within the network is verified as an authentic and authorised product. By leveraging PKI-based identity verification, ASSA ABLOY strengthens trust in its devices, preventing unauthorised clones or counterfeit products from entering the ecosystem. For example, the inside of a lock can only pair with a matching outside component from ASSA ABLOY, ensuring the integrity and security of the entire system. This level of cryptographic trust not only enhances device security but also strengthens protection against counterfeit components or unauthorised modifications. Meeting stringent security and compliance needs As the industry faces increasing regulatory pressure, including the EU Cybersecurity Act and the upcoming Cyber Resilience Act, ASSA ABLOY needed a scalable, automated solution to manage over a million certificates annually. HID’s expertise in certificate management provides enhanced security, reduced complexity HID PKI-as-a-Service enables seamless device authentication, automated provisioning, and hierarchical key management, ensuring compliance with evolving security standards. An essential part of the solution is the offline Root Certificate Authority (CA), which serves as the foundation for secure operations. HID’s expertise in certificate management provides enhanced security, reduced complexity, and operational efficiency across ASSA ABLOY’s global IoT ecosystem. Driving innovation and efficiency By integrating automated bootstrapping and customised attestation certificates, the implementation has significantly improved operational efficiency while minimising manual effort. This allows devices, including those operating offline, to maintain secure provisioning and updates without requiring constant connectivity. Additionally, the system is future-ready, designed to support emerging IoT protocols such as Thread, CoAP, EDHOC, and OSCORE, ensuring adaptability as the industry evolves. Collaborative success The success of this deployment is rooted in a strong alliance between ASSA ABLOY and HID The success of this deployment is rooted in strong collaboration between ASSA ABLOY and HID. A dedicated steering group ensured alignment on global PKI policies and security objectives, leading to a smooth rollout with minimal disruption. “The implementation of HID PKI-as-a-Service wasn’t just about meeting current security requirements, it was about future-proofing our IoT ecosystem for security and scalability,” says Anders Calbom, VP & Head of Technology Solutions, ASSA ABLOY. Major milestone in IoT security Anders Calbom added: “With the ability to manage over a million certificates annually, we’re now positioned to scale our security infrastructure alongside our business growth.” This initiative marks a major milestone in IoT security, compliance, and operational efficiency. As ASSA ABLOY continues to innovate and expand, HID PKI-as-a-Service provides the secure foundation needed to drive future growth and digital transformation.


Products


Round table discussion
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unfortunately, the widespread use of the term has also paradoxically undermined its meaning and power. However, today's concept of convergence has matured to provide new levels of benefit for security professionals. We asked our Expert Panel Roundtable: How has the meaning of “convergence” evolved in the security market? How are systems today more converged than ever?
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly, but they can also be misused or misunderstood. Within a specific industry, such as security, buzzwords can create a sense of shared understanding and belonging. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the security industry?
White papers
What is a universal RFID reader?
Download
Preventing loss, securing assets
Download
Palm vein recognition
Download
Best practices for asset management
Download
The top 4 reasons to upgrade physical security with the Cloud
Download
Public-private partnerships on campus: What you need to know
Download
A more secure alternative to 125 kHz proximity cards
Download
Creating a secure and positive healthcare experience
Download
5 reasons to integrate mobile technology into your security solution
Download
Is your access control system as secure as you think?
Download
House Of Smart Cards - How assumptions can open dangerous security gaps
Download
Mobile Access - What you need to know
Download
The evolution of cards and credentials in physical access
Download
Security risks of ‘universal’ card readers
Download

Videos
Identity management: Manufacturers & Suppliers
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
